Internet Protocol Security
Internet Protocol Security
7.3
Introducing IPsec
Objectives :
Describe the characteristics of IPsec.
Discuss the IPsec security services.
Explain how IPsec is implemented using the IPsec
protocol framework.
Explain the following:
Confidentiality with Encryption
Encryption Algorithms
Integrity with Hash Algorithms
IPsec Authentication
IPsec VPNs
Information from a private
network is securely transported
over a public network.
Forms a virtual network instead
of using a dedicated Layer 2
connection.
To remain private, the traffic is
encrypted to keep the data
confidential.
IPsec Functions
Defines how a VPN can be configured in a secure manner
using IP.
Framework of open standards that spells out the rules for
secure communications.
Not bound to any specific encryption, authentication,
security algorithms, or keying technology.
Relies on existing algorithms to implement secure
communications.
IPsec Functions
Works at the network layer, protecting and authenticating
IP packets between participating IPsec devices.
Secures a path between a pair of gateways, a pair of hosts,
or a gateway and host.
All implementations of IPsec have a plaintext Layer 3
header, so there are no issues with routing.
Functions over all Layer 2 protocols, such as Ethernet,
ATM, or Frame Relay.
IPsec Characteristics
IPsec characteristics can be summarized as follows:
IPsec is a framework of open standards that is
algorithm-independent.
IPsec provides data confidentiality, data integrity, and
origin authentication.
IPsec acts at the network layer, protecting and
authenticating IP packets.
IPsec Framework
Encryption Algorithms
As key length increases, it becomes more difficult
to break the encryption. However, a longer key
requires more processor resources when
encrypting and decrypting data.
Two main types of encryption are:
Symmetric Encryption
Asymmetric Encryption
Symmetric Encryption
Asymmetric Encryption
Uses different keys for encryption and decryption.
Knowing one of the keys does not allow a hacker to deduce
the second key and decode the information.
One key encrypts the message, while a second key
decrypts the message.
Public key encryption is a variant of asymmetric encryption
that uses a combination of a private key and a public key.
Typically used in digital certification and key management
Example: RSA
IPsec Authentication
IPsec VPNs support
authentication.
Device on the other end
of the VPN tunnel must
be authenticated before
the communication
path is considered
secure.
RSA signatures
Digital certificates are exchanged to authenticate peers.
Local device derives a hash and encrypts it with its private key.
Encrypted hash, or digital signature, is attached to the message
and forwarded to the remote end.
At the remote end, the encrypted hash is decrypted using the
public key of the local end.
If the decrypted hash matches the recomputed hash, the
signature is genuine.
Four basic building block of the IPsec framework that must be selected:
IPsec framework protocol A combination of ESP and AH, ESP or ESP+AH options are
almost always selected because AH itself does not provide encryption.
Confidentiality (if IPsec is implemented with ESP) DES, 3DES, or AES, AES is strongly
recommended since provides the greatest security.
Integrity Guarantees that the content has not been altered in transit using hash
algorithms (MD5 or SHA).
Authentication Represents how devices on either end of the VPN tunnel are
authenticated (PSK or RSA).
DH algorithm group Represents how a shared secret key is established between peers,
DH24 provides the greatest security.