Download presentation
Published bySheila Hutchinson Modified over 9 years ago
1
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
NISHU RASTOGI (121418) BHOOMIKA PARMAR (121406) MONIKA MITTAL (121414) ROHIT JAIN (121424) SUBMITTED TO: Dr. C. RAMAKRISHNA (ASSOCIATE PROFESSOR) (CSE DEPARTMENT) NITTTR CHANDIGARH
2
overview KEY MANAGEMENT FOR IPSEC TYPES OF KEY MANAGEMENT
ISAKMP/OAKLEY OAKLEY KEY DETERMINATION PROTOCOL DIFFIE HELLMAN KEY EXCHANGE FEATURES ISAKMP PAYLOAD TYPES CONCLUSION
3
KEY MANAGEMENT FOR IPSEC
The key management portion of IPSec involves the determination and distribution of secret keys. A typical requirement is four keys for communication between two applications: transmit and receive pairs for both AH and ESP.
4
TYPES Two types of key management according to the IPSec Architecture document : Manual Automated.
5
Manual A system administrator manually configures each system with its own keys and with the keys of other communicating systems. This is practical for small, relatively static environments.
6
Automated An automated system enables the on-demand creation of keys for SAs Facilitates the use of keys in a large distributed system with an evolving configuration.
7
ISAKMP/OAKLEY The default automated key management protocol for IPSec is referred to as ISAKMP/Oakley Consists of the following elements: Oakley Key Determination Protocol Internet Security Association and Key Management Protocol (ISAKMP)
8
OAKLEY KEY DETERMINATION PROTOCOL
Oakley is a refinement of the Diffie-Hellman key exchange algorithm but providing added security. Oakley is generic in that it does not dictate specific formats. Oakley KDP = Diffie-Hellman Key Exchange + authentication & cookies
9
DIFFIE HELLMAN KEY EXCHANGE
A & B agree on 2 numbers n and g (g is primitive relative mod (n)) A chooses a large random number x & calculates X = gx mod (n) {A Sends X, g, and n to B} B chooses a large random number y & calculates Y = gy mod (n) {Then B sends Y to A} Finally A calculates k = Yx mod (n) & B calculates k’ = Xy mod (n)
10
DIFFIE HELLMAN KEY EXCHANGE
Features: Secret keys are created only when needed. Exchange requires no pre existing infrastructure Weaknesses: Don’t provide info about identities of parties Man – in – the – middle attack can be done.
11
features Five main features of Oakley
Cookies help resist clogging attacks Enables two parties to negotiate a group. Nonce helps resist message replay attacks Enables exchange of Diffie Helman Public key values Authentication helps resist man-in-the-middle attacks
12
CLOGGING ATTACKS A form of denial of service attacks
Attacker sends a large number of public key Yi in crafted IP packets, forcing the victim’s computer to compute secret keys Ki = YiX mod p over and over again Diffie-Hellman is computationally intensive because of modular exponentiations
13
PREVENTING CLOGGING ATTACKS USING COOKIES
Cookies help Before doing computation, recipient sends a cookie (a random number) back to source and waits for a confirmation including that cookie This prevents attackers from making DH requests using crafted packets with crafted source addresses
14
GROUPS GROUPS SUPPORTED: Modular exponentiation with a 768-bit modulus
Elliptic curve group over 2155 Elliptic curve group over 2185
15
NONCES NONCES: NONCE is a locally generated pseudo random numbers
Nonces appear in responses & are encrypted during certain portions of key exchange to secure their user
16
AUTHENTICATION METHODS USED IN OAKLEY
Digital Signatures Public Key Encryption Secret Key Encryption
18
ISAKMP ISAKMP provides
A framework for Internet key management The specific protocol support, including formats, for negotiation of security attributes. ISAKMP by itself does not dictate a specific key exchange algorithm rather, ISAKMP consists of a set of message types that enable the
19
ISAKMP Rather ISAKMP consists of a set of message types that enable the use of a variety of key exchange algorithms. Oakley is the specific key exchange algorithm mandated for use with the initial version of ISAKMP.
20
ISAKMP ISAKMP: Internet Security Association and Key Management Protocol Specifies key exchange formats Each type of payload has the same form of a payload header ISAKMP header
21
ISAKMP Payload Types SA: for establishing a security association
Proposal: for negotiating an SA Transform: for specifying encryption and authentication algorithms Key-exchange: for specifying a key-exchange algorithm Identification: for carrying info and identifying peers Certificate-request: for requesting a public-key certificate
22
ISAKMP Payload Types Certificate: contain a public-key certificate
Hash: contain the hash value of a hash function Signature: contain the output of a digital signature function Nonce: contain a nonce Notification: notify the status of the other types of payloads Delete: notify the receiver that the sender has deleted an SA or SAs 8-bit Next payload Reserved 16-bit Payload length
23
CONCLUSION The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley Oakley is a refinement of the Diffie-Hellman key exchange algorithm but providing added security. ISAKMP provides a framework for Internet key management
24
REFERENCES Cryptography And Network Security
- Principles And Practice, Fourth Edition, “William Stallings”
25
THANK YOU
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.