SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
10-Dec-16 1
Ambo University
Institute of Technology
Gradute program in Computer Science
IP SECURITY
Presented By:
Dejene Techane
In today's massively interconnected business world of the Internet, intranets, branch offices, and
remote access, sensitive information constantly crosses the networks.
Without security, both public and private networks are susceptible to unauthorized monitoring
and access.
Therefore, there are different network security protocols widespread use for protecting private
and public networks such as
 IP Security(IPSec),
 Transport Layer Security(TLS)
 and Secure Shell(SSH) .
Hence, only IPsec protects all application traffic over an IP network.
10-Dec-16 2
IP security refers to security mechanism implemented at the IP
(Internet Protocol) Layer to ensure
integrity,
authentication and
 confidentiality of data during transmission in the open Internet environment
It is a protocol suite for secure IP communications that works by
Authenticating
And encrypting each IP packet of a communication session.
10-Dec-16 3
IPSec is a set of protocol and algorithm used to secure IP
data and network layer
Open standard for VPN implementation
Inbuilt in IPV6 and compatible with IPV4
10-Dec-16 4
to verify sources of IP packets
authentication
to prevent replaying of old packets
to protect integrity and/or confidentiality of packets
data Integrity/Data Encryption
10-Dec-16 5
10-Dec-16 6
ESP AH
IKE
IPSec Security Policy
Encapsulating Security
Payload
Authentication Header
The Internet Key Exchange
 Architecture: Covers the general concepts, security requirements, definitions and
mechanisms defining IPsec technology.
Provides source authentication
Protects against source spoofing
Provides connectionless data integrity
Protects against replay attacks
Use monotonically increasing sequence numbers
Protects against denial of service attacks
NO protection for confidentiality!
10-Dec-16 7
Use 32-bit monotonically increasing sequence number to avoid replay
attacks
Use cryptographically strong hash algorithms to protect data integrity
(96-bit)
Use symmetric key cryptography
HMAC-SHA-96, HMAC-MD5-96
10-Dec-16 8
10-Dec-16 9
Authentication Data
Sequence Number
Security Parameters Index (SPI)
Next
header
Payload
length
Reserved
Old IP header (only in Tunnel mode)
TCP header
New IP header
Authenticated
Data
Encapsulated
TCP or IP packet
Hash of everything
else
Provides all that AH offers, and
in addition provides data confidentiality
Uses symmetric key encryption
Same as AH:
◦ Use 32-bit sequence number to counter replaying attacks
◦ Use integrity check algorithms
Only in ESP:
◦ Data confidentiality:
◦ Uses symmetric key encryption algorithms to encrypt packets
10-Dec-16 10
10-Dec-16 11
Authentication Data
Sequence Number
Security Parameters Index (SPI)
Next
header
Payload
length
Reserved
TCP header
Authenticated
IP header
Initialization vector
Data
Pad Pad length Next
Encrypted TCP
packet
10-Dec-16 12
 Bothe AH and ESP support transport and Tunnel modes
Transport Mode SA Tunnel Mode SA
AH Authenticates IP payload
and selected portions of IP
header and IPv6 extension
headers
Authenticates entire inner
IP packet plus selected
portions of outer IP header
ESP Encrypts IP payload and
any IPv6 extension header
Encrypts inner IP packet
ESP with
Authentication
Encrypts IP payload and
any IPv6 extension header
Authenticates IP payload
but no IP header
Encrypts inner IP packet
Authenticates inner IP
packet
 The key management portion of IPSec involves
 the determination and distribution of the secret keys.
 A typical requirement is four keys for communication between
two applications:
 transmit and receive pairs for both AH and ESP
 Support for two types of key management
 Manual
 Authomatic
10-Dec-16 13
10-Dec-16 14
SA describes a particular kind of secure connection between
one device and another.
Security Associations are key to IPSEC’s authentication and
confidentiality mechanisms.
SAs are needed to negotiate in the exchange of the “shared
secret” process
 Sharing the shared key secrete
uniquely identified by three parameters:
Security Parameters Index (SPI): The SPI assigns a bit string to this SA that has
local significance only.
 The SPI is carried in AH and ESP headers to enable the receiving system to select the
SA under which a received packet will be processed.
IP destination address : Currently, only unicast addresses are allowed; this is the
address of the destination endpoint of the SA, which may be an end-user system or
a network system such as a firewall or router.
Security protocol identifier : This indicates whether the association is an AH or
ESP security association.
10-Dec-16 15
Provides strong security when implemented in a firewall or router
that can be applied to all traffic crossing the perimeter.
IPsec is resistant to bypass if all traffic from the outside must use
IP and the firewall is the only way of entrance from the Internet into
the organization.
 Is below transport layer, hence transparent to applications.
Can be transparent to end users.
Can provide security for individual users if needed.
10-Dec-16 16
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishment of extranet and intranet connectivity with partners
Enhancement of electronic commerce security
10-Dec-16 17
IP Security importance is growing, but unfortunately its operation
imposes a significant burden on the encrypting devices. Furthermore,
certain applications may suffer from the increase in latency (i.e., the
time required to pass through an IPSec network device) due to the
extra processing.
Finally, at a time when network security is increasingly vital, IPSec
makes it easy for network managers to provide a strong layer of
protection to their organization's information resources.
10-Dec-16 18
10-Dec-16 19

Contenu connexe

Tendances (20)

Email security
Email securityEmail security
Email security
 
S/MIME
S/MIMES/MIME
S/MIME
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
IPsec
IPsecIPsec
IPsec
 
IP Security
IP SecurityIP Security
IP Security
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Ipsec
IpsecIpsec
Ipsec
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
IP Security
IP SecurityIP Security
IP Security
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Ip security
Ip security Ip security
Ip security
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Kerberos
KerberosKerberos
Kerberos
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
IP security
IP securityIP security
IP security
 

En vedette

Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 

En vedette (6)

Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
ip security
ip securityip security
ip security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Similaire à IP Security

Similaire à IP Security (20)

Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Ip security
Ip security Ip security
Ip security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Ip sec
Ip secIp sec
Ip sec
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
Unit 6
Unit 6Unit 6
Unit 6
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Unit 5
Unit 5Unit 5
Unit 5
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
ip.ppt
ip.pptip.ppt
ip.ppt
 
[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payload
 

Plus de Ambo University

Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Networked user interface
Networked user interfaceNetworked user interface
Networked user interfaceAmbo University
 
Networked user interface
Networked user interfaceNetworked user interface
Networked user interfaceAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java ProgrammingAmbo University
 

Plus de Ambo University (10)

Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Networked user interface
Networked user interfaceNetworked user interface
Networked user interface
 
Networked user interface
Networked user interfaceNetworked user interface
Networked user interface
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 
Advanced Java Programming
Advanced Java ProgrammingAdvanced Java Programming
Advanced Java Programming
 

Dernier

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Dernier (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

IP Security

  • 1. 10-Dec-16 1 Ambo University Institute of Technology Gradute program in Computer Science IP SECURITY Presented By: Dejene Techane
  • 2. In today's massively interconnected business world of the Internet, intranets, branch offices, and remote access, sensitive information constantly crosses the networks. Without security, both public and private networks are susceptible to unauthorized monitoring and access. Therefore, there are different network security protocols widespread use for protecting private and public networks such as  IP Security(IPSec),  Transport Layer Security(TLS)  and Secure Shell(SSH) . Hence, only IPsec protects all application traffic over an IP network. 10-Dec-16 2
  • 3. IP security refers to security mechanism implemented at the IP (Internet Protocol) Layer to ensure integrity, authentication and  confidentiality of data during transmission in the open Internet environment It is a protocol suite for secure IP communications that works by Authenticating And encrypting each IP packet of a communication session. 10-Dec-16 3
  • 4. IPSec is a set of protocol and algorithm used to secure IP data and network layer Open standard for VPN implementation Inbuilt in IPV6 and compatible with IPV4 10-Dec-16 4
  • 5. to verify sources of IP packets authentication to prevent replaying of old packets to protect integrity and/or confidentiality of packets data Integrity/Data Encryption 10-Dec-16 5
  • 6. 10-Dec-16 6 ESP AH IKE IPSec Security Policy Encapsulating Security Payload Authentication Header The Internet Key Exchange  Architecture: Covers the general concepts, security requirements, definitions and mechanisms defining IPsec technology.
  • 7. Provides source authentication Protects against source spoofing Provides connectionless data integrity Protects against replay attacks Use monotonically increasing sequence numbers Protects against denial of service attacks NO protection for confidentiality! 10-Dec-16 7
  • 8. Use 32-bit monotonically increasing sequence number to avoid replay attacks Use cryptographically strong hash algorithms to protect data integrity (96-bit) Use symmetric key cryptography HMAC-SHA-96, HMAC-MD5-96 10-Dec-16 8
  • 9. 10-Dec-16 9 Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved Old IP header (only in Tunnel mode) TCP header New IP header Authenticated Data Encapsulated TCP or IP packet Hash of everything else
  • 10. Provides all that AH offers, and in addition provides data confidentiality Uses symmetric key encryption Same as AH: ◦ Use 32-bit sequence number to counter replaying attacks ◦ Use integrity check algorithms Only in ESP: ◦ Data confidentiality: ◦ Uses symmetric key encryption algorithms to encrypt packets 10-Dec-16 10
  • 11. 10-Dec-16 11 Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved TCP header Authenticated IP header Initialization vector Data Pad Pad length Next Encrypted TCP packet
  • 12. 10-Dec-16 12  Bothe AH and ESP support transport and Tunnel modes Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload and any IPv6 extension header Encrypts inner IP packet ESP with Authentication Encrypts IP payload and any IPv6 extension header Authenticates IP payload but no IP header Encrypts inner IP packet Authenticates inner IP packet
  • 13.  The key management portion of IPSec involves  the determination and distribution of the secret keys.  A typical requirement is four keys for communication between two applications:  transmit and receive pairs for both AH and ESP  Support for two types of key management  Manual  Authomatic 10-Dec-16 13
  • 14. 10-Dec-16 14 SA describes a particular kind of secure connection between one device and another. Security Associations are key to IPSEC’s authentication and confidentiality mechanisms. SAs are needed to negotiate in the exchange of the “shared secret” process  Sharing the shared key secrete
  • 15. uniquely identified by three parameters: Security Parameters Index (SPI): The SPI assigns a bit string to this SA that has local significance only.  The SPI is carried in AH and ESP headers to enable the receiving system to select the SA under which a received packet will be processed. IP destination address : Currently, only unicast addresses are allowed; this is the address of the destination endpoint of the SA, which may be an end-user system or a network system such as a firewall or router. Security protocol identifier : This indicates whether the association is an AH or ESP security association. 10-Dec-16 15
  • 16. Provides strong security when implemented in a firewall or router that can be applied to all traffic crossing the perimeter. IPsec is resistant to bypass if all traffic from the outside must use IP and the firewall is the only way of entrance from the Internet into the organization.  Is below transport layer, hence transparent to applications. Can be transparent to end users. Can provide security for individual users if needed. 10-Dec-16 16
  • 17. Secure branch office connectivity over the Internet Secure remote access over the Internet Establishment of extranet and intranet connectivity with partners Enhancement of electronic commerce security 10-Dec-16 17
  • 18. IP Security importance is growing, but unfortunately its operation imposes a significant burden on the encrypting devices. Furthermore, certain applications may suffer from the increase in latency (i.e., the time required to pass through an IPSec network device) due to the extra processing. Finally, at a time when network security is increasingly vital, IPSec makes it easy for network managers to provide a strong layer of protection to their organization's information resources. 10-Dec-16 18