Impacts of Security Protocols on Real- time Multimedia Communications Kihun Hong 1, Souhwan Jung 1, Luigi Lo Iacono 2, Christoph.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IPsec Internet Headquarters Branch Office SA R1 R2
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
IPSec Access control Connectionless integrity
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
SIP Security BY, Vivek Nemarugommula. vulnerabilities Registration Hijacking.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
TCP/IP Protocols Contains Five Layers
RTP Encryption for 3G Networks Rolf Blom, Elisabetta Carrara, Karl Norrman, Mats Näslund Communications Security Lab Ericsson.
WEP Protocol Weaknesses and Vulnerabilities
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Dec GPP2 TSG-X PDS 1 BCMCS Higher-Layer Encryption Raymond Hsu, Jun Wang Qualcomm Inc. Dec Notice QUALCOMM Incorporated grants a free, irrevocable.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography CSS 329 Lecture 13:SSL.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
CSE 4905 IPsec.
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs)
Presentation transcript:

Impacts of Security Protocols on Real- time Multimedia Communications Kihun Hong 1, Souhwan Jung 1, Luigi Lo Iacono 2, Christoph Ruland 2 1 School of Electronic Engineering, Soongsil University, 1-1, Sangdo-dong, Dongjak-ku, Seoul , KOREA 2 Institute for Data Communications Systems, University of Siegen, Germany {lo_iacono,

2 Outline Motivation for the study Main contributions of the paper Security Standards for Multimedia Communication Comparing Criteria Implementation Conclusion

3 Motivation for the study Which security protocol will you use for real- time multimedia communication ? We have many security protocols as IPsec, TLS, H.235, SRTP, and so on. Media stream has real-time properties. Delay, packet loss, jitter etc. Security service can degrade the quality of real- time multimedia services.

4 Main contributions of the paper We investigated the existing security protocols for real-time multimedia communication. We analyzed the details of the security functions for real- time multimedia communication. Optimized security function for real-time multimedia communication. Protection bound, Encryption algorithm and operation mode, computational delay etc. This work is helpful to choose and design the security protocol for real-time multimedia communication.

5 Security Standards for Multimedia Communication IPsec Security services for the Internet Protocol It is mandatory for IPv6 and optional for IPv4. Encapsulating Security Payload (ESP) Authentication Header (AH) H.235 H.235 standard describes security services for H.323. Baseline Security Profile Message authentication/integrity for the signaling path. Voice encryption profile Signature Security Profile Authentication, integrity, and non-repudiation for the signaling messages by using digital signatures. SRTP The Secure RTP (SRTP) provides confidentiality and authentication for RTP and RTCP. The encryption of SRTP or SRTCP packets is optional whereas the authentication for RTCP is mandatory but optional for RTP.

6 Comparing Criteria Confidentiality Data Integrity and Message Authentication Packet Source Authentication and User Authentication Replay Protection Dos Protection Key Management Data Expansion Error Propagation Computational Delay

7 Confidentiality IPsec IP payload (protection bound) DES CBC-Mode H.235 RTP payload (protection bound) RC2, DES, and 3DES, CBC-Mode SRTP RTP, RTCP payload (protection bound) AES in Segmented Integer Counter (SIC) mode Keystream is XORed with the payload.

8 Data Integrity and Message Authentication IPsec IP packet (AH) H.235 The anti-spamming mechanism provides a light-weighted RTP packet authentication. A part of the RTP header. An attacker can modify RTP payloads. SRTP RTP, RTCP header and the (encrypted) payload MAC is truncated to the leftmost 32 bit. A truncation to less than the half of the generated output of the HMAC increases the possibility to attack the MAC because of the birthday-attack-bound.

9 Packet Source Authentication and User Authentication All of the schemes don’t provide a method for packet source authentication. IPsec User authentication relies on the main mode of the IKE protocol using digital signatures. H.235 Authentication is accomplished by the utilization of pre- shared secrets. (a static password or some other a priori piece of information) The usage of digital certificates is possible. SRTP SRTP depends on a separate protocol for user authentication.

10 Replay Protection and Dos Protection Replay Protection IPsec The AH guards against replay attacks. Sliding window approach This is realized by maintaining a replay list on the receiver-side. H.235 Replay protection is for further study. SRTP It indirectly provides replay protection by authenticating the sequence number. Dos Protection IPsec and SRTP have no countermeasure against message flooding. H.235 A media anti-spamming mechanism …P…SEQ#timestamp……Media datapaddingAUTHpadlen encrypted MAC K (…SEQ#, timestamp) RTP Header

11 Key Management IPsec Internet Key Exchange (IKE) protocol Main Mode and Quick Mode H.235 The master chooses a random session key. The shared secret is used to encrypt the session key material. SRTP SRTP does not define any key establishment protocol. It just describes how to derive the necessary session keys for encryption and authentication from the master keys.

12 Data Expansion IPsec : ESP (or AH) header, pad, auth. field H.235 : pad, auth. field SRTP : auth. tag

13 Error Propagation IPsec and H.235 In case of CBC, a transmission error affects two plaintext blocks. SRTP No error propagation The process of encrypting a packet XORing with the keystream

14 Computational Delay Sender-side IPsec computation delay = Enc(UDP header||RTP header||RTP payload) + GenMAC(ESP header||UDP header||RTP header||RTP payload) H.235 computation delay = Enc(RTP payload) + GenMAC(RTP header) SRTP computation delay = Enc(RTP payload) + GenMAC(RTP header || RTP payload) * Receiver-side IPsec Computation delay = Dec(UDP header||RTP header||RTP payload) + VerMAC(ESP header||UDP header||RTP header||RTP payload) H.235 computation delay = Dec(RTP payload) + VerMAC(RTP header) SRTP computation delay = Dec(RTP payload) + VerMAC(RTP header || RTP payload) * * : XOR operation.

15 Summary of Properties IPsecH.235SRTP Key management  User Authentication  Integrity of RTP Payload  RTCP Protection  Pre-computation  Error Propagation  Data Size Expansion (High) (Medium) (Low)

16 Implementation H.235 OpenH323 supports H.235 for securing RAS messages but doesn’t support security functions for H.225.0, H.245, and RTP. We extended the H and H.245 signaling implementations and added the missing security fields and structures such as CryptoToken, ClearToken, and H.235Key. All encryption algorithms as stated in H.235 Annex D were integrated. SRTP The SRTP framework is considered as a bump in the stack implementation between the RTP application and the transport layer. We integrated our SRTP framework into the openH323 project and extended the OpenPhone application.

17 Communication overheads versus payload size IPsec : ESP (or AH) header, pad, auth. field H.235 : pad, auth. field SRTP : auth. tag

18 Corrupt frames versus Packet error probability We use a 40 bytes payload consisting of 2 frame of G The block size of encryption algorithm is 8 bytes. The error position of packet is random. IPsec and H.235 make more corrupted frames.

19 Conclusions IPsec is a general security protocol for IP datagram and is easy to apply to applications. But IPsec has a high comm. overhead and end-to-end delay. In case of H.235 the offered security for the media stream is incomplete. Furthermore the protection of RTCP is left out completely. That makes H.235 very vulnerable to a variety of attacks. Protection bound, pre-computation, error propagation, data size expansion SRTP defines optimized security functions as integrity of RTP payload, RTCP protection, pre-computation, and low comm. overhead for real-time multimedia application using RTP.