IPSEC Tutorial
IPSEC Tutorial
PC
Public
Network
PC
Enterprise
Router Router
Enterprise LAN#2
LAN#1
PC Server
PC
Public
End-to-end Network
PC
authentication
and/or encryption
Enterprise
Router Router
Enterprise LAN#2
LAN#1
End-to-end
authentication
PC Server and/or encryption
PC
Public
End-system to Network
ROUTER PC
authentication
and/or encryption
Enterprise
Router Router
Enterprise LAN#2
LAN#1
Router-to-router
authentication
PC Server
and/or encryption
Enterprise
LAN
Enterprise
LAN Router Router
Public
Network Enterprise
LAN
Enterprise Router Router
LAN
PC
Server
Public
Router Network Enterprise
LAN
Enterprise Router
LAN
PC
Server
Public
Router Network Enterprise
LAN
Enterprise Router
LAN
aXA*XE aXB*XE
Tutorial on Network Security: Sep
02/04/20 18
2003
Diffie-Hellman key generation
Issues with the algorithm:
– What is the value of q, a?
Make available several sets, and let the parties negotiate
– Man-in-the-middle attack
Use some form of authentication
– Denial of service attack, arises from address-spoofing
Use cookies:
– Replay attacks
Use nonces