Académique Documents
Professionnel Documents
Culture Documents
Fundamentals of Encryption
IPSec
IPv6-GCAs
PGP
SSL/TLS
Lower Layers
...
Problem:
2
Wide-Area Scenarios
Secrecy of information
Protection of infrastructure
...
Basis: Encryption
Gain security objectives in public networks by encryption
983492342342734
key
Ottos Mops ..
plain text
234539834922734
key
KJSIJHASJDHK
secure text
Ottos Mops ..
plain text
Symmetric Encryption
Example: DES
Private key method
Classical, high performance
Key exchange at runtime
Needed: exchange of
initial seed (out of band)
Problem:
No method for signature
Authentication:
Challenge-Response-Scheme
6
Asymmetric Encryption
RSA-Algorithm
Public key method
(Diffie/Hellman 1976)
Calculations numerically
m:
e:
Permits sender authentication d:
7
(m**e)**d mod n = m
message to send
Encryptor (public key)
Decryptor (private key)
Diffie-Hellmann Algorithm
Let p be a sufficiently large prime,
The strength of the algorithm relies on the secrets a and b, which are discrete
logarithms mod p
Layers of Encryption
Layer 7: Application encryption
Process/
Application
Transport
Network
Link
Bit transfer
10
Application Layer
Example: Pretty Good Privacy (Mail)
Advantage:
serves
all purposes
Inter-application
application
security model
specifically optimized
Disadvantage:
Communication
Needs
11
Disadvantage:
13
Example: SSL/TLS
14
Line Encryption (L 1)
Example: Transmission-Scrambling, WEP
Advantage:
completely transparent
Disadvantage:
15
Example: WEP
Protocol for encrypting wireless transmission between Access Point and
Stations.
Private key based: AP & STA hold pre-shared secret.
Fixed length: 40 or 104 bits
Static: no key exchange, except by reconfiguration
Advantage:
Disadvantage:
17
18
19
transport transparent
Disadvantage:
20
What is IPSec?
A security architecture
Header (AH)
Concepts of IPSec
internet
intranet
End-to-end concept
22
Joes
PC
HR Server
23
Router A
Insecure Channel
24
Destination Address
205.49.54.237
7A390BC1
AH, HMAC-MD5
IPSec Transform
25
Key
7572CA49F7632946
Additional SA Attributes
(e.g. lifetime)
Data
Transport Mode
IP HDR
AH
Data
Tunnel Mode
New IP HDR
AH
IP HDR
Data
Authentication header is
27
Next Payload
Header Length RESERVED
Security Parameter Index (SPI)
Sequence Number Field
Authentication Data
Data
Transport Mode
IP HDR
ESP HDR
Data
ESP
ESP
Trailer Auth
Encrypted
Authenticated
Tunnel Mode
ESP HDR
IP HDR
Data
Encrypted
Authenticated
28
ESP ESP
Trailer Auth
29
Initialization Vector
Payload Data
Padding (If Any)
Pad
Length
Authentication Data
Next
Header
Encryption Methods
30
31
Operation of IPSec
Notable Traffic?
IKE Negociation
IPSec Negociation
Tunnel Construction
IKE
IPSec
Data
32
IKE Initiation of a SA
SA Request IPSec (triggered by ACL)
Fred
Wilma
IKE SA Offer - des, sha, rsa sig, D-H group 1, lifetime
Policy Match accept offer
ISAKMP
Phase 1
Oakley Main
Mode
In the Clear
33
Protected
Wilma
34
Protected
by the
IKE SA
Example 2: Cryptographically
Generated Addresses (IPv6)
Problem: In IP infrastructure protocols the sender of a
message frequently has to prove its ownership of address to
a receiver, it never met before. Authentication between
unknown partners normally requires a public key
infrastructure.
Cryptographically Generated Addresses (CGAs) are source
addresses formed from the public key (RFC 3972).
This mechanism allows the authentication of senders
address and the signing of data without a PKI.
Most important uses: SEND (RFC 3971), OMIPv6 (IEdraft)
35
CGA Encapsulation
36
37
1.
2.
3.
4.
CGA Decapsulation
38
39
1.
2.
3.
4.
Summary
Security
Final
The
There
40
References
William Stallings: Cryptography and Network Security, 3rd Ed., Prentice
Hall, 2003.
John Edney, William A. Arbaugh: Real 802.11 Security, Addison-Wesley,
2004.
Hans Delfs, Hartmut Knebl: Introduction to Cryptography, Springer, 2002.
Claudia Eckert: IT Sicherheit, 4th Ed., Oldenbourg Verlag, 2006.
Internet Standards at: www.rfc-editor.org.
41