IPsec- IKE, Internet Key Exchange.ppt
《IPsec- IKE, Internet Key Exchange.ppt》由会员分享,可在线阅读,更多相关《IPsec- IKE, Internet Key Exchange.ppt(15页珍藏版)》请在麦多课文档分享上搜索。
1、IPsec: IKE, Internet Key Exchange,IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem. IKE solves generation of a symmetric key for a session of IPsec but without PKI man-in-the-middle attack is possible. IKE (Internet Key Exchange)
2、 creates Security Associations (SA). That is, parties in IKE negotiate keys for the SA. SA was a data structure containing keys and other relevant information for the connection. IKE is a general purpose key exchange protocol. It is used by IPsec, but it can be used by other protocols who need SAs a
3、s well. Thus IPsec SA is not directly IKE SA, but IKE SA can be converted to IPsec SA (or to SA of some other protocol). IKE is a formally checked cryptoprotocol. IKE is rather complicated, usually a secure cryptoprotocol is complicated. The following description of IKE may feel rather technical.,IP
4、sec: IKE, Internet Key Exchange,General IKE creates SA, refreshes them and deletes them. IKE has the following exchanges: Phase one (creation of IKE SA): There are two modes for phase one: main mode or aggressive mode Phase two (creation of IPSec SA): there is only one mode: quick mode Maintenance o
5、f IKE SA Negotiation of private Diffie-Hellman groups What the last exchange means is that in the phase one there are predefined several ways to use Diffie-Hellman, but one can define own ways also using the last exchange. IKE protocol initial message exchanges are not encrypted. IKE uses (normally)
6、 the UDP port 500.,IPsec: IKE,The predefined Diffie-Hellman groups in IKE: (group here means only an agreement of the algorithm) 1. MODP group with a 768-bit modulus 2. MODP group with a 1024-bit modulus 3. ECP group with a 155-bit modulus 4. EC2N group with a 185-bit modulus 5. MODP group with a 16
7、80-bit modulus What this means is that you can use discrete logarithm problem (see Diffie-Hellman algorithm from a previous lecture) noted as MODP and the number p for A=ga mod p must have the defined length. The algorithm family EC2N is a family of elliptic curve cryptoalgorithms. They give good se
8、curity level with shorter keys and less processing. ECP 155 is about as secure MODP 768, respectively EC2N 185 about as good as MODP 1024.,IPsec: IKE,In the first part of the IKE exchange, an authentication method is agreed. There are five authentication methods 1) preshared keys 2) digital signatur
9、e with DSA 3) digital signature with RSA 4) authentication via exchange of encrypted nonces 5) revised method 4) This method is agreed via exchange of IKE SA. Exchange of IKE SA contains also some secret information. The peers generate four secrets: SKEYID, SKEYID_d, SKEYID_a and SKEYID_e. Both side
10、s take part in creating the secrets.,IPsec: IKE,Generation of the secrets: Each side contributes a cookie (CKY-x) and a nonce (Nx) to SKEYID generation (x=i (initiator) or r (responder). A nonce is simply a pseudo-random number, a cookie is generated by taking a hash from some data. For preshared ke
11、y authentication SKEYID=PRF(preshared key, Ni|Nr) For signature authentication Diffie-Hellman type gxy is used: SKEYID=PRF(Ni|Nr, gxy) For encrypted nonce authentication: SKEYID=PRF(hash(Ni|Nr), CKY-i|CKY-r) Here | denotes concatenating the data, so Ni|Nr = nonce from initiator + nonce from responde
12、r. PRF is a result of a hash function, usually HMAC.,IPsec: IKE,All other secrets are derived from SKEYID: SKEYID_d=PRF(SKEYID, gxy|CKY-i|CKY-r|0) SKEYID_a=PRF(SKEYID, SKEYID_d|gxy|CKY-i|CKY-r|1) SKEYID_e=PRF(SKEYID, SKEYID_a|gxy|CKY-i|CKY-r|2) Why all these secrets? SKEYID_d is used for deriving ke
13、ying data for IPSec SKEYID_a is used for integrity and data source authentication SKEYID_e is used to encrypt IKE messages. Different keys must be used for security purposes. Because of the hash function PRF, the original secret SKEYID cannot be calculated from the derived secrets. Why so many optio
14、ns in IKE (remember, many options were one reason OSI failed to gain popularity) ?,IPsec: IKE,cookie exchange IKE uses the following cookie generation method: a cookie is the result of hashing a unique identifier of the peer (peers IP address, port and protocol), a secret known only to the generator
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IPSECIKE INTERNETKEYEXCHANGEPPT
