ImageVerifierCode 换一换
格式:PPT , 页数:36 ,大小:307KB ,
资源ID:376562      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-376562.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Internet Key Exchange.ppt)为本站会员(unhappyhay135)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

Internet Key Exchange.ppt

1、,Internet Key Exchange,IPSec Reminder,SAD,IPSec Reminder SA,Security Association Database (SAD) holds SAs Security Associations (SA) is a one way, cryptographically protected connection between a sender and a receiver that affords security services to traffic,Alice,Bob,IPSec Reminder SA,SA contains

2、the fields: protocol identifier (ESP or AH) mode (tunnel or transport) algorithms for encryption/ decryption/ authentication and their respective keys lifetime SPIs sequence number,IPSec Reminder Where does IKE fit in?,SAs building and managing is either: Static (manual) keys and other attributes of

3、 SA are manually configured by system administrator. Practical for small, relatively static environments. Dynamic (automated) On-demand creation of keys. Handled by IKE protocol,IKE,IKE is a protocol that builds and manages IPSec SAs between two computers that implement IPSec. IKE is the only standa

4、rd protocol for building IPSec SAs (Standard IPSec implementation must also implement IKE) IKE (like IPSec) is carried out either between a pair of hosts, a pair of security gateways or a host and a security gateway,IKE,IKE is a protocol that builds and manages IPSec SAs between two computers that i

5、mplement IPSec. IKE is the only standard protocol for building IPSec SAs (Standard IPSec implementation must also implement IKE) IKE (like IPSec) is carried out either between a pair of hosts, a pair of security gateways or a host and a security gateway,Endpoint to Endpoint Transport,Both endpoints

6、of the IP connection implement IPsec Used with no inner IP header One of the protected points can be behind a NAT node,Protected Endpoint,Protected Endpoint,IPsec Tunnel,Gateway to Gateway Tunnel,Neither point of the IP connection implements IPsec, but network nodes between them protect traffic for

7、part of the way Protection is transparent to the endpoints The inner IP header contains the IP addresses of the actual endpoints,gateway,gateway,Protected Subnet,Protected Subnet,IPsec Tunnel,Endpoint to Gateway Transport,A protected endpoint (typically a portable roaming computer) connects back to

8、its corporate network through an IPsec protected tunnel The protected endpoint will want an IP address associated with the gateway so that packets returned to it will go to the gateway and be tunneled back The protected endpoint may be behind a NAT,Protected Endpoint,gateway,Protected Subnet and/or

9、Internet,IPsec Tunnel,expectations from IKE,Secrecy and authenticity Protection against replay attacks Scalability (being suitable for big networks) Privacy and anonymity (protecting identity of players in the protocol) Protection against DOS Efficiency (both computational and minimal in the number

10、of messages) Independence of cryptographic algorithms Minimize protocol complexity Reliability,Key Exchange Protocols,Key exchange protocols goal is to agree on a shared key for the two participant Should implement- authenticity- secrecy,Long and Short Term Keys,To support authenticity parties shoul

11、d know a mutual secret key. This key is called long term key. The keys negotiated in the protocol are called short term keys. There are two types of long term keys: Pre-shared secret Public/private keys,Long and Short Term Keys,Why the need for short term keys? It is not advisable to encrypt a lot o

12、f data with the same key It is advisable to separate between encryption keys and authentication keysWhy not sending the new key encrypted using the long term key? PFS,PFS Perfect Forward Secrecy,Exposure of long term keys will not entail exposure of short term keys that are created in the current ex

13、ecution of the protocolPFS is optionally provided in IKE (detailed later),IKE version 1,IKE version 1 is a hybrid of three protocols (actually a framework and two protocols) Version 1 grew out of ISAKMP framework and OAKLEY and SKEME protocols that work within that framework.,ISAKMP (IKE version 1),

14、Stands for “Internet Security Association and Key Management” Protocol Created by NSA (National Security Agency) Framework (not really a protocol) for authentication and key exchange. This framework decides on the SAs attributes the parties will use.,ISAKMP (IKE version 1),Designed to be key exchang

15、e independent (supports many different key exchanges) In IKE version 1 ISAKMP uses part of OAKLEY and part of SKEME.,SKEME (IKE version 1),Describes a versatile key exchange technique Provides: anonymity repudiability quick key refreshment,OAKLEY (IKE version 1),Describes a series of key exchanges a

16、nd details the services provided by each Based on Diffie-Hellman algorithm but providing added security Generic in that it does not dictate specific formats,OAKLEY (IKE version 1),Characterized by five important features: Cookies to prevent clogging attacks Negotiation of a group (specifying global

17、parameters of DH) Use of nonces to ensure against replay attacks Exchange of public key values Authentication of DH to prevent man-in-the-middle attacks,Diffie-Hellman Groups,A group for the DH key exchange specifies the global parameters of DH. Each group includes the definition of 2 global paramet

18、ers and the identity of the algorithm Three of these groups are classic DH algorithm using modular exponentiation,Diffie-Hellman groups id=1,2,5,All these three groups (id=1,2,5) have: Generator = 2 For group id=1: Prime = 2768 - 2704 1 + 264 * 2638 pi + 149686 For group id=2: Prime = 21024 - 2960 1

19、 + 264 * 2894 pi + 129093 For group id=5: Prime = 21536 - 21472 1 + 264 * 21406 pi + 741804,Diffie-Hellman groups id=3,4,Over galois fields using elliptic curves.,IKE Version 2,From this point on we focus on IKE version 2IKE version 2 is a single protocol rather than three that cross reference one a

20、nother and is described in a single self-contained document,Main benefits of IKE Version 2 over Version 1,IKEv2 preserves most of the features of IKEv1. The idea behind IKEv2 was to make it as easy as possible for IKEv1 implementations to be modified for IKEv2. Later we will see that IKE is a two-ph

21、ase protocol. Version 2 greatly simplified IKE by replacing the 8 possible phase 1 exchanges with a single exchange. This single exchange provides identity hiding in 2 round trips rather than 3 in version 1,Main benefits of IKE Version 2 over Version 1,Version 2 decreased latency by allowing setup o

22、f SA to be piggybacked on the initial exchange Version 2 increased security by allowing responder to be stateless until initiator can receive at claimed IP address,Side benefits of IKE Version 2 over Version 1,cryptographic syntax replaced with one simplified syntaxa few fields were removed (ex: DOI

23、, SIT)possible error states reduced,Details and variations,IKE normally listens on UDP port 500, though may also be received on port 4500 with a slightly different format,Reliability,IKE is a reliable protocol. Initiator responsible for retransmission in the event of timeout, therefore must remember

24、 each request until it receives the corresponding response Responder retransmits a response only when it receives retransmission , therefore must remember each response until it receives a request with a larger sequence number plus window size On failure all states associated with SA are discarded,R

25、eliability,IKE definition includes recovery from transmission error: packet loss, packet replay, packet forgery,Functionality,IKE is designed to function so long as: at least one of a series of retransmitted packets reaches its destination before timing out channel not full of forged or replayed pac

26、kets (exhausting network or CPU) Even if these two minimum requirements are absent, IKE fails cleanly as though the network was broken,NAT Traversal,IPsec through a NAT introduces problems. protocols which include IP addresses of endpoint within the payload (like IPSec) necessitate that NAT understa

27、nds the protocol and modify the internal references and those in the headers In transport mode changing IP address will cause checksums to fail. In tunnel mode there are routing problems.,NAT Traversal,For that reason, IKE supports UDP encoding that is easier for NATs to process It is less efficient

28、 but is easier for NAT to process This is where port 4500 comes in. When working through a NAT it is better to pass IKE packets over port 4500 which runs the NAT-friendly protocol.,To Sum Up Overview,We talked about:IPSec SAswhat roles IKE playDesign issuesKey exchange protocols: long/short terms keys, pfsversion 1: structure and featuresversion 2ReliabilityTerms of functionalityNAT friendly protocol,

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1