Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS 4362 - CIS 5357 Network Security.

Slides:



Advertisements
Similar presentations
ISA 662 IKE Key management for IPSEC Prof. Ravi Sandhu.
Advertisements

Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
Internet Protocol Security (IP Sec)
L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
ISAKMP RFC 2408 Internet Security Association & Key Management Protocol Protocol Establish, modify, and delete SAs Negotiate crypto keys Procedures Authentication.
Header and Payload Formats
Security at the Network Layer: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec – IKE CS 470 Introduction to Applied Cryptography
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
IKE message flow IKE message flow always consists of a request followed by a response. It is the responsibility of the requester to ensure reliability.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
COEN 350 IPSec, SSL, SSH,. IPSec RFC 1636 identified key areas where the internet needs to be made more secure. Spoofing: Creating packets with false.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Internet Key Exchange IKE ● RFC 2409 ● Services – Constructs shared authenticated keys – Establishes shared security parameters – Common SAs between IPSec.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
1 Internet Key Exchange Rocky K. C. Chang 20 March 2007.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
CSE 4905 IPsec II.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
The Secure Sockets Layer (SSL) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Guevara Noubir CSG254: Network Security
Presentation transcript:

Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS 4362 - CIS 5357 Network Security

ISAKMP Policy Negotiation ISAKMP Protocols are constructed by chaining together ISAKMP payloads to an ISAKMP header Two Phases Establish a key-exchange SA Negotiate security services

ISAKMP Exchange Types Basic = 1 Authentication Key Exchange Saturation protection Identity Protection = 2 (Main mode IKE) Protects users identities Authentication Only = 3 Authentication Aggressive = 4 (Aggressive Mode IKE) Key exchange No saturation protection Informational = 5 Information only

ISAKMP Data Exchange Phases Establish a secure channel Use the secure channel to exchange information for a protocol (such as IPSEC)

ISAKMP Payload Types Certificate request Initiate SA Hash Signature Nonce Notification Delete SA Initiate SA Protocol [cipher] Proposal Transform <SA attribute> Key Exchange Identification Certificate

ISAKMP Fixed Header Format Initiator Cookie (64 bits) Responder Cookie (64 bits) (null in message from the originator Next Payload (8 bits) Major ISAKMP Version (4 bits) Minor ISAKMP Version (4 bits) Exchange Type (8 bits) Flags (8 bits) Message ID (32 bits) Message length (32 bits)

Example ISAKMP Header & Payload Key Exchange Payload Nonce Payload

IKE Phases In a design similar to Kerberos, IKE performs a phase 1 mutual authentication based on public keys and phase 2 re-authentication based on shared secrets (from phase 1). This allows multiple SAs to re-use the same handshake. Phase 1 has two modes: Aggressive mode (3 messages) Main mode (6 messages)

IKE Phase 1: Aggressive Mode ga mod p, “Alice”, supported crypto Alice Bob gb mod p, choice crypto, proof(“I’m Bob”) proof(“I’m Alice”) In aggressive mode, Alice chooses some Elgamal context (p, g). Bob may not support it, and reject the connection. If that happens, Alice should try and connect to Bob using main mode. Aggressive mode provides mutual authentication, and a shared secret gab mod p, which can be used to derive keys for the symmetric crypto protocols.

IKE Phase 1: Main Mode supported crypto suites chosen crypto suite Alice supported crypto suites Bob chosen crypto suite ga mod p gb mod p K= gab mod p K{“Alice”, proof I’m Alice} K{“Bob”, proof I’m Bob}

Reasoning about IKE The SIGn-and-MAc (SIGMA) family of key exchange protocols. Introduced by Krawczyk to the IPsec working group (1995), replaced Photuris. Several interesting properties, tried to plug certain holes in existing Key Exchange Protocols.

Security Goals of SIGMA Mutual Authentication Key-binding Consistency: If honest A establishes a key K, believing that B is the other session peer, and B establishes the same key K, it should believe that A is the peer in this exchange Secrecy (of the computed key) Optional: Identity Protection, providing anonymity against eavesdroppers for the two parties in a communication

Example of a “BADH” protocol (Basic Authenticated DH) gx mod p Alice Bob gy mod p, B, signB(gx, gy) A, signA(gy, gx) K derived from gxy The inclusion of both exponentials in each signature prevents replay attacks, but does not provide for key binding consistency.

Key Binding Inconsistency gx mod p Alice Bob gy mod p, B, signB(gx, gy) E, signE(gy, gx) E Outcome: Alice thinks she shares key K with Bob, while Bob thinks that he shares the same K with Eve. Eve does not know the key, so this does not violate authentication and/or secrecy.

STS Protocol K derived from gxy gx mod p Alice Bob K derived from gxy gy mod p, B, K{signB(gx, gy)} A, K{signA(gy, gx)} Intuitively this solves the consistency problem, but no proof exists. What if Eve registers Alice’s public key on her name? Even if Eve does not know Alice’s secret key, she may be able to perform replay attacks to violate consistency of key binding

ISO Key Exchange Does not provide identity protection. A, gx mod p Alice Bob gy mod p, B, signB(gx, gy, A) signA(gy, gx), B Does not provide identity protection. Could be “fixed” by having Alice send an “alias” A’ = h(A, r), which is revealed later, and have the other messages be encrypted under the DH key.

Sigma Protocol (Basic) gx mod p Alice Bob gy mod p, B, signB(gx, gy), MACKm(B) A, signA(gy, gx), MACKm(A) Output from DH-value gxy : encryption key Ke, mac key Km

SIGMA-I Identity of the sender is protected against gx mod p Alice Bob gy mod p, Ke{B, signB(gx, gy), MACKm(B)} Ke{A, signA(gy, gx), MACKm(A)} Identity of the sender is protected against both passive and active attacks. The identity of the receiver is protected against passive attacks.

Phase 1: Main mode, (shared secret authentication) Alice supported crypto suites Bob Pre-shared secret J chosen crypto suite ga mod p, nonce nA gb mod p, nonce nB K= f(J, gab mod p, nA, nB, cA, cB) K{“Alice”, proof I’m Alice} K{“Bob”, proof I’m Bob}

IKE Phase 2 quick mode X, Y are session-identifiers for this flow: X, Y, {CP, SPIA, nonceA, [ga mod p]} Alice Bob X, Y, {CPA, SPIB, nonceB, [gb mod p] B} X, Y, ack X, Y are session-identifiers for this flow: X contains the cookies of the corresponding phase 1, Y is 32-bit to identify this particular connection. Optionally some tags may be included to identify the type of traffic to be sent.