SlideShare a Scribd company logo
IP SECURITY
Ref: Cryptography and Network Security
by William Stallings
IP SECURITY
 We have a range of application specific security
mechanisms
 eg. S/MIME, PGP, Kerberos, SSL/HTTPS
 By implementing security at the IP level, an
organization can ensure secure networking not
only for applications that have security
mechanisms but also for the many security-
ignorant applications.
IP SECURITY
 IP Security mechanisms provides
 authentication
 Confidentiality
 Integrity
 key management
 Applicable to use over LANs, across public &
private WANs, & for the Internet
 Need identified in 1994 report
 the IAB (the Internet Architecture Board )
included authentication and encryption as
necessary security features in the next-
generation IP, which has been issued as IPv6
IP SECURITY USES
BENEFITS OF IPSEC
 When implemented in a firewall/router
provides strong security to all traffic crossing
the perimeter.
 The protocol is below the transport layer (TCP,
UDP) and so is transparent to applications.
 There is no need to change software on a user
or server system when IPsec is implemented
in the firewall or router.
 It can provide security for individual users.
IPSEC SERVICES
 Access control
 Connectionless integrity
 Data origin authentication
 Rejection of replayed packets
 a form of partial sequence integrity
 Confidentiality (encryption)
 Limited traffic flow confidentiality
IPSEC
 IPSec provides security in three situations:
 Host-to-host, host-to-gateway and gateway-
to-gateway
 IPSec operates in two modes:
 Transport mode (for end-to-end)
 Tunnel mode (for VPN)
7
TRANSPORT
AND
TUNNEL
MODES
TRANSPORT AND TUNNEL MODES
 Transport Mode
 to encrypt & optionally authenticate IP data
 good for ESP host to host traffic
 Tunnel Mode
 encrypts entire IP packet
 add new header for next hop
 no routers on way can examine inner IP header
 good for VPNs, gateway to gateway security
TRANSPORT
AND
TUNNEL MODE
PROTOCOLS
IP SECURITY SPECIFICATION
 IP Security specification is quite complex, that includes:
 Architecture
 Authentication Header (AH)
 Encapsulating Security Payload (ESP)
 Internet Key Exchange (IKE)
 Cryptographic algorithms
 Other
IPSEC ARCHITECTURE
12
Tunnel Mode
Router Router
Transport Mode
VARIOUS PACKETS
13
IP header
IP header
IP header
TCP header
TCP header
TCP header
data
data
data
IPSec header
IPSec header IP header
Original
Transport
mode
Tunnel
mode
IPSEC
 A collection of protocols (RFC 2401)
 Authentication Header (AH)
 RFC 2402
 Encapsulating Security Payload (ESP)
 RFC 2406
 Internet Key Exchange (IKE)
 RFC 2409
 IP Payload Compression (IPcomp)
 RFC 3137
14
AUTHENTICATION HEADER (AH)
 Provides source authentication
 Protects against source spoofing
 Provides data integrity
 Protects against replay attacks
 Use monotonically increasing sequence
numbers
 Protects against denial of service attacks
 NO protection for confidentiality!
15
AH DETAILS
 Use 32-bit monotonically increasing sequence
number to avoid replay attacks
 Use cryptographically strong hash algorithms to
protect data integrity (96-bit)
 Use symmetric key cryptography
 HMAC-SHA-96, HMAC-MD5-96
16
ENCAPSULATING SECURITY PAYLOAD
(ESP)
 Provides all that AH offers, and
 in addition provides data confidentiality
 Uses symmetric key encryption
17
ESP DETAILS
 Same as AH:
 Use 32-bit sequence number to counter
replaying attacks
 Use integrity check algorithms
 Data confidentiality:
Uses symmetric key encryption
algorithms to encrypt packets
18
ESP PACKET DETAILS
ESP PACKET DETAILS
 Security Parameters Index (32 bits): Identifies a
security association.
 Sequence Number (32 bits): A monotonically
increasing counter value; this provides an anti-replay
function.
 Payload Data (variable): This is a transport-level
segment (transport mode) or IP packet (tunnel mode)
that is protected by encryption.
 Padding (0–255 bytes): The purpose of this field is
to make the plaintext to a multiple of some number of
bytes.
 Pad Length (8 bits): Indicates the number of pad
bytes immediately preceding this field.
 Next Header (8 bits): Identifies the type of
data contained in the payload data.
 Integrity Check Value (variable): A
variable-length field (must be an integral
number of 32-bit words) that contains the
Integrity Check Value computed over the
ESP packet.
ENCRYPTION & AUTHENTICATION
ALGORITHMS & PADDING
 ESP can encrypt payload data, padding, pad
length, and next header fields
 ESP can have optional ICV for integrity
 is computed after encryption is performed
 ESP uses padding
 to expand plaintext to required length
 to align pad length and next header fields
CRYPTOGRAPHIC SUITES
 Variety of cryptographic algorithm types to promote
interoperability have
 RFC4308 defines VPN cryptographic suites
 VPN-A matches common corporate VPN security using 3DES &
HMAC
 VPN-B has stronger security for new VPNs implementing IPsecv3
and IKEv2 using AES
 RFC4869 defines four cryptographic suites
compatible with US NSA specs
 provide choices for ESP & IKE
 AES-GCM, AES-CBC, HMAC-SHA, ECP, ECDSA

More Related Content

Similar to Network IP Security.pdf

Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
ssuserbab2f4
 
Ip Sec
Ip SecIp Sec
IS - SSL
IS - SSLIS - SSL
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
AlaaElhaddad3
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
Ipsec
IpsecIpsec
Ip security
Ip security Ip security
Ip security
Dr.K.Sreenivas Rao
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
I psecurity
I psecurityI psecurity
I psecurity
ZainabNoorGul
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
Gopal Karthik
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
Sourabh Badve
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payload
ijtsrd
 
ip.ppt
ip.pptip.ppt
ip.ppt
ssuser5044d8
 

Similar to Network IP Security.pdf (20)

Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
IP Security
IP SecurityIP Security
IP Security
 
Unit 6
Unit 6Unit 6
Unit 6
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Unit 5
Unit 5Unit 5
Unit 5
 
Ipsec
IpsecIpsec
Ipsec
 
Ip security
Ip security Ip security
Ip security
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Websecurity
Websecurity Websecurity
Websecurity
 
I psecurity
I psecurityI psecurity
I psecurity
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Ip sec
Ip secIp sec
Ip sec
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payload
 
ip.ppt
ip.pptip.ppt
ip.ppt
 

More from georgejustymirobi1

JanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.pptJanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.ppt
georgejustymirobi1
 
How To Write A Scientific Paper
How To Write A Scientific PaperHow To Write A Scientific Paper
How To Write A Scientific Paper
georgejustymirobi1
 
writing_the_research_paper.ppt
writing_the_research_paper.pptwriting_the_research_paper.ppt
writing_the_research_paper.ppt
georgejustymirobi1
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
georgejustymirobi1
 
ABCD15042603583.pdf
ABCD15042603583.pdfABCD15042603583.pdf
ABCD15042603583.pdf
georgejustymirobi1
 
ch18 ABCD.pdf
ch18 ABCD.pdfch18 ABCD.pdf
ch18 ABCD.pdf
georgejustymirobi1
 
ch13 ABCD.ppt
ch13 ABCD.pptch13 ABCD.ppt
ch13 ABCD.ppt
georgejustymirobi1
 
1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
georgejustymirobi1
 
CNN Algorithm
CNN AlgorithmCNN Algorithm
CNN Algorithm
georgejustymirobi1
 
applicationlayer.pptx
applicationlayer.pptxapplicationlayer.pptx
applicationlayer.pptx
georgejustymirobi1
 
Fair Bluetooth.pdf
Fair Bluetooth.pdfFair Bluetooth.pdf
Fair Bluetooth.pdf
georgejustymirobi1
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
georgejustymirobi1
 
Research Score.pdf
Research Score.pdfResearch Score.pdf
Research Score.pdf
georgejustymirobi1
 
educational_technology_meena_arora.ppt
educational_technology_meena_arora.ppteducational_technology_meena_arora.ppt
educational_technology_meena_arora.ppt
georgejustymirobi1
 
Array.ppt
Array.pptArray.ppt
PYTHON-PROGRAMMING-UNIT-II (1).pptx
PYTHON-PROGRAMMING-UNIT-II (1).pptxPYTHON-PROGRAMMING-UNIT-II (1).pptx
PYTHON-PROGRAMMING-UNIT-II (1).pptx
georgejustymirobi1
 
cprogrammingoperator.ppt
cprogrammingoperator.pptcprogrammingoperator.ppt
cprogrammingoperator.ppt
georgejustymirobi1
 
cprogrammingarrayaggregatetype.ppt
cprogrammingarrayaggregatetype.pptcprogrammingarrayaggregatetype.ppt
cprogrammingarrayaggregatetype.ppt
georgejustymirobi1
 

More from georgejustymirobi1 (20)

JanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.pptJanData-mining-to-knowledge-discovery.ppt
JanData-mining-to-knowledge-discovery.ppt
 
How To Write A Scientific Paper
How To Write A Scientific PaperHow To Write A Scientific Paper
How To Write A Scientific Paper
 
writing_the_research_paper.ppt
writing_the_research_paper.pptwriting_the_research_paper.ppt
writing_the_research_paper.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
ABCD15042603583.pdf
ABCD15042603583.pdfABCD15042603583.pdf
ABCD15042603583.pdf
 
ch18 ABCD.pdf
ch18 ABCD.pdfch18 ABCD.pdf
ch18 ABCD.pdf
 
ch13 ABCD.ppt
ch13 ABCD.pptch13 ABCD.ppt
ch13 ABCD.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
1682302951397_PGP.pdf
1682302951397_PGP.pdf1682302951397_PGP.pdf
1682302951397_PGP.pdf
 
CNN
CNNCNN
CNN
 
CNN Algorithm
CNN AlgorithmCNN Algorithm
CNN Algorithm
 
applicationlayer.pptx
applicationlayer.pptxapplicationlayer.pptx
applicationlayer.pptx
 
Fair Bluetooth.pdf
Fair Bluetooth.pdfFair Bluetooth.pdf
Fair Bluetooth.pdf
 
Bluetooth.pptx
Bluetooth.pptxBluetooth.pptx
Bluetooth.pptx
 
Research Score.pdf
Research Score.pdfResearch Score.pdf
Research Score.pdf
 
educational_technology_meena_arora.ppt
educational_technology_meena_arora.ppteducational_technology_meena_arora.ppt
educational_technology_meena_arora.ppt
 
Array.ppt
Array.pptArray.ppt
Array.ppt
 
PYTHON-PROGRAMMING-UNIT-II (1).pptx
PYTHON-PROGRAMMING-UNIT-II (1).pptxPYTHON-PROGRAMMING-UNIT-II (1).pptx
PYTHON-PROGRAMMING-UNIT-II (1).pptx
 
cprogrammingoperator.ppt
cprogrammingoperator.pptcprogrammingoperator.ppt
cprogrammingoperator.ppt
 
cprogrammingarrayaggregatetype.ppt
cprogrammingarrayaggregatetype.pptcprogrammingarrayaggregatetype.ppt
cprogrammingarrayaggregatetype.ppt
 

Recently uploaded

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Network IP Security.pdf

  • 1. IP SECURITY Ref: Cryptography and Network Security by William Stallings
  • 2. IP SECURITY  We have a range of application specific security mechanisms  eg. S/MIME, PGP, Kerberos, SSL/HTTPS  By implementing security at the IP level, an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security- ignorant applications.
  • 3. IP SECURITY  IP Security mechanisms provides  authentication  Confidentiality  Integrity  key management  Applicable to use over LANs, across public & private WANs, & for the Internet  Need identified in 1994 report  the IAB (the Internet Architecture Board ) included authentication and encryption as necessary security features in the next- generation IP, which has been issued as IPv6
  • 5. BENEFITS OF IPSEC  When implemented in a firewall/router provides strong security to all traffic crossing the perimeter.  The protocol is below the transport layer (TCP, UDP) and so is transparent to applications.  There is no need to change software on a user or server system when IPsec is implemented in the firewall or router.  It can provide security for individual users.
  • 6. IPSEC SERVICES  Access control  Connectionless integrity  Data origin authentication  Rejection of replayed packets  a form of partial sequence integrity  Confidentiality (encryption)  Limited traffic flow confidentiality
  • 7. IPSEC  IPSec provides security in three situations:  Host-to-host, host-to-gateway and gateway- to-gateway  IPSec operates in two modes:  Transport mode (for end-to-end)  Tunnel mode (for VPN) 7
  • 9. TRANSPORT AND TUNNEL MODES  Transport Mode  to encrypt & optionally authenticate IP data  good for ESP host to host traffic  Tunnel Mode  encrypts entire IP packet  add new header for next hop  no routers on way can examine inner IP header  good for VPNs, gateway to gateway security
  • 11. IP SECURITY SPECIFICATION  IP Security specification is quite complex, that includes:  Architecture  Authentication Header (AH)  Encapsulating Security Payload (ESP)  Internet Key Exchange (IKE)  Cryptographic algorithms  Other
  • 13. VARIOUS PACKETS 13 IP header IP header IP header TCP header TCP header TCP header data data data IPSec header IPSec header IP header Original Transport mode Tunnel mode
  • 14. IPSEC  A collection of protocols (RFC 2401)  Authentication Header (AH)  RFC 2402  Encapsulating Security Payload (ESP)  RFC 2406  Internet Key Exchange (IKE)  RFC 2409  IP Payload Compression (IPcomp)  RFC 3137 14
  • 15. AUTHENTICATION HEADER (AH)  Provides source authentication  Protects against source spoofing  Provides data integrity  Protects against replay attacks  Use monotonically increasing sequence numbers  Protects against denial of service attacks  NO protection for confidentiality! 15
  • 16. AH DETAILS  Use 32-bit monotonically increasing sequence number to avoid replay attacks  Use cryptographically strong hash algorithms to protect data integrity (96-bit)  Use symmetric key cryptography  HMAC-SHA-96, HMAC-MD5-96 16
  • 17. ENCAPSULATING SECURITY PAYLOAD (ESP)  Provides all that AH offers, and  in addition provides data confidentiality  Uses symmetric key encryption 17
  • 18. ESP DETAILS  Same as AH:  Use 32-bit sequence number to counter replaying attacks  Use integrity check algorithms  Data confidentiality: Uses symmetric key encryption algorithms to encrypt packets 18
  • 20. ESP PACKET DETAILS  Security Parameters Index (32 bits): Identifies a security association.  Sequence Number (32 bits): A monotonically increasing counter value; this provides an anti-replay function.  Payload Data (variable): This is a transport-level segment (transport mode) or IP packet (tunnel mode) that is protected by encryption.  Padding (0–255 bytes): The purpose of this field is to make the plaintext to a multiple of some number of bytes.  Pad Length (8 bits): Indicates the number of pad bytes immediately preceding this field.
  • 21.  Next Header (8 bits): Identifies the type of data contained in the payload data.  Integrity Check Value (variable): A variable-length field (must be an integral number of 32-bit words) that contains the Integrity Check Value computed over the ESP packet.
  • 22. ENCRYPTION & AUTHENTICATION ALGORITHMS & PADDING  ESP can encrypt payload data, padding, pad length, and next header fields  ESP can have optional ICV for integrity  is computed after encryption is performed  ESP uses padding  to expand plaintext to required length  to align pad length and next header fields
  • 23. CRYPTOGRAPHIC SUITES  Variety of cryptographic algorithm types to promote interoperability have  RFC4308 defines VPN cryptographic suites  VPN-A matches common corporate VPN security using 3DES & HMAC  VPN-B has stronger security for new VPNs implementing IPsecv3 and IKEv2 using AES  RFC4869 defines four cryptographic suites compatible with US NSA specs  provide choices for ESP & IKE  AES-GCM, AES-CBC, HMAC-SHA, ECP, ECDSA