IP Security
IP Security
Presented by
Saminathan G
Chanjay J
Arun prasath D
Gopinath R
Ram ganesh G
INTRODUCTION
• In today’s massively interconnected business world of the internet,
Intranets, branch offices and remote access, sensitive information
constantly crosses the networks.
• Without security, both public and private networks are susceptible to
unauthorized monitoring and access.
• There are different network security protocols widespread use for
protecting private and public network such as
• IP security
• Transport layer security
• Secure shell
• Hence, only IPsec protect all application traffic over an ip network.
• IP security refers to security mechanism implemented at the IP Layer to
ensure
• Integrity
• Authentication
• Confidentiality of data during transmission in the open Internet environment
• It is a protocol suite for secure IP communications that works by
• Authenticating
• Encrypting each IP pacted of a communication session.
• IPSec is a set of protocol and algorithm used to secure IP data and
network layer
Goals of IPsec
• To verify source of IP packets
• Authentication
• To prevent replaying of old packets
• To protect integrity and/or confidentiality of packets
• Data Integrity/Data Encryption
IPsec Architecture
• Architecture: Covers the genera concepts, security requirement,
definitions and mechanisms defining IPsec technology
AUTHENTICATION HEADER
• Provides source authentication
• Protects against source spoofing
• Provides connectionless data integrity
• Protects against replay attacks
• Use monotonically increasing sequence numbers
• Protects against denial of service attacks
• NO protecting for confidentiality
AH DETAILS
• Use 32-bt monotonically increasing sequence number to avoid
replay attacks
• Use cryptographically strong hash algorithms to protect data
integrity(96-bit)
• Use symmetric key cryptography
• HMAC-SHA-96, HMAC-MD5-96
AH PACKET DETAILS
ENCAPSULATING SECURITY
PAYLOAD
• Provides all that AH offers, and
• In addition provides data confidentiality
• Uses symmetric key encryption
• Same as AH:
• Use 32-bit sequence number to counter replaying attacks
• Use integrity check algorithms
• Only in ESP:
• Data confidentiality
• Uses symmetric key encryption algorithms to encrypt packets
ESP PACKET DETAILS
TRANSPORT AND TUNNEL
MODES
KEY MANAGEMENT
• The key management portion of IPSec involves
• The determination and distribution of the secret keys
• A typical requirement is four keys for communication between two
applications :
• Transmit and receive pairs for both AH and ESP
• Supports for two types of key management
• Manual
• Automatic
SECURITY ASSOCIATION
• SA describes a particular kind of secure connection between one device
and another.
• Security Associations are key to IPSEC’s authentication and confidentiality
mechanisms.
• SAs are needed to negotiate in the exchange of the “shared secret”
process