SlideShare a Scribd company logo
1 of 29
A Technical Comparison of IPSec
            and SSL
   Computer and Network Security Course
               IUG of Gaza
             March 26th, 2013
Islamic University of Gaza
         Faculty of Engineering
         Computer Department
ECOM 6321 :Computer and Network Security

              Prepared by:
     Eng.Nadeer Ataya A. Abu Jrair
              Supervisor:
       Prof. Mohammad A. Mikki
AbdelNasir Alshamsi
Takamichi Saito



            Tokyo University of Technology
Agenda
 Abstract
 Introduction
 IPSec
 SSL (Secure Socket Layer)
 Comparison of IPSec and SSL
 Conclusion
 Questions
 References
Abstract
IPSec ( IP Security ) and SSL (Secure Socket
  Layer) have been the most robust and most
  potential tools available for securing
  communications over the Internet .

Both IPSec and SSL have advantages and
 shortcomings

Yet no paper has been found comparing the two
 protocols in terms of characteristic and
 functionality .

Our objective is to present an analysis of security
Introduction
 Securing data over the network is hard and complicated
  issue while the threat of data modification and data
  interruption is rising .

 The goal of network security is to provide confidentiality
  integrity and authenticity .
 confidentiality is keeping the data secret from the
  unintended listeners on the network .

 Integrity is ensuring that the received data is the data was
  actually sent.

 Authenticity is proving the identity of the endpoint to
  ensure that the endpoint is the intended entity to
  communicate with.
Introduction
 Using both strong authentication and encryption
  algorithm protects the data but it will decrease the
  transmission rate and could induce CPU
  consumption.

 With the recent development of the security tools so
  many protocols and powerful tools have been
  proposed but the most famous secure and widely
  deployed are IPSec IP Security and SSL Secure
  Socket Layer.

 In this paper we will provide a technical comparison of
  IPSec and SSL the similarities and the differences of
  the cryptographic properties
IPSec
 IPSec :is an IP layer protocol that enables the
 sending and receiving of cryptographically
 protected packets of any kind ( TCP, UDP, ICMP
 , etc )without any modification.

 IPSec provides two kinds of cryptographic
 services Based on necessity IPSec can provide
 confidentiality and authenticity or it can provide
 authenticity only

 ESP (Encapsulated Security Payload) .
 AH (Authentication Header) .
IPSec
 ESP header
  includes the necessary information for decrypting
 and authenticating the data where

 AH header
  includes the necessary information required for
 authenticating the protected data.
IPSec
Establishing IPSec connection requires two phases
 :
   Phase 1 :
          has two modes Main Mode and Aggressive Mode.
          The differences between these two modes are the number
           of messages exchanged and the ID protection.
          Psk (Phase-shift keying).
   Phase 2 :
          has one mode Quick Mod.
SSL (Secure Socket Layer)
 SSL : is an Application layer protocol.


 SSL is mostly utilized to protect HTTP
 transactions , and has been used for other
 purposes like IMAP and POP ,etc .
   Internet message Access Protocol (IMAP), Post
   Office Protocol (POP).


 SSL is compatible with applications running only
 over TCP, but some modifications are required for
 the applications to run over SSL.
SSL (Secure Socket Layer)
 SSL is composed of the following protocols


     Handshake protocol.
     Change Cipher Spec protocol.
      Alert protocol.
     Application Data protocol.
SSL (Secure Socket Layer)
 Handshake protocol is used to perform
 authentication and key exchanges.

 Change Cipher Spec protocol is used to indicate
 that the chosen keys will now be used.

 Alert protocol is used for signaling errors and
 session closure.

 Application Data protocol transmits and receives
 encrypted data.
Comparison of IPSec and SSL
1.   Authentication Algorithm
     IPSec supports the use of Digital Signature and
     the use of a Secret Key Algorithm .
    SSL supports only the use of Digital Signature.

    The use of a random 2048 bit Secret Key is
     considered as strong as any other
     authentication methods
Comparison of IPSec and SSL
2.   Authentication Method

    IPSec supports one type of authentication
     method, as Mutual Authentication .
     SSL supports a various types of authentication
     , as Server Authentication , Client
     Authentication.
Comparison of IPSec and SSL
3.   MAC (Message Authentication Code)

 is used for Authentication the exchanged
  messages after the connection is established .
 The strength of the Hash Algorithm is based on
  the length of the output .
 Hash Length of SSL is Longer than IPSec.
Comparison of IPSec and SSL
4.    Connection Mode

 IPSec has two connection modes
      Tunnel Mode
        This is established between Gateway to Gateway Gateway
         to Host and Host to Host.
        it requires adding a new IP header to the original packet.
      Transport Mode
        Transport Mode is Host to Host connection.
        The data between the two entities are encrypted.


 SSL is one connection per one session type.
Comparison of IPSec and SSL
5.    Cipher List Proposal

 Because IPSec is a two phase protocol, it has a
     unique function called bi-directional .



 SSL is a one direction protocol.
Comparison of IPSec and SSL
6.    Interoperability

 IPSec doesn't integrate well with other IPSec
     vendors.

 Some cases require some modification.


 SSL is trouble free and well integrated.
Comparison of IPSec and SSL
7.    Overhead Size

 One disadvantage of IPSec is the extra size
     added to the original packet.

 SSL needs less overhead than IPSec .
Comparison of IPSec and SSL
8.    Residing Layer

  IPSec resides in the IP layer which allows it to
 work
with the above layers smoothly.

 SSL resides in the Application layer and that is a
     problem for some application to work with SSL.
Comparison of IPSec and SSL
9.   Time of Handshake Process
Comparison of IPSec and SSL
10. Perfect Forward Secrecy


   Both IPSec and SSL use PFS (Perfect Forward
    Secrecy) in their resumption session.
   In the case of IPSec , the main goal for Phase 1
    beside authentication is producing the encryption
    key required to safe guard Phase 2 exchange.
   In the case of SSL, PFS is implemented in the same
    manner as with IPSec when Ephemeral Diffie-
    Hellman is negotiated.
   The protocol allows two users to exchange a secret
    key over an insecure medium without any prior
    secrets.
Comparison of IPSec and SSL
11. Order of Cryptographic Operations


   IPSec encrypts the data first then creates MAC
    for the encrypted data .
   If a modified data were inserted in the middle of
    transaction IPSec would verify the MAC before
    performing any decryption process.
Comparison of IPSec and SSL
11. Order of Cryptographic Operations


   SSL is the opposite it creates the MAC for the
    plaintext first then encrypts the data.
    SSL on the other hand, is obligated to decrypt it
    first then verifies the MAC which could result in
    wasting CPU over decrypting modified packets.
Conclusion
Function                IPSec   SSL
Configuration           Hard    Easy
Client Authentication   Must    Option
Pre-Shared Key          Yes     No
Interoperability        Yes     No
Problem
TCP Application         All     Some
Support
UDP support             Yes     No
Throughput Rate         High    High
Compression Support     Yes     OpenSSL only
Handshake Time          Slow    Fast
Questions
References
1. Sheila Frankel" Demystifying the IPSec Puzzle",
   Artec House Publisher,2001.
2. Eric Rescorla "S SL and TLS Designing and
   Building Secure Systems" , Addison-Wesley ,
   3Rd Printing, Aug ,2001
3. www.freeswan.com
4. www.stunnel.org
Thank you!




     Thank you for your
         attention!

More Related Content

What's hot

IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathanaminpathan11
 
I psec
I psecI psec
I psecnlekh
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164Thivya Devaraj
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Briefopenfly
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShakas Technologies
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
Holistic Security for OpenStack Clouds
Holistic Security for OpenStack CloudsHolistic Security for OpenStack Clouds
Holistic Security for OpenStack CloudsMajor Hayden
 

What's hot (19)

IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
IPSec_VPN_Final_
IPSec_VPN_Final_IPSec_VPN_Final_
IPSec_VPN_Final_
 
I psec
I psecI psec
I psec
 
Thesis presentation 14023164
Thesis presentation 14023164Thesis presentation 14023164
Thesis presentation 14023164
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
I psecurity
I psecurityI psecurity
I psecurity
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security BriefShmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
 
Ip security
Ip security Ip security
Ip security
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Holistic Security for OpenStack Clouds
Holistic Security for OpenStack CloudsHolistic Security for OpenStack Clouds
Holistic Security for OpenStack Clouds
 

Similar to A technical comparison of ip sec and ssl 2005

college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
The Security layer
The Security layerThe Security layer
The Security layerSwetha S
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
Crypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configurationCrypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configurationdborsan
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)chhoup
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverijmnct
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxjithu26327
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 

Similar to A technical comparison of ip sec and ssl 2005 (20)

college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
IPSec
IPSecIPSec
IPSec
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
The Security layer
The Security layerThe Security layer
The Security layer
 
Unit 6
Unit 6Unit 6
Unit 6
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Ip sec
Ip secIp sec
Ip sec
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Crypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configurationCrypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configuration
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Ipsec rbe guide
Ipsec rbe guideIpsec rbe guide
Ipsec rbe guide
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
Unit 6
Unit 6Unit 6
Unit 6
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Matrix
MatrixMatrix
Matrix
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 

Recently uploaded

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

A technical comparison of ip sec and ssl 2005

  • 1. A Technical Comparison of IPSec and SSL Computer and Network Security Course IUG of Gaza March 26th, 2013
  • 2. Islamic University of Gaza Faculty of Engineering Computer Department ECOM 6321 :Computer and Network Security Prepared by: Eng.Nadeer Ataya A. Abu Jrair Supervisor: Prof. Mohammad A. Mikki
  • 3. AbdelNasir Alshamsi Takamichi Saito Tokyo University of Technology
  • 4. Agenda  Abstract  Introduction  IPSec  SSL (Secure Socket Layer)  Comparison of IPSec and SSL  Conclusion  Questions  References
  • 5. Abstract IPSec ( IP Security ) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet . Both IPSec and SSL have advantages and shortcomings Yet no paper has been found comparing the two protocols in terms of characteristic and functionality . Our objective is to present an analysis of security
  • 6. Introduction  Securing data over the network is hard and complicated issue while the threat of data modification and data interruption is rising .  The goal of network security is to provide confidentiality integrity and authenticity .  confidentiality is keeping the data secret from the unintended listeners on the network .  Integrity is ensuring that the received data is the data was actually sent.  Authenticity is proving the identity of the endpoint to ensure that the endpoint is the intended entity to communicate with.
  • 7. Introduction  Using both strong authentication and encryption algorithm protects the data but it will decrease the transmission rate and could induce CPU consumption.  With the recent development of the security tools so many protocols and powerful tools have been proposed but the most famous secure and widely deployed are IPSec IP Security and SSL Secure Socket Layer.  In this paper we will provide a technical comparison of IPSec and SSL the similarities and the differences of the cryptographic properties
  • 8. IPSec  IPSec :is an IP layer protocol that enables the sending and receiving of cryptographically protected packets of any kind ( TCP, UDP, ICMP , etc )without any modification.  IPSec provides two kinds of cryptographic services Based on necessity IPSec can provide confidentiality and authenticity or it can provide authenticity only  ESP (Encapsulated Security Payload) .  AH (Authentication Header) .
  • 9. IPSec  ESP header includes the necessary information for decrypting and authenticating the data where  AH header includes the necessary information required for authenticating the protected data.
  • 10. IPSec Establishing IPSec connection requires two phases :  Phase 1 :  has two modes Main Mode and Aggressive Mode.  The differences between these two modes are the number of messages exchanged and the ID protection.  Psk (Phase-shift keying).  Phase 2 :  has one mode Quick Mod.
  • 11. SSL (Secure Socket Layer)  SSL : is an Application layer protocol.  SSL is mostly utilized to protect HTTP transactions , and has been used for other purposes like IMAP and POP ,etc .  Internet message Access Protocol (IMAP), Post Office Protocol (POP).  SSL is compatible with applications running only over TCP, but some modifications are required for the applications to run over SSL.
  • 12. SSL (Secure Socket Layer)  SSL is composed of the following protocols  Handshake protocol.  Change Cipher Spec protocol.  Alert protocol.  Application Data protocol.
  • 13. SSL (Secure Socket Layer)  Handshake protocol is used to perform authentication and key exchanges.  Change Cipher Spec protocol is used to indicate that the chosen keys will now be used.  Alert protocol is used for signaling errors and session closure.  Application Data protocol transmits and receives encrypted data.
  • 14. Comparison of IPSec and SSL 1. Authentication Algorithm  IPSec supports the use of Digital Signature and the use of a Secret Key Algorithm .  SSL supports only the use of Digital Signature.  The use of a random 2048 bit Secret Key is considered as strong as any other authentication methods
  • 15. Comparison of IPSec and SSL 2. Authentication Method  IPSec supports one type of authentication method, as Mutual Authentication .  SSL supports a various types of authentication , as Server Authentication , Client Authentication.
  • 16. Comparison of IPSec and SSL 3. MAC (Message Authentication Code)  is used for Authentication the exchanged messages after the connection is established .  The strength of the Hash Algorithm is based on the length of the output .  Hash Length of SSL is Longer than IPSec.
  • 17. Comparison of IPSec and SSL 4. Connection Mode  IPSec has two connection modes  Tunnel Mode  This is established between Gateway to Gateway Gateway to Host and Host to Host.  it requires adding a new IP header to the original packet.  Transport Mode  Transport Mode is Host to Host connection.  The data between the two entities are encrypted.  SSL is one connection per one session type.
  • 18. Comparison of IPSec and SSL 5. Cipher List Proposal  Because IPSec is a two phase protocol, it has a unique function called bi-directional .  SSL is a one direction protocol.
  • 19. Comparison of IPSec and SSL 6. Interoperability  IPSec doesn't integrate well with other IPSec vendors.  Some cases require some modification.  SSL is trouble free and well integrated.
  • 20. Comparison of IPSec and SSL 7. Overhead Size  One disadvantage of IPSec is the extra size added to the original packet.  SSL needs less overhead than IPSec .
  • 21. Comparison of IPSec and SSL 8. Residing Layer  IPSec resides in the IP layer which allows it to work with the above layers smoothly.  SSL resides in the Application layer and that is a problem for some application to work with SSL.
  • 22. Comparison of IPSec and SSL 9. Time of Handshake Process
  • 23. Comparison of IPSec and SSL 10. Perfect Forward Secrecy  Both IPSec and SSL use PFS (Perfect Forward Secrecy) in their resumption session.  In the case of IPSec , the main goal for Phase 1 beside authentication is producing the encryption key required to safe guard Phase 2 exchange.  In the case of SSL, PFS is implemented in the same manner as with IPSec when Ephemeral Diffie- Hellman is negotiated.  The protocol allows two users to exchange a secret key over an insecure medium without any prior secrets.
  • 24. Comparison of IPSec and SSL 11. Order of Cryptographic Operations  IPSec encrypts the data first then creates MAC for the encrypted data .  If a modified data were inserted in the middle of transaction IPSec would verify the MAC before performing any decryption process.
  • 25. Comparison of IPSec and SSL 11. Order of Cryptographic Operations  SSL is the opposite it creates the MAC for the plaintext first then encrypts the data.  SSL on the other hand, is obligated to decrypt it first then verifies the MAC which could result in wasting CPU over decrypting modified packets.
  • 26. Conclusion Function IPSec SSL Configuration Hard Easy Client Authentication Must Option Pre-Shared Key Yes No Interoperability Yes No Problem TCP Application All Some Support UDP support Yes No Throughput Rate High High Compression Support Yes OpenSSL only Handshake Time Slow Fast
  • 28. References 1. Sheila Frankel" Demystifying the IPSec Puzzle", Artec House Publisher,2001. 2. Eric Rescorla "S SL and TLS Designing and Building Secure Systems" , Addison-Wesley , 3Rd Printing, Aug ,2001 3. www.freeswan.com 4. www.stunnel.org
  • 29. Thank you! Thank you for your attention!