cryptography and network security
play

Cryptography and Network Security IPSEC Security architecture and - PowerPoint PPT Presentation

Cryptography and Network Security IPSEC Security architecture and protocol stack Secure applications: Applicaz. (SHTTP) PGP, SHTTP, SFTP, or SSL/TLS Security down in the TCP protocol stack -SSL between TCP IPSEC and applic. layer


  1. Cryptography and Network Security IPSEC

  2. Security architecture and protocol stack Secure applications: Applicaz. (SHTTP) PGP, SHTTP, SFTP,… or SSL/TLS Security down in the TCP protocol stack -SSL between TCP IPSEC and applic. layer - IPSEC between TCP IP and IP

  3. Why not security at link layer? • Security at link layer: protect IP packet at each hop (there is a shared key among two router that are connected by a link) • Good: all traffic is encrypted (including IP header) • Bad: Svantaggi: – Cooperation among router is required – Significant computatonal effort (when a router receives a packet it decodes it, then it encode for the next hop)

  4. IP Security • have considered some application specific security mechanisms – eg. S/MIME, PGP, Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • It is important to have a security protocol that can be used by all applications • IP security: security between IP and TCP

  5. IPSec • IP Security mechanism provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet • Very very complicate specification (RFC 2401/2402/2406/2408...) • mandatory in IPv6, optional in IPv4

  6. IPSec firewall

  7. Benefits of IPSec • a firewall/router provides strong security to all traffic crossing the perimeter • is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users (allow to realize Virtual Private Networks) • can provide security for individual users if desired

  8. IPSec Services • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets – a form of partial sequence integrity • Confidentiality (encryption) • Limited traffic flow confidentiality

  9. IPSec Architecture

  10. Security Associations • A one-way relationship between sender & receiver that affords security for traffic flow • Defined by 3 main parameters: – Security Parameters Index (SPI) – IP Destination Address – Security Protocol Identifier – Other: sequence number, anti replay window, info. On used algorithms, lifetime etc. • There is a database of Security Associations

  11. Authentication Header (AH) • provides support for data integrity & authentication of IP packets – end system/router can authenticate user/app – prevents address spoofing attacks by tracking sequence numbers • based on use of a MAC – HMAC-MD5-96 or HMAC-SHA-1-96 • users must share a secret key

  12. Authentication Header

  13. Transport & Tunnel Modes

  14. Authentication Header (AH): transport mode Note that only part of the header is authenticated

  15. Authentication Header (AH): tunnel mode

  16. Encapsulating Security Payload (ESP) • provides message content confidentiality & limited traffic flow confidentiality • can optionally provide the same authentication services as AH • supports range of ciphers, modes, padding – DES, Triple-DES, RC5, IDEA, CAST etc – CBC most common – padding to meet blocksize of the packet

  17. Encapsulating Security Payload

  18. Transport vs Tunnel Mode ESP • transport mode is used to encrypt & optionally authenticate IP data – data protected but header left in clear – Adversary can do traffic analysis but is efficient – good for ESP host to host traffic • tunnel mode encrypts entire IP packet – add new header for next hop – slow – good for VPNs (Virtual Private Networks, gateway to gateway security)

  19. ESP - encoding and authentication: Transport mode

  20. ESP - encoding and authentication: Tunnel mode

  21. Combining Security Associations • SA’s can implement either AH or ESP • to implement both need to combine SA’s – form a security bundle • have 4 cases (see next)

  22. Combining Security Associations

  23. Key Management • IPSEC handles key generation & distribution • typically need 2 pairs of keys – 2 per direction for AH & ESP • manual key management – System administrator manually configures every system • automated key management – automated system for on demand creation of keys for SA’s in large systems – has Oakley & ISAKMP elements

  24. Oakley • a key exchange protocol • based on Diffie-Hellman key exchange • adds features to address weaknesses – cookies, groups (global params), nonces, DH key exchange with authentication • can use arithmetic in prime fields or elliptic curve fields

  25. ISAKMP • Internet Security Association and Key Management Protocol • provides framework for key management • defines procedures and packet formats to establish, negotiate, modify, & delete SAs • independent of key exchange protocol, encryption alg, & authentication method

  26. ISAKMP

  27. SSL (Secure Socket Layer) • transport layer security service • uses TCP to provide a reliable end-to-end service – originally developed by Netscape – version 3 designed with public input – subsequently became Internet standard known as TLS (Transport Layer Security) • SSL has two layers of protocols

  28. SSL Architecture

  29. SSL Architecture • SSL session – an association between client & server – created by the Handshake Protocol – define a set of cryptographic parameters – may be shared by multiple SSL connections • SSL connection – a transient, peer-to-peer, communications link – associated with 1 SSL session

  30. SSL Record Protocol • confidentiality – using symmetric encryption with a shared secret key defined by Handshake Protocol – IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128 – message is compressed before encryption • message integrity – using a MAC with shared secret key – similar to HMAC but with different padding

  31. SSL - Record Protocol

  32. Authentication: MAC Simila to HAMC (uses concatenation instead of EXOR) Hash(MAC_secret_key || pad2 ||hash(MAC_secret_key || pad1 || seqNum || SSLcompressed.type || SSLcompressed.length || SSLcompressed.fragment)) – pad1=0x36 repeated 48 times (MD5); 40 times (SHA-1) – pad2=0x5C repeated … – SSLcompressed.type = high level protocol used to process segment

  33. Metodi di codifica • Segment 2 14 = 16384 bytes • compression in SSLv3: – Compression must be no loss and must guarantee to reduce pack size – default: no compressione • Several encryption methods: – block ciphers: IDEA (128) RC2-40, DES-40, DES (56), 3DES (168), – Stream Cipher: RC4-40, RC4-128 – Smart card: Fortezza

  34. SSL - record

  35. SSL - Payload

  36. SSL Change Cipher Spec Protocol • one of 3 SSL specific protocols which use the SSL Record protocol • a single message • causes pending state to become current • hence updating the cipher suite in use

  37. SSL Alert Protocol • conveys SSL-related alerts to peer entity • severity • Two possibilities: warning or fatal (close connection) • specific alert • unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter • close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown • compressed & encrypted like all SSL data

  38. SSL Handshake Protocol Most complex part of SSL • allows server & client to: – authenticate each other – to negotiate encryption & MAC algorithms – to negotiate cryptographic keys to be used • comprises a series of messages in phases – Establish Security Capabilities – Server Authentication and Key Exchange – Client Authentication and Key Exchange – Finish

  39. SSL Handshake Protocol

  40. Protocollo di Handshake 4 steps 1. Hello: determina funzionalità sicurezza 2. Server sends certificate, asks for certificate and starts excahnge session keys 3. Client sends certificate and continues exchages of keys 4. End of handshalke protocol: encoded methods changes Note: some requests are optional clear separation between handshake and the rest (to avoid attacks)

  41. Handshake : paramaters Message type parameters Hello-request null Client-hello version,nonce(32B),sessionID, propos. cipher and compress. method Server_hello <as before> Certificate X.509v3 chain of certificates Server_key_exchange info, signature of mess. Certificate_request typ of cert., authority Server_done null Certificate_verify signature of certificate Client_key_exchange info, signature of mess. Finished hash of all exchanged messag. (integrity of handshake prot.)

  42. Handshake Protocol - step 1 Initialization  : Client_hello: client to Server – Version = + highest SSL version used by client – 32 bit time stamp + 28 bytes random (a pseudo number generator is required) – sessionID: 0  0: nex connection; ≠ 0 update previous connection – Proposed crypto methods: ordered sequence of acceptable alg. (first prefered method) – Compression algorithms: ordered sequence of acceptable alg.  : Server_hello: server to client – ack all above

Recommend


More recommend