SlideShare a Scribd company logo
Internet  protocol security (ipsec) Prepared ByNishithModi(09BCE029)Chinmay Patel (09BCE038)
Flow of presentation Introduction
 Benefits of Ipsec
 Modes of operation
 Security Protocols(Architecture)
 Limitation of IPsec   Need for IPSEC...IP Packets have no inherent security. It is Relatively  easy to forge   the addresses of IP packets, modify the contents of ip packets, replay old packets, and inspect the contents of Ip packets in transit. Therefore there is no guarantee that IP datagrams received are From the claimed senderThat they contain the original data that the sender placed in themThat the original data was not inspected by a third party  while the packet was being sent from source to destination.     IPSec is a method of protecting IP datagrams. It provides a standard , robust, extensible mechanism in which to provide security to IP and upper-layer protocols.introductionIPSecurity (IPSec) is a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.
In common structure of any security protocols , we need to know which algorithm is used for authentication and encryption/decryption.Common structure of security protocols
  Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
   It is implemented in NETWORK layer.TCp/ip  protocol suite  and IPSec
general IP Security mechanisms provides
authentication
confidentiality
key management
applicable to use over LANs, across public & private WANs, & for the InternetIPSEC uses
Benefits of ipsecin a firewall/router provides strong security to all traffic crossing the perimeter
is resistant to bypass
is below transport layer, hence transparent to applications
can be transparent to end users
can provide security for individual users if desired
additionally in routing applications:
assure that router advertisments come from authorized routers
neighbor advertisments come from authorized routers
insure redirect messages come from the router to which initial packet was sent
insure no forging of router updatesIpsec   servicesAccess control
Connectionless integrity
Data origin authentication
Rejection of replayed packets
a form of partial sequence integrity
Confidentiality (encryption)
Limited traffic flow confidentiality  Modes  of  operationIPsec can be implemented in a two modes:-Host-to-host transport modeNetwork tunnel mode.
  transport  modeTransport mode provides secure connection between two end-points because only the payload (the data you transfer) of the IP packet is usually encrypted and/or authenticated.
IPsec in transport mode does not protect Ipheader.It  protects what is delivered from the transport layer to the network layer.
In this mode,theIpsec header and tailer are added to the information coming from the transport layer.The IP header is added later.
It’s simply a secured IP connection.  transport  mode  in  action
  Tunnel  modeTunnel Mode encapsulates the entire IP packet to provide a virtual "secure hop" between two gateways.Thus it  protects the entire IP packet.
Tunnel mode is used when either the sender or the receiver is not a host.
Tunnel mode is more typically used between gateways (routers, firewalls, or standalone VPN devices) to provide a Virtual Private Network (VPN).A secure tunnel is created across an untrusted internet.  Tunnel  mode  in  action
security  ASSOCIATIONdefined by 3 parameters:
Security Parameters Index (SPI)

More Related Content

PPT
IP Sec by Amin Pathan
PPT
Overview of ip_security by JetArvind kumar Madhukar
PPTX
IP Sec - Basic Concepts
PPT
Ip security
PPTX
Ipsec 2
PPTX
IP security
PPTX
Ip security
PPTX
IP Security
IP Sec by Amin Pathan
Overview of ip_security by JetArvind kumar Madhukar
IP Sec - Basic Concepts
Ip security
Ipsec 2
IP security
Ip security
IP Security

What's hot (19)

PPTX
IPSec VPN & IPSec Protocols
PPT
IP security Part 1
 
PPTX
IP Security and its Components
PPTX
Ip security
PDF
BAIT1103 Chapter 6
PPTX
Keymanagement of ipsec
PPT
PPTX
IPSec VPN tunnel
PDF
IP Security
PPT
PPT
I psec
PPTX
Ipsec (network security)
PPT
PPTX
IP Security
PPTX
ip security
PPT
Ip sec talk
PPTX
PPT
IPSec Overview
IPSec VPN & IPSec Protocols
IP security Part 1
 
IP Security and its Components
Ip security
BAIT1103 Chapter 6
Keymanagement of ipsec
IPSec VPN tunnel
IP Security
I psec
Ipsec (network security)
IP Security
ip security
Ip sec talk
IPSec Overview
Ad

Similar to Ipsecurity (20)

PPTX
IP SEC.ptx
PDF
Network IP Security.pdf
PDF
IP Security
PPT
Ip Sec Rev1
PPTX
Cryptography and network security
PPTX
EOC MODULE 3 IP security - SR.pptx engineering college
PPT
IP Security in Network Security NS6
PPTX
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PDF
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
PPT
The Security layer
PPT
IS Unit-4 .ppt
PPT
Chapter No 19 - Network and Security-by-MIT
PDF
Working Survey of Authentication Header and Encapsulating Security Payload
PDF
IPSec (Internet Protocol Security) - PART 1
PPTX
Encapsulating security payload in Cryptography and Network Security
PPTX
Cryptography and Network security # Lecture 8
PPTX
IP addresse Security in Data Communication & Networks
PDF
Lecture14..pdf
PDF
IPsec for IMS
IP SEC.ptx
Network IP Security.pdf
IP Security
Ip Sec Rev1
Cryptography and network security
EOC MODULE 3 IP security - SR.pptx engineering college
IP Security in Network Security NS6
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
The Security layer
IS Unit-4 .ppt
Chapter No 19 - Network and Security-by-MIT
Working Survey of Authentication Header and Encapsulating Security Payload
IPSec (Internet Protocol Security) - PART 1
Encapsulating security payload in Cryptography and Network Security
Cryptography and Network security # Lecture 8
IP addresse Security in Data Communication & Networks
Lecture14..pdf
IPsec for IMS
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Hazard Identification & Risk Assessment .pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Classroom Observation Tools for Teachers
PDF
IGGE1 Understanding the Self1234567891011
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Final Presentation General Medicine 03-08-2024.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Final Presentation General Medicine 03-08-2024.pptx
Hazard Identification & Risk Assessment .pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Supply Chain Operations Speaking Notes -ICLT Program
History, Philosophy and sociology of education (1).pptx
Empowerment Technology for Senior High School Guide
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
LDMMIA Reiki Yoga Finals Review Spring Summer
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Computing-Curriculum for Schools in Ghana
Classroom Observation Tools for Teachers
IGGE1 Understanding the Self1234567891011
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Digestion and Absorption of Carbohydrates, Proteina and Fats
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf

Ipsecurity

  • 1. Internet protocol security (ipsec) Prepared ByNishithModi(09BCE029)Chinmay Patel (09BCE038)
  • 2. Flow of presentation Introduction
  • 4. Modes of operation
  • 6. Limitation of IPsec Need for IPSEC...IP Packets have no inherent security. It is Relatively easy to forge the addresses of IP packets, modify the contents of ip packets, replay old packets, and inspect the contents of Ip packets in transit. Therefore there is no guarantee that IP datagrams received are From the claimed senderThat they contain the original data that the sender placed in themThat the original data was not inspected by a third party while the packet was being sent from source to destination. IPSec is a method of protecting IP datagrams. It provides a standard , robust, extensible mechanism in which to provide security to IP and upper-layer protocols.introductionIPSecurity (IPSec) is a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.
  • 7. In common structure of any security protocols , we need to know which algorithm is used for authentication and encryption/decryption.Common structure of security protocols
  • 8. Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
  • 9. It is implemented in NETWORK layer.TCp/ip protocol suite and IPSec
  • 10. general IP Security mechanisms provides
  • 14. applicable to use over LANs, across public & private WANs, & for the InternetIPSEC uses
  • 15. Benefits of ipsecin a firewall/router provides strong security to all traffic crossing the perimeter
  • 17. is below transport layer, hence transparent to applications
  • 18. can be transparent to end users
  • 19. can provide security for individual users if desired
  • 20. additionally in routing applications:
  • 21. assure that router advertisments come from authorized routers
  • 22. neighbor advertisments come from authorized routers
  • 23. insure redirect messages come from the router to which initial packet was sent
  • 24. insure no forging of router updatesIpsec servicesAccess control
  • 28. a form of partial sequence integrity
  • 30. Limited traffic flow confidentiality Modes of operationIPsec can be implemented in a two modes:-Host-to-host transport modeNetwork tunnel mode.
  • 31. transport modeTransport mode provides secure connection between two end-points because only the payload (the data you transfer) of the IP packet is usually encrypted and/or authenticated.
  • 32. IPsec in transport mode does not protect Ipheader.It protects what is delivered from the transport layer to the network layer.
  • 33. In this mode,theIpsec header and tailer are added to the information coming from the transport layer.The IP header is added later.
  • 34. It’s simply a secured IP connection. transport mode in action
  • 35. Tunnel modeTunnel Mode encapsulates the entire IP packet to provide a virtual "secure hop" between two gateways.Thus it protects the entire IP packet.
  • 36. Tunnel mode is used when either the sender or the receiver is not a host.
  • 37. Tunnel mode is more typically used between gateways (routers, firewalls, or standalone VPN devices) to provide a Virtual Private Network (VPN).A secure tunnel is created across an untrusted internet. Tunnel mode in action
  • 38. security ASSOCIATIONdefined by 3 parameters:
  • 43. could one-way relationship between sender & receiver that affords security for traffic flow
  • 44. d be end user, firewall, router
  • 46. indicates if SA is AH or ESP
  • 47. has a number of other parameters
  • 48. seq no, AH & EH info, lifetime etc
  • 49. have a database of Security AssociationsTwo protocols are used to provide security:AUTHENTICATION HEADER PROTOCOLS (AH)
  • 50. ENCAPSULATION SECURITY PAYLOAD (ESP)Authentication header protocol(ah)AH protocol is designed to authenticate the source host, to ensure integrity all or part of the contents of a datagram carried in the IP packet and to guard against replay by attackers.
  • 51. It uses a hash function and a symmetric key to create message authentication code.
  • 52. It can be considered analogous to the algorithms used to calculate checksums or perform CRC checks for error detection.
  • 53. But here AH use a special hashing algorithm and a specific key known only to the source and the destination.AH performs the computation and puts the result (Integrity Check Value or ICV) into a special header with other fields for transmission.
  • 54. The destination device does the same calculation using the key the two devices share, which enables it to see immediately if any of the fields in the original datagram were modified (either due to error).
  • 55. ICV does not change the original data.
  • 56. Thus the presence of the AH header allows us to verify the integrity of the message, but doesn't encrypt it. Thus, AH provides authentication but not privacy .AH protocol can be implemented in two mode tunnel mode and transport mode.
  • 57. AH packet is identified by the protocol field of an IPv4 header and the “Next Header” field of an IPv6 header. It’s IP protocol number is 51.AH Protocol in transport mode
  • 58. The addition of an AH follows following steps:An authentication header is added to the payload with the authentication data field set to 0.Padding is added for hashing function to make length even.Hashing is based on the total packet.Those fields of the IP header which do not change during transmission are included in calculation. (authentication data).They are inserted in AH.The IP header is added after the value of the protocol field is changed to 51.
  • 62. ENCAPSULATION SECURITY PAYLOAD (ESP)Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. Encryption makes ESP bit more complicated.
  • 63. ESP provides source authentication, data integrity and privacy(confidentiality) and also provides protection against replay attacks.
  • 64. ESP also supports encryption-only and authentication-only configurations, but using encryption without authentication is strongly discouraged because it is insecure.Like AH ,ESP also operates in two mode of operation:-tunnel mode and transport mode.
  • 65. ESP packet is identified by the protocol field of an IPv4 header and the “Next Header” field of an IPv6 header. It’s IP protocol number is 50.
  • 66. An encryption algorithm combines the data in the datagram with a key to transform it into an encrypted form.Here symmetric encryption algorithm is applied.It means sender and receiver both have same key.ESP protected IP packet
  • 67. The ESP procedure follows following steps:An ESP trailer is added to the payload.The payload and the trailer are encrypted.The ESP header is added.The ESP header,payload and ESP trailer are used to create the authentication data.This data are added after the end of ESP trailer.The IP header is added after the protocol value is changed to 50.
  • 68. ENCAPSULATION SECURITY PAYLOAD (ESP)
  • 69. ESP has several fields that are the same as those used in AH, but packages its fields in a very different way. Instead of having just a header, it divides its fields into three components:
  • 70. ESP Header: This contains two fields, the SPI and Sequence Number, and comes before the encrypted data. Its placement depends on whether ESP is used in transport mode or tunnel mode. ESP Trailer: This section is placed after the encrypted data. It contains padding that is used to align the encrypted data, through a Padding and Pad Length field. Interestingly, it also contains the Next Header field for ESP.
  • 71. ESP Authentication Data: This field contains an Integrity Check Value (ICV), computed in a manner similar to how the AH protocol works, for when ESP's optional authentication feature is used. This field provides authentication services similar to those provided by the Authentication Header(AH).There are two reasons why these fields are broken into pieces like this. Some encryption algorithms require the data to be encrypted to have a certain block size, and so padding must appear after the data and not before it. That's why padding appears in the ESP Trailer. The ESP Authentication Data appears separately because it is used to authenticate the rest of the encrypted datagram after encryption. This means it cannot appear in the ESP Header or ESP Trailer. In ESP IP header is not included in calculation of authentication data but in AH it is included.
  • 72. IPSec services
  • 73. Limitation of IPSecIPsec cannot provide the same end-to-end security as systems working at higher levels.
  • 74. IPsec encrypts packets at a security gateway machine as they leave the sender's site and decrypts them on arrival at the gateway to the recipient's site. This does provide a useful security service -- only encrypted data is passed over the Internet -- but it does not even come close to providing an end-to-end service. In particular, anyone with appropriate privileges on either site's LAN can intercept the message in unencrypted form.IPsec authenticates machines, not users. IPsec uses strong authentication mechanisms to control which messages go to which machines, but it does not have the concept of user ID, which is vital to many other security mechanisms and policies.
  • 75. IPsec does not stop traffic analysis.
  • 76. Ipsec provides encryption without authentication using ESP which is very dangerous.
  • 77. IPsec does not stop denial of service attacks.This attacks aim at causing a system to crash, overload, or become confused so that legitimate users cannot get whatever services the system is supposed to provide. referencesData communications and networking by BehrouzForouzan
  • 78. Computer networks by Andrew Tanenbaum
  • 79. Cryptography and Network Security by William Stallings