第十一讲-协议安全课件(2).ppt
- 【下载声明】
1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
3. 本页资料《第十一讲-协议安全课件(2).ppt》由用户(三亚风情)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- VIP专享 VIP 专享 第十一 协议 安全 课件
- 资源描述:
-
1、School of computer,SCUEC1Lecture 11 Protocols and securityProtocols and Security()school of School of computer,SCUEC2Lecture 11 Protocols and securityIPSecSchool of computer,SCUEC3Lecture 11 Protocols and securitySecurity Issues in IP|source spoofing|replay packets|no data integrity or confidentiali
2、ty DOS attacks Replay attacks Spying and moreFundamental Issue:Networks are not(and will never be)fully secureSchool of computer,SCUEC4Lecture 11 Protocols and securityIPSec and SSL|IPSec lives at the network layer|IPSec is transparent to applicationsapplicationtransportnetworklinkphysicalSSLOSUserN
3、ICIPSecSchool of computer,SCUEC5Lecture 11 Protocols and securityAn IPSec scenarioSchool of computer,SCUEC6Lecture 11 Protocols and securityIPSec and Complexity|IPSec is a complex protocol|Over-engineeredLots of generally useless extra features|FlawedSome serious security flaws|Interoperability is s
4、erious challengeDefeats the purpose of having a standard!|Complex|Did I mention,its complex?School of computer,SCUEC7Lecture 11 Protocols and securityIPSec ArchitectureESPAHIKEIPSec Security PolicyEncapsulating SecurityPayloadAuthentication HeaderThe Internet Key ExchangeSchool of computer,SCUEC8Lec
5、ture 11 Protocols and securityIKE and ESP/AH|Two parts to IPSec|IKE:Internet Key ExchangeMutual authenticationEstablish shared symmetric keyTwo“phases”like SSL session/connection|ESP/AHESP:Encapsulating Security Payload for encryption and/or integrity of IP packetsAH:Authentication Header integrity
6、onlySchool of computer,SCUEC9Lecture 11 Protocols and securityIPsec servicesSchool of computer,SCUEC10Lecture 11 Protocols and securityIKESchool of computer,SCUEC11Lecture 11 Protocols and securitySecurity Associations|a one-way relationship between sender&receiver that affords security for traffic
7、flowIf a peer relationship is needed,for two-way secure exchange,then two security associations are required.|uniquely identified by 3 parameters:Security Parameters Index(SPI)IP Destination AddressSecurity Protocol Identifier|has a number of other parametersseq no,AH&EH info,lifetime etc|have a dat
8、abase of Security Associations|Security services are afforded to an SA for the use of AH or ESP,but not both.School of computer,SCUEC12Lecture 11 Protocols and securityAuthentication Header(AH)|provides support for data integrity&authentication of IP packetsend system/router can authenticate user/ap
9、pprevents address spoofing attacks by tracking sequence numbers|based on use of a MACHMAC-MD5-96 or HMAC-SHA-1-96|parties must share a secret keySchool of computer,SCUEC13Lecture 11 Protocols and securityEncapsulating Security Payload(ESP)|provides message content confidentiality&limited traffic flo
10、w confidentiality|can optionally provide the same authentication services as AH|supports range of ciphers,modes,paddingincl.DES,Triple-DES,RC5,IDEA,CAST etcCBC&other modespadding needed to fill block size,fields,for traffic flowSchool of computer,SCUEC14Lecture 11 Protocols and securityIKE|IKE has 2
11、 phasesPhase 1 IKE security association(SA)Phase 2 AH/ESP security association|Phase 1 is comparable to SSL session|Phase 2 is comparable to SSL connection|Not an obvious need for two phases in IKE|If multiple Phase 2s do not occur,then it is more expensive to have two phases!School of computer,SCUE
12、C15Lecture 11 Protocols and securityIKE Phase 1|Four different“key”optionsPublic key encryption(original version)Public key encryption(improved version)Public key signatureSymmetric key|For each of these,two different“modes”Main modeAggressive mode|There are 8 versions of IKE Phase 1!|Evidence that
13、IPSec is over-engineered?School of computer,SCUEC16Lecture 11 Protocols and securityIKE Phase 1|Well discuss 6 of 8 phase 1 variantsPublic key signatures(main and aggressive modes)Symmetric key(main and aggressive modes)Public key encryption(main and aggressive)|Why public key encryption and public
14、key signatures?Always know your own private keyMay not(initially)know other sides public keySchool of computer,SCUEC17Lecture 11 Protocols and securityIKE Phase 1|Uses ephemeral Diffie-Hellman to establish session keyAchieves perfect forward secrecy(PFS)|Let a be Alices Diffie-Hellman exponent|Let b
15、 be Bobs Diffie-Hellman exponent|Let g be generator and p prime|Recall p and g are publicSchool of computer,SCUEC18Lecture 11 Protocols and securityIKE Phase 1:Digital Signature(Main Mode)|CP=crypto proposed,CS=crypto selected|IC=initiator“cookie”,RC=responder“cookie”|K=h(IC,RC,gab mod p,RA,RB)|SKEY
16、ID=h(RA,RB,gab mod p)|proofA=h(SKEYID,ga,gb,IC,RC,CP,“Alice”)AliceAliceBobIC,CPIC,RC,CSIC,RC,ga mod p,RAIC,RC,E(“Alice”,proofA,K)IC,RC,gb mod p,RBIC,RC,E(“Bob”,proofB,K)School of computer,SCUEC19Lecture 11 Protocols and securityIKE Phase 1:Public Key Signature(Aggressive Mode)|Main difference from m
17、ain modeNot trying to protect identitiesCannot negotiate g or pAliceBobIC,“Alice”,ga mod p,RA,CPIC,RC,“Bob”,RB,gb mod p,CS,proofBIC,RC,proofASchool of computer,SCUEC20Lecture 11 Protocols and securityMain vs Aggressive Modes|Main mode MUST be implemented|Aggressive mode SHOULD be implementedIn other
18、 words,if aggressive mode is not implemented,“you should feel guilty about it”|Might create interoperability issues|For public key signature authenticationPassive attacker knows identities of Alice and Bob in aggressive modeActive attacker can determine Alices and Bobs identity in main modeSchool of
19、 computer,SCUEC21Lecture 11 Protocols and securityIKE Phase 1:Symmetric Key(Main Mode)|Same as signature mode except KAB=symmetric key shared in advance K=h(IC,RC,gab mod p,RA,RB,KAB)SKEYID=h(K,gab mod p)proofA=h(SKEYID,ga,gb,IC,RC,CP,“Alice”)AliceBobIC,CPIC,RC,CSIC,RC,ga mod p,RAIC,RC,E(“Alice”,pro
20、ofA,K)IC,RC,gb mod p,RBIC,RC,E(“Bob”,proofB,K)School of computer,SCUEC22Lecture 11 Protocols and securityProblems with Symmetric Key(Main Mode)|Catch-22Alice sends her ID in message 5Alices ID encrypted with KTo find K Bob must know KABTo get KAB Bob must know hes talking to Alice!|Result:Alices ID
21、must be IP address!|Useless mode for the“road warrior”|Why go to all of the trouble of trying to hide identities in 6 message protocol?School of computer,SCUEC23Lecture 11 Protocols and securityIKE Phase 1:SymmetricKey(Aggressive Mode)|Same format as digital signature aggressive mode|Not trying to h
22、ide identities|As a result,does not have problems of main mode|But does not(pretend to)hide identitiesAliceBobIC,“Alice”,ga mod p,RA,CPIC,RC,“Bob”,RB,gb mod p,CS,proofBIC,RC,proofASchool of computer,SCUEC24Lecture 11 Protocols and securityIKE Phase 1:Public Key Encryption(Main mode)|CP=crypto propos
23、ed,CS=crypto selected|IC=initiator“cookie”,RC=responder“cookie”|K=h(IC,RC,gab mod p,RA,RB)|SKEYID=h(RA,RB,gab mod p)|proofA=h(SKEYID,ga,gb,IC,RC,CP,“Alice”)AliceBobIC,CPIC,RC,CSIC,RC,ga mod p,RABob,“Alice”BobIC,RC,E(proofA,K)IC,RC,gb mod p,RBAlice,“Bob”AliceIC,RC,E(proofB,K)School of computer,SCUEC2
24、5Lecture 11 Protocols and securityIKE Phase 1:Public Key Encryption(Aggressive Mode)|K,proofA,proofB computed as in main mode|Note that identities are hiddenThe only aggressive mode to hide identitiesThen why have main mode?AliceBobIC,CP,ga mod p,“Alice”Bob,RABobIC,RC,CS,gb mod p,“Bob”Alice,RBAlice,
25、proofBIC,RC,proofASchool of computer,SCUEC26Lecture 11 Protocols and securityPublic Key Encryption Issue?|Public key encryption,aggressive mode|Suppose Trudy generatesExponents a and bNonces RA and RB|Trudy can compute“valid”keys and proofs:gab mod p,K,SKEYID,proofA and proofB|Also true of main mode
展开阅读全文