Internet Key Exchange.ppt
《Internet Key Exchange.ppt》由会员分享,可在线阅读,更多相关《Internet Key Exchange.ppt(36页珍藏版)》请在麦多课文档分享上搜索。
1、,Internet Key Exchange,IPSec Reminder,SAD,IPSec Reminder SA,Security Association Database (SAD) holds SAs Security Associations (SA) is a one way, cryptographically protected connection between a sender and a receiver that affords security services to traffic,Alice,Bob,IPSec Reminder SA,SA contains
2、the fields: protocol identifier (ESP or AH) mode (tunnel or transport) algorithms for encryption/ decryption/ authentication and their respective keys lifetime SPIs sequence number,IPSec Reminder Where does IKE fit in?,SAs building and managing is either: Static (manual) keys and other attributes of
3、 SA are manually configured by system administrator. Practical for small, relatively static environments. Dynamic (automated) On-demand creation of keys. Handled by IKE protocol,IKE,IKE is a protocol that builds and manages IPSec SAs between two computers that implement IPSec. IKE is the only standa
4、rd protocol for building IPSec SAs (Standard IPSec implementation must also implement IKE) IKE (like IPSec) is carried out either between a pair of hosts, a pair of security gateways or a host and a security gateway,IKE,IKE is a protocol that builds and manages IPSec SAs between two computers that i
5、mplement IPSec. IKE is the only standard protocol for building IPSec SAs (Standard IPSec implementation must also implement IKE) IKE (like IPSec) is carried out either between a pair of hosts, a pair of security gateways or a host and a security gateway,Endpoint to Endpoint Transport,Both endpoints
6、of the IP connection implement IPsec Used with no inner IP header One of the protected points can be behind a NAT node,Protected Endpoint,Protected Endpoint,IPsec Tunnel,Gateway to Gateway Tunnel,Neither point of the IP connection implements IPsec, but network nodes between them protect traffic for
7、part of the way Protection is transparent to the endpoints The inner IP header contains the IP addresses of the actual endpoints,gateway,gateway,Protected Subnet,Protected Subnet,IPsec Tunnel,Endpoint to Gateway Transport,A protected endpoint (typically a portable roaming computer) connects back to
8、its corporate network through an IPsec protected tunnel The protected endpoint will want an IP address associated with the gateway so that packets returned to it will go to the gateway and be tunneled back The protected endpoint may be behind a NAT,Protected Endpoint,gateway,Protected Subnet and/or
9、Internet,IPsec Tunnel,expectations from IKE,Secrecy and authenticity Protection against replay attacks Scalability (being suitable for big networks) Privacy and anonymity (protecting identity of players in the protocol) Protection against DOS Efficiency (both computational and minimal in the number
10、of messages) Independence of cryptographic algorithms Minimize protocol complexity Reliability,Key Exchange Protocols,Key exchange protocols goal is to agree on a shared key for the two participant Should implement- authenticity- secrecy,Long and Short Term Keys,To support authenticity parties shoul
11、d know a mutual secret key. This key is called long term key. The keys negotiated in the protocol are called short term keys. There are two types of long term keys: Pre-shared secret Public/private keys,Long and Short Term Keys,Why the need for short term keys? It is not advisable to encrypt a lot o
12、f data with the same key It is advisable to separate between encryption keys and authentication keysWhy not sending the new key encrypted using the long term key? PFS,PFS Perfect Forward Secrecy,Exposure of long term keys will not entail exposure of short term keys that are created in the current ex
13、ecution of the protocolPFS is optionally provided in IKE (detailed later),IKE version 1,IKE version 1 is a hybrid of three protocols (actually a framework and two protocols) Version 1 grew out of ISAKMP framework and OAKLEY and SKEME protocols that work within that framework.,ISAKMP (IKE version 1),
14、Stands for “Internet Security Association and Key Management” Protocol Created by NSA (National Security Agency) Framework (not really a protocol) for authentication and key exchange. This framework decides on the SAs attributes the parties will use.,ISAKMP (IKE version 1),Designed to be key exchang
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- INTERNETKEYEXCHANGEPPT
