SlideShare a Scribd company logo
Nadar Saraswathi college of
Arts and science Theni
Presented by:
S.Swetha
I M.sc(IT)
The Security Layer
Department of CS and iT
Network and internet
security
Index
•
Wireless Transport Layer Security (WTLS)
•
IP Security
•
IPsec Protocols
•
Internet Key Exchange (IKE) Protocol
•
Security Association (SA)
•
Authentication Header (AH)
•
Encapsulating Security Payload (ESP)
•
IPsec key management
Wireless Transport Layer
Security (WTLS)
•
It can be integrated into WAP(Wireless
Application Protocol) architecture on top of
WDP(Wireless Datagram Protocol).
•
It supports Datagram and connection
oriented transport layer protocols.
•
Based on TLS/SSL protocol.It can provide
different levels of security.
•
Privacy
The Security layer
IP Security
What is IP Security
•
Framework of open standards to ensure
secure communications over the Internet
In short: It is the network layer Internet
Security Protocol
IPSEC Service
Internet/
Intranet
IPSec disabled host
Case 1 : Insecure IP Packet
IPSec enabled host
Case 2 : Secure IP Packet
IP
Header
Upper
layer
data
IP
Header
IPSec
Header
Upper
layer
data
IPSec
•
general IP Security mechanisms
•
provides
–
authentication
–
confidentiality
–
key management
•
applicable to use over LANs, across public
& private WANs, & for the Internet
IP sec Application
•
IPSec provides the capability to secure
communications across a LAN, across private
and public WANs, and across the Internet.
–
Secure branch office connectivity over the Internet
–
Secure remote access over the Internet
–
Establishing extranet and intranet connectivity with partners
–
Enhancing electronic commerce security
Security Associations
•
One of the most important concepts in IPSec is called a
Security Association (SA). Defined in RFC 1825.
•
SAs are the combination of a given Security Parameter
Index (SPI) and Destination Address.
•
SAs are one way. A minimum of two SAs are required
for a single IPSec connection.
•
SAs contain parameters including:
–
Authentication algorithm and algorithm mode
–
Encryption algorithm and algorithm mode
–
Key(s) used with the authentication/encryption algorithm(s)
–
Lifetime of the key
–
Lifetime of the SA
–
Source Address(es) of the SA
–
Sensitivity level (ie Secret or Unclassified)
IP security scenario
scenario of IPSec usage
•
An organization maintains LANs at dispersed
locations
•
Non secure IP traffic is conducted on each LAN.
•
IPSec protocols are used
•
These protocols operate in networking devices
that connect each LAN to the outside world.
(router, firewall )
•
The IPSec networking device will typically
encrypt and compress all traffic going into the
WAN, and decrypt and decompress traffic
coming from the WAN
Why not use IPSec?
•
Processor overhead to encrypt & verify
each packet can be great.
•
Added complexity in network design.
Benefits of IPSec
•
in a firewall/router provides strong security
to all traffic crossing the perimeter
•
in a firewall/router is resistant to bypass
•
is below transport layer, hence transparent
to applications
•
can be transparent to end users
•
can provide security for individual users
•
secures routing architecture
IPsec
Network Layer Security
•
IP security (IPsec)
–
Two protocols
•
Authentication protocol, using an Authentication Header (AH)
•
Encryption/authentication protocol, called the Encapsulating
Security Payload (ESP)
–
Two modes of operation
•
Transport mode: provides protection for upper-layer
protocols
•
Tunnel mode: protects the entire IP datagram
IPSec protocols – AH protocol
•
AH - Authentication Header
–
Defined in RFC 1826
–
Integrity: Yes, including IP header
–
Authentication: Yes
–
Non-repudiation: Depends on cryptography algorithm.
–
Encryption: No
–
Replay Protection: Yes
IP Header AH Header Payload (TCP, UDP, etc)
IP Header AH Header Payload (TCP. UDP,etc)
IP Header
Transport Packet layout
Tunnel Packet layout
IPSec protocols – ESP protocol
•
ESP – Encapsulating Security Payload
–
Defined in RFC 1827
–
Integrity: Yes
–
Authentication: Depends on cryptography algorithm.
–
Non-repudiation: No
–
Encryption: Yes
–
Replay Protection: Yes
IP Header ESP Header Payload (TCP, UDP, etc)
IP Header ESP Header Payload (TCP. UDP,etc)
IP Header
Transport Packet layout
Tunnel Packet layout
Unencrypted Encrypted
What protocol to use?
•
Differences between AH and ESP:
–
ESP provides encryption, AH does not.
–
AH provides integrity of the IP header, ESP does not.
–
AH can provide non-repudiation. ESP does not.
•
However, we don’t have to choose since both
protocols can be used in together.
•
Why have two protocols?
–
Some countries have strict laws on encryption. If you
can’t use encryption in those countries, AH still
provides good security mechanisms. Two protocols
ensures wide acceptance of IPSec on the Internet.
Data Integrity and Confidentiality
Basic difference between AH and ESP
IPSec Protocols (cont)
Algorithms Used:
Encryption:
Symmetric – As IP packets may arrive out of order and
Asymmetric algorithms are incredible slow.
E.g. DES (Data Encryption Standard)

Authentication:
MAC (Message Authentication Codes) based on symmetric
encryption algorithms.
One way hash functions. (MD5 or SHA-1)
Transport Versus Tunnel Mode
Transport Mode:
•
Used for Peer to Peer communication security
•
Data is encrypted
Tunnel Mode:
•
Used for site-to-site communication security
•
Entire packet is encrypted.
Transport versus Tunnel mode
(cont)
Transport mode is used when the cryptographic endpoints are also the
communication endpoints of the secured IP packets.
Cryptographic endpoints: The entities that generate / process an IPSec header
(AH or ESP)
Communication endpoints: Source and Destination of an IP packet
Transport versus Tunnel mode
(cont)
Tunnel mode is used when at least one cryptographic endpoint is not a
communication endpoint of the secured IP packets.
Outer IP Header – Destination for the router.
Inner IP Header – Ultimate Destination
Transport Mode
Tunneling Mode
How IPSec works: Phase 1
•
Internet Key Exchange (IKE) is used to setup
IPSec.
•
IKE Phase 1:
–
Establishes a secure, authenticated channel between the two
computers
–
Authenticates and protects the identities of the peers
–
Negotiates what SA policy to use
–
Performs an authenticated shared secret keys exchange
–
Sets up a secure tunnel for phase 2
–
Two modes: Main mode or Aggressive mode
•
Main Mode IKE
.1
Negotiate algorithms & hashes.
.2
Generate shared secret keys using a Diffie-Hillman exchange.
.3
Verification of Identities.
•
Aggressive Mode IKE
–
Squeezes all negotiation, key exchange, etc. into less packets.
–
Advantage: Less network traffic & faster than main mode.
How IPSec works: Phase 2
–
An AH or ESP packet is then sent using the agreed
upon “main” SA during the IKE phase 1.
–
IKE Phase 2
•
Negotiates IPSec SA parameters
•
Establishes IPSec security associations for specific
connections (like FTP, telnet, etc)
•
Renegotiates IPSec SAs periodically
•
Optionally performs an additional Diffie-Hellman exchange
How IPSec works: Communication
•
Once Phase 2 has established an SA for a
particular connection, all traffic on that
connection is communicated using the SA.
•
IKE Phase 1 exchange uses UDP Port 500.
•
AH uses IP protocol 51.
•
ESP uses IP protocol 50.
Key Management

More Related Content

PPTX
Network security
PDF
IP security and VPN presentation
PDF
Chapter 10 wireless hacking [compatibility mode]
PPTX
Practical Security with MQTT and Mosquitto
PPTX
IPSec | Computer Network
PPTX
Wired equivalent privacy (wep)
PPT
Network security
IP security and VPN presentation
Chapter 10 wireless hacking [compatibility mode]
Practical Security with MQTT and Mosquitto
IPSec | Computer Network
Wired equivalent privacy (wep)

What's hot (18)

PPTX
PPT
PDF
Cracking WEP Secured Wireless Networks
PPTX
802.11 Wireless, WEP, WPA lecture
PPT
WEP
PPT
Ip sec and ssl
PPTX
IPSec VPN & IPSec Protocols
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
PPT
IP security Part 1
 
PPTX
IP security
PPTX
IPsec vpn
PPT
Ip security
PDF
8 Authentication Security Protocols
PPT
Overview of ip_security by JetArvind kumar Madhukar
PPTX
IP Sec - Basic Concepts
ODP
Wifi Security, or Descending into Depression and Drink
PPTX
Wi Fi Security
Cracking WEP Secured Wireless Networks
802.11 Wireless, WEP, WPA lecture
WEP
Ip sec and ssl
IPSec VPN & IPSec Protocols
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
IP security Part 1
 
IP security
IPsec vpn
Ip security
8 Authentication Security Protocols
Overview of ip_security by JetArvind kumar Madhukar
IP Sec - Basic Concepts
Wifi Security, or Descending into Depression and Drink
Wi Fi Security
Ad

Similar to The Security layer (20)

PPTX
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
PPTX
PPTX
IPSec and VPN
PPTX
I psecurity
PDF
IP Security
PDF
BAIT1103 Chapter 6
PPTX
IP SEC.ptx
PDF
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
PPTX
EOC MODULE 3 IP security - SR.pptx engineering college
PPTX
IP Security
PPTX
IP Security
PPTX
ip security
PPTX
Ip Security.pptx
PPT
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PDF
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
PDF
IP Security
PPTX
Ip security
PPTX
CNS UNIT-VI.pptx
PPTX
Ipsecurity
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
IPSec and VPN
I psecurity
IP Security
BAIT1103 Chapter 6
IP SEC.ptx
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
EOC MODULE 3 IP security - SR.pptx engineering college
IP Security
IP Security
ip security
Ip Security.pptx
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
IP Security
Ip security
CNS UNIT-VI.pptx
Ipsecurity
Ad

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Insiders guide to clinical Medicine.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Pre independence Education in Inndia.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
Anesthesia in Laparoscopic Surgery in India
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Cell Structure & Organelles in detailed.
STATICS OF THE RIGID BODIES Hibbelers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Cell Types and Its function , kingdom of life
GDM (1) (1).pptx small presentation for students
Insiders guide to clinical Medicine.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Microbial diseases, their pathogenesis and prophylaxis
O7-L3 Supply Chain Operations - ICLT Program
Pre independence Education in Inndia.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial disease of the cardiovascular and lymphatic systems

The Security layer

  • 1. Nadar Saraswathi college of Arts and science Theni Presented by: S.Swetha I M.sc(IT) The Security Layer Department of CS and iT
  • 3. Index • Wireless Transport Layer Security (WTLS) • IP Security • IPsec Protocols • Internet Key Exchange (IKE) Protocol • Security Association (SA) • Authentication Header (AH) • Encapsulating Security Payload (ESP) • IPsec key management
  • 4. Wireless Transport Layer Security (WTLS) • It can be integrated into WAP(Wireless Application Protocol) architecture on top of WDP(Wireless Datagram Protocol). • It supports Datagram and connection oriented transport layer protocols. • Based on TLS/SSL protocol.It can provide different levels of security. • Privacy
  • 7. What is IP Security • Framework of open standards to ensure secure communications over the Internet In short: It is the network layer Internet Security Protocol
  • 8. IPSEC Service Internet/ Intranet IPSec disabled host Case 1 : Insecure IP Packet IPSec enabled host Case 2 : Secure IP Packet IP Header Upper layer data IP Header IPSec Header Upper layer data
  • 9. IPSec • general IP Security mechanisms • provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet
  • 10. IP sec Application • IPSec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. – Secure branch office connectivity over the Internet – Secure remote access over the Internet – Establishing extranet and intranet connectivity with partners – Enhancing electronic commerce security
  • 11. Security Associations • One of the most important concepts in IPSec is called a Security Association (SA). Defined in RFC 1825. • SAs are the combination of a given Security Parameter Index (SPI) and Destination Address. • SAs are one way. A minimum of two SAs are required for a single IPSec connection. • SAs contain parameters including: – Authentication algorithm and algorithm mode – Encryption algorithm and algorithm mode – Key(s) used with the authentication/encryption algorithm(s) – Lifetime of the key – Lifetime of the SA – Source Address(es) of the SA – Sensitivity level (ie Secret or Unclassified)
  • 13. scenario of IPSec usage • An organization maintains LANs at dispersed locations • Non secure IP traffic is conducted on each LAN. • IPSec protocols are used • These protocols operate in networking devices that connect each LAN to the outside world. (router, firewall ) • The IPSec networking device will typically encrypt and compress all traffic going into the WAN, and decrypt and decompress traffic coming from the WAN
  • 14. Why not use IPSec? • Processor overhead to encrypt & verify each packet can be great. • Added complexity in network design.
  • 15. Benefits of IPSec • in a firewall/router provides strong security to all traffic crossing the perimeter • in a firewall/router is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users • can provide security for individual users • secures routing architecture
  • 16. IPsec
  • 17. Network Layer Security • IP security (IPsec) – Two protocols • Authentication protocol, using an Authentication Header (AH) • Encryption/authentication protocol, called the Encapsulating Security Payload (ESP) – Two modes of operation • Transport mode: provides protection for upper-layer protocols • Tunnel mode: protects the entire IP datagram
  • 18. IPSec protocols – AH protocol • AH - Authentication Header – Defined in RFC 1826 – Integrity: Yes, including IP header – Authentication: Yes – Non-repudiation: Depends on cryptography algorithm. – Encryption: No – Replay Protection: Yes IP Header AH Header Payload (TCP, UDP, etc) IP Header AH Header Payload (TCP. UDP,etc) IP Header Transport Packet layout Tunnel Packet layout
  • 19. IPSec protocols – ESP protocol • ESP – Encapsulating Security Payload – Defined in RFC 1827 – Integrity: Yes – Authentication: Depends on cryptography algorithm. – Non-repudiation: No – Encryption: Yes – Replay Protection: Yes IP Header ESP Header Payload (TCP, UDP, etc) IP Header ESP Header Payload (TCP. UDP,etc) IP Header Transport Packet layout Tunnel Packet layout Unencrypted Encrypted
  • 20. What protocol to use? • Differences between AH and ESP: – ESP provides encryption, AH does not. – AH provides integrity of the IP header, ESP does not. – AH can provide non-repudiation. ESP does not. • However, we don’t have to choose since both protocols can be used in together. • Why have two protocols? – Some countries have strict laws on encryption. If you can’t use encryption in those countries, AH still provides good security mechanisms. Two protocols ensures wide acceptance of IPSec on the Internet.
  • 21. Data Integrity and Confidentiality Basic difference between AH and ESP
  • 22. IPSec Protocols (cont) Algorithms Used: Encryption: Symmetric – As IP packets may arrive out of order and Asymmetric algorithms are incredible slow. E.g. DES (Data Encryption Standard)  Authentication: MAC (Message Authentication Codes) based on symmetric encryption algorithms. One way hash functions. (MD5 or SHA-1)
  • 23. Transport Versus Tunnel Mode Transport Mode: • Used for Peer to Peer communication security • Data is encrypted Tunnel Mode: • Used for site-to-site communication security • Entire packet is encrypted.
  • 24. Transport versus Tunnel mode (cont) Transport mode is used when the cryptographic endpoints are also the communication endpoints of the secured IP packets. Cryptographic endpoints: The entities that generate / process an IPSec header (AH or ESP) Communication endpoints: Source and Destination of an IP packet
  • 25. Transport versus Tunnel mode (cont) Tunnel mode is used when at least one cryptographic endpoint is not a communication endpoint of the secured IP packets. Outer IP Header – Destination for the router. Inner IP Header – Ultimate Destination
  • 27. How IPSec works: Phase 1 • Internet Key Exchange (IKE) is used to setup IPSec. • IKE Phase 1: – Establishes a secure, authenticated channel between the two computers – Authenticates and protects the identities of the peers – Negotiates what SA policy to use – Performs an authenticated shared secret keys exchange – Sets up a secure tunnel for phase 2 – Two modes: Main mode or Aggressive mode • Main Mode IKE .1 Negotiate algorithms & hashes. .2 Generate shared secret keys using a Diffie-Hillman exchange. .3 Verification of Identities. • Aggressive Mode IKE – Squeezes all negotiation, key exchange, etc. into less packets. – Advantage: Less network traffic & faster than main mode.
  • 28. How IPSec works: Phase 2 – An AH or ESP packet is then sent using the agreed upon “main” SA during the IKE phase 1. – IKE Phase 2 • Negotiates IPSec SA parameters • Establishes IPSec security associations for specific connections (like FTP, telnet, etc) • Renegotiates IPSec SAs periodically • Optionally performs an additional Diffie-Hellman exchange
  • 29. How IPSec works: Communication • Once Phase 2 has established an SA for a particular connection, all traffic on that connection is communicated using the SA. • IKE Phase 1 exchange uses UDP Port 500. • AH uses IP protocol 51. • ESP uses IP protocol 50.