IP Security and Key Establishment.ppt
《IP Security and Key Establishment.ppt》由会员分享,可在线阅读,更多相关《IP Security and Key Establishment.ppt(24页珍藏版)》请在麦多课文档分享上搜索。
1、IP Security and Key Establishment,CS 395T,Plan for the Next Few Lectures,Today: “systems” lecture on IP Security and design of key exchange protocols for IPSec Defending against denial of service “Real-world” considerations for protocol design No formal methods (yet) But see Cathy Meadows paper on t
2、he website Monday: no class (Labor Day) Next Wednesday: process algebras Homework assigned (using Mur) Then bring all together use process algebra and rational reconstruction to understand JFK protocol,IP Security Issues,Eavesdropping Modification of packets in transit Identity spoofing (forged sour
3、ce IP addresses) Denial of serviceMany solutions are application-specific TLS for Web, S/MIME for email, SSH for remote login IPSec aims to provide a framework of open standards for secure communications over IP Protect every protocol running on top of IPv4 and IPv6,IPSec = AH + ESP + IPcomp + IKE,I
4、PSec: Network Layer Security,Protection for IP traffic AH provides integrity andorigin authentication ESP also confidentiality,Compression,Sets up keys and algorithms for AH and ESP,AH and ESP rely on existing security association Roughly, peers must share a set of secret keys and agree on each othe
5、rs IP addresses and crypto schemes Internet Key Exchange (IKE) Goal: establish security association for AH and ESP If IKE is broken, AH and ESP provide no protection!,Transport mode secures packet payload and leaves IP header unchanged Typically, client-gateway (e.g., PC to remote host)Tunnel mode e
6、ncapsulates both IP header and payload into IPSec packets Typically, gateway-gateway (e.g., router to firewall),Transport Mode vs. Tunnel Mode,IP header (end-to-end),IPSec header,TCP/UDP header + data,IP header (end-to-end),IPSec header,TCP/UDP header + data,IP header (tunnel),Provides integrity and
7、 origin authentication Authenticates portions of the IP header Anti-replay service (to counter denial of service) No confidentiality,AH: Authentication Header,Next header,Payload length,Reserved,Security parameters index (SPI),Sequence number,Authentication data (MAC of IP header, AH data, TCP paylo
8、ad),Identifies security association (shared keys and algorithms),Anti-replay,Authenticates source, verifies integrity of payload,New IP header,Confidentiality and integrity for packet payload Symmetric cipher negotiated as part of security assoc Optionally provides authentication (similar to AH) Can
9、 work in transportor tunnel mode,ESP: Encapsulated Secure Payload,Original IP header,ESP header,TCP/UDP segment,ESP trailer,ESP auth,encrypted,authenticated,Original IP header,ESP header,TCP/UDP segment,ESP trailer,ESP auth,Key Management,Out of band Can set up some keys this way (Kerberos) Public-k
10、ey infrastructure (PKI) Leverage small number of public signing keys by using certificate chains Protocols for establishing short-lived session keys Avoid extended use of permanent secrets Forward secrecy Compromise of one session key does not help the attacker to compromise subsequent session keys,
11、Cryptography reduces many problems to key management,Key Distribution in Kerberos,Client,Key Center,Server,share symmetric key Kc (offline),share symmetric key Ks (offline),Kcs, KcsKsKc,KcsKs, msgKcs,Key Center generates session key Kcs and distributes it using shared long-term keys,Public-Key Infra
12、structure (PKI),Client,Certificate Authority,Server,Everyone knows CAs public signature verification key Ka,certificate sigKa(S,Ks) (offline),sigKa(S,Ks), sigKs(msg),Server certificate can be verified by any client that has CAs public key Ka Certificate authority is “offline”,Ks,Properties of Key Ex
13、change Protocols,Goal: generate and agree on session key using some shared initial information What other properties are needed? Authentication (know identity of other party) Secrecy (generated key not known to any others) Prevent replay of old key material Forward secrecy Prevent denial of service
14、Protect identities (avoid disclosure to others) Other properties you can think of?,Diffie-Hellman Key Exchange,Assume finite group G = S, Choose generator g so every xS is x = gn for some n Example: integers modulo prime p Protocol,ga mod p gb mod p,A,B,Alice, Bob share gab mod p not known to anyone
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IPSECURITYANDKEYESTABLISHMENTPPT
