William Stallings Data and Computer Communications Chapter 18 Network Security.

Slides:



Advertisements
Similar presentations
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Advertisements

Internet Security CSCE 813 IPsec
1 Chapter 10 Network Security. 2 Security Requirements zConfidentiality zIntegrity zAvailability.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
Sri Lanka Institute of Information Technology
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Chapter 18: Network Security Business Data Communications, 5e.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
NETWORK SECURITY.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 20: Network Security Business Data Communications, 4e.
CSCE 715: Network Systems Security
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
By: Nasoor Bagheri In the name of god Network Security By: Nasoor Bagheri
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
IP Security
William Stallings Data and Computer Communications 7th Edition
IPSec Detailed Description and VPN
IPSecurity.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Network Security.
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
Chapter 6 IP Security.
Presentation transcript:

William Stallings Data and Computer Communications Chapter 18 Network Security

Security Requirements  機密性 (Confidentiality)  真實性 (Authentication)  完整性 (Integrity)  不可否認性 (Non-repudiation)  存取控制 (Access control)  可用性 (Availability)

Passive Attacks  Eavesdropping on transmissions  To obtain information  Release of message contents Outsider learns content of transmission  Traffic analysis By monitoring frequency and length of messages, even encrypted, nature of communication may be guessed  Difficult to detect  Can be prevented

Active Attacks  Masquerade Pretending to be a different entity  Replay  Modification of messages  Denial of service  Easy to detect Detection may lead to deterrent  Hard to prevent

Security Threats

Conventional Encryption

Ingredients  Plain text  Encryption algorithm  Secret key  Cipher text  Decryption algorithm

Requirements for Security  Strong encryption algorithm Even if known, should not be able to decrypt or work out key Even if a number of cipher texts are available together with plain texts of them  Sender and receiver must obtain secret key securely  Once key is known, all communication using this key is readable

Attacking Encryption  Crypt analysis Relay on nature of algorithm plus some knowledge of general characteristics of plain text Attempt to deduce plain text or key  Brute force Try every possible key until plain text is achieved

Algorithms  Block cipher Process plain text in fixed block sizes producing block of cipher text of equal size Data encryption standard (DES) Triple DES (TDES)

Data Encryption Standard  US standard  64 bit plain text blocks  56 bit key

DES Encryption Algorithm

DES Single Iteration

Strength of DES  Declared insecure in 1998  Electronic Frontier Foundation  DES Cracker machine  DES now worthless  Alternatives include TDEA

Triple DEA  ANSI X9.17 (1985)  Incorporated in DEA standard 1999  Uses 3 keys and 3 executions of DEA algorithm  Effective key length 168 bit

Location of Encryption Devices

Link Encryption  Each communication link equipped at both ends  All traffic secure  High level of security  Requires lots of encryption devices  Message must be decrypted at each switch to read address (virtual circuit number)  Security vulnerable at switches Particularly on public switched network

End to End Encryption  Encryption done at ends of system  Data in encrypted form crosses network unaltered  Destination shares key with source to decrypt  Host can only encrypt user data Otherwise switching nodes could not read header or route packet  Traffic pattern not secure  Use both link and end to end

Key Distribution  Key selected by A and delivered to B  Third party selects key and delivers to A and B  Use old key to encrypt and transmit new key from A to B  Use old key to transmit new key from third party to A and B

Automatic Key Distribution

 Session Key Used for duration of one logical connection Destroyed at end of session Used for user data  Permanent key Used for distribution of keys  Key distribution center Determines which systems may communicate Provides one session key for that connection  Front end processor Performs end to end encryption Obtains keys for host

Traffic Padding  Produce cipher text continuously  If no plain text to encode, send random data  Make traffic analysis impossible

Message Authentication  Protection against active attacks Falsification of data  Message is authentic if it is genuine and comes from the alleged source  Authentication allows receiver to verify that message is authentic Message has not altered Message is from authentic source Message timeline

Message Authentication Using Conventional Encryption  Assumes sender and receiver are only entities that know key  Message includes: error detection code sequence number time stamp

Message Authentication Without Encryption  Authentication tag generated and appended to each message  Message not encrypted  Useful for: Messages broadcast to multiple destinations Have one destination responsible for authentication One side heavily loaded Encryption adds to workload Can authenticate random messages Programs authenticated without encryption can be executed without decoding

Message Authentication Code  Generate authentication code based on shared key and message  Common key shared between A and B  If only sender and receiver know key and code matches: Receiver assured message has not altered Receiver assured message is from alleged sender If message has sequence number, receiver assured of proper sequence

Message Authentication Using Message Authentication Code

One Way Hash Function  Accepts variable size message and produces fixed size tag (message digest)  Advantages of authentication without encryption Encryption is slow Encryption hardware expensive Encryption hardware optimized to large data Algorithms covered by patents Algorithms subject to export controls (from USA)

Using One Way Hash

Secure Hash Functions  Hash function must have following properties: Can be applied to any size data block Produce fixed length output Easy to compute Not feasible to reverse Not feasible to find two message that give the same hash

SHA-1  Secure Hash Algorithm 1  Input message less than 2 64 bits Processed in 512 bit blocks  Output 160 bit digest

Public Key Encryption  Based on mathematical algorithms  Asymmetric Use two separate keys  Ingredients Plain text Encryption algorithm Public and private key Cipher text Decryption algorithm

Public Key Encryption Encryption

Public Key Encryption (cont.) Authentication

Public Key Encryption - Operation  One key made public Used for encryption  Other kept private Used for decryption  Infeasible to determine decryption key given encryption key and algorithm  Either key can be used for encryption, the other for decryption

Steps  User generates pair of keys  User places one key in public domain  To send a message to user, encrypt using public key of the user  User decrypts using private key

Digital Signature  Sender encrypts message with their private key  Receiver can decrypt using senders public key  This authenticates sender, who is only person who has the matching key  Does not give privacy of data Decrypt key is public

RSA Algorithm

RSA Example

IPv4 and IPv6 Security  IPSec Applications: Secure branch office connectivity over Internet Secure remote access over Internet Extranet and intranet connectivity Enhanced electronic commerce security

IPSec Scope Three main facilities:  Authentication Authentication header (AH)  Combined authentication/encryption Encapsulated security payload (ESP)  Key exchange  RFC 2401, 2402, 2406, 2408 VPN (Arch., AH, ESP, Key)

Security Association  One way relationship between sender and receiver  For two way, two associations are required  An SA is identified by three parameters Security parameter index (SPI) IP destination address Security protocol identifier (indicates AH or ESP)

SA Parameters  Sequence number counter  Sequence counter overflow (flag)  Anti-replay windows  AH information  ESP information  Lifetime of this association  IPSec protocol mode Tunnel, transport or wildcard  Path MTU

Transport and Tunnel Modes  Transport mode Protection for upper layer protocols Extends to payload of IP packet End to end between hosts  Tunnel mode Protection for IP packet Entire packet treated as payload for outer IP “packet” No routers examine inner packet May have different source and destination address May be implemented at firewall

Authentication Header Data Integrity Authentication Auth. Data: MAC of immutable portion of IP header AH header upper-level protocol data

Encapsulating Security Payload  ESP  Confidentiality services

ESP Packet

Scope of ESP

Key Management  Manual  Automatic ISAKMP/Oakley Oakley key determination protocol Internet security association and key management protocol