Cns 4,5,6
Cns 4,5,6
1. Message Integrity:
The cryptography systems that we have studied so far provide secrecy, or confidentiality, but not
integrity.
However, there are occasions where we may not even need secrecy but instead must have
integrity(Data will not changed).
Difference:
The two pairs (document / fingerprint) and (message / message digest) are similar, with some
differences.
The document and fingerprint are physically linked together. The messa ge and message digest
can be unlinked separately, and, most importantly, the message digest needs to be
safe from change.
Note: The message digests needs to be safe from change.
Checking Integrity:
Second Preimage Resistance: In this criterion, an adversary is provided with the value of
x and is asked to compute the value of x1 ≠ x, such that h(x) = h(x1).
If it difficult for the attacker to perform this computation we claim that the hash
function is second pre-image resistant.
Collision Resistance: Collision of a hash function is the event when two values x and
x1, such that x1 ≠ x hash to the same value, i.e., h(x) = h(x 1).
Random Oracle Model:
2. Message Authentication:
A message digest guarantees the integrity of a message. It guarantees that the
message has not been changed.
A message digest does not authenticate the sender of the message.
When Alice sends a message to Bob, Bob needs to know if the message
is coming from Alice.
To provide message authentication, Alice needs to provide proof that it is Alice
sending the message and not a fraud.
The digest created by a cryptographic hash function is normally called a
Modification Detection Code (MDC). This code can detect any
modifications in the message.
What we need for message authentication is a Message Authentication Code
(MAC).
MAC Security
How can Eve forge a message without having the key?
1. If size of the key allows exhaustive search, Eve may try all possible
keys to digest the message.
2. Use preimageattack.
3. Given some pairs of messages and their MACs, Eve can
manipulate them to come up with a new message and its digest
Note: The security of a MAC depends on the security of the underlying hash algorithm.
Nested MAC:
To improve MAC security, nested MACs were designed in which hashing is performed
twice.
In 1st step, the key is concatenated with the message and is hashed to
create an intermediate digest.
In 2nd step, the key is concatenated with the intermediate digest to create the final digest.
HMAC (Hashed MAC):
HMAC algorithm stands for Hashed or Hash based Message Authentication Code
it uses the Hashing concept twice, so great resistant to attacker
HMAC consists of twin benefits of Hashing and MAC
The working of HMAC starts with taking a message M containing blocks of length b
bits.
An input signature is padded to the left of the message and the whole is given as
input to a hash function which gives us a intermediate HMAC.
Intermediate HMAC again is appended to an output signature and the whole is applied
a hash function again, the result is our final HMAC of n bits
CMAC (Cipher based MAC)
SHA-512
Whirlpool
Merkle-Damgard Scheme
SHA – 512
SHA-512 is family of Secure Hash Algorithm
SHA-512 creates a 512 bit message digest .
The original message divided into multiple blocks of size 1024bits.
The Processing of each block involves 80 rounds
Each block of size(1024bits) can be assumed as 16 words of size 64bits
The maximum size of message is less than 2128. This means that if the length of a
message equal to or greater than 2128, it will not be processed by SHA-512
SHA-512 based on Merkle-Damgard scheme.
STEPS:
The message is padded with 1000000…. To make the message multiples of 1024.
2. Append length of the message:
A block of 128 bits is appended to the message. Contains the length of the original message.
Before addition of the length of message , we need to pad as specified in the first step.
The size of padding bits is calculated
as: (|M|+|P|+128)=0 mod 1024
|P|=-|M|-128 mod 1024
Example: What is the number of padding bits if the length of the original message is 2590
Solution: |P|=-2590-128 mod 1024
=-2718 mod 1024 = -670 mod 1024
=(1024-670) mod 1024 = 354
The padding consists of one 1 followed by 353 0’s
Length Field and Padding:
Before the message digest can be created, SHA-512 requires the addition of a 128-bit length field (0-(2128-
1)to the message that defines the length of the message in bits.
Compression Function
The heart of the algorithm is a module that consists of 80 rounds; this module is labeled as F in Block
Diagram.
Each round t takes as input the 512-bit buffer value, abcdefgh, and updates the contents of the buffer.
Each round t makes use of a 64-bit value Wt, derived from the current 1024-bit block being
processed (Mi).
Each round t also makes use of an additive constant Kt (64-bit)
The output of the 80th round is added to the input to the first round (Hi-1) to produce Hi.
80-Word Input Sequence
Constants
…..
Inclusion
A conventional signature is included in the document; it is part of the document.
But when we sign a document digitally, we send the signature as a separate document.
Verification Method
For a conventional signature, when the recipient receives a document, he compares the signature on the
document with the signature on file.
For a digital signature, the recipient receives the message and the signature. The recipient needs to apply a
verification technique to the combination of the message and the signature to verify the authenticity.
Relationship
For a conventional signature, there is normally a one-to-many relationship between a signature and
documents. For a digital signature, there is a one-to-one relationship between a signature and a
message.
Duplicity
In conventional signature, a copy of the signed document can be distinguished from the original one on
file. In digital signature, there is no such distinction unless there is a factor of time on the document.
Figure shows the digital signature process. The sender uses a signing algorithm to sign the message. The
message and the signature are sent to the receiver. The receiver receives the message and the signature and
applies the verifying algorithm to the combination. If the result is true, the message is accepted; otherwise,
it is rejected.
The drawback of Asymmetric key cryptosystems that is ―inefficient for long messages‖ .t In a digital
signature system can be overcome by ―signing the digest of the message‖.
SERVICES
Message Authentication
• A secure digital signature scheme, like a secure conventional signature can
provide message authentication
• Example, Bob can verify that the message is sent by Alice because Alice’s public key is used in
verification.
Message Integrity
The integrity of the message is preserved even if we sign the whole message because we cannot get the
same signature if the message is changed.
Nonrepudiation
Nonrepudiation can be provided using a trusted party.
Confidentiality
Attack Types
1. Key-Only Attack
In key-only attack, the public key of A is available to every one and C makes use of this fact and try to
recreate the signature of A and digitally sign the documents that A does not intend to do.
2. Known-Message Attack
In the known message attack, C has few previous messages and signatures of A. Now C tries to forge
the signature of A on to the documents that A does not intend to sign by using the brute force method by
analyzing the previous data to recreate the signature of A
3. Chosen-Message Attack
In this method C has the knowledge about A’s public key and obtains A’s signature on the messages and
replaces the original message with the message C wants A to sign with having A’s signature on them
unchanged.
Forgery Types
1. Existential Forgery
Adversary can create a pair (message, signature), such that the signature of the message is valid.
Adversary has no control on the messages whose signature is forged
2. Selective Forgery
Adversary is able to create valid signatures on a message
chosen by someone else, with a significant probability.
Adversary controls the messages whose signature is forged
The sender uses his own private key tosign the documemnet, the receivr uses the senders public key to
verify it
As a trivial example, suppose that Alice chooses p = 823 and q = 953, and calculates n = 784319. The
value of f(n) is 782544. Now she chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a message with the value of M = 19070 to
Bob. She uses her private exponent, 160009, to sign the message:
Alice sends the message and the signature to Bob. Bob receives the message and the signature. He
calculates
DSS Overview
KEY MANAGEMENT
SYMMETRIC-KEY DISTRIBUTION
• Symmetric-key cryptography is more efficient than asymmetric-key
cryptography for enciphering large messages.
• Symmetric-key cryptography, however, needs a shared secret key between two parties.
• Example: If Alice needs to exchange confidential messages with N people, she need N
different keys and if N people need to exchange with each other, they need N(N-1)
keys. If 1 million people need to communicate with each other , they need more than
trillions of keys.
• This proble normally referred as N2 problem, because the number of required
keys for N entitesis N2
• We also has a problem of the distribution of keys through the internet which is unsecure.
A practical solution for the above problem is the use of a trusted thord party, referred as Key-Distribution
Center( KDC )
1. Alice sends a request to the KDC stating that she needs a session secrete key between her
and Bob
2. KDC inform Bob about Alice request
If Bob agrees, a session key is created between the two.
Flat Multiple KDCs
When the number of people using a KDC increases, the system becomes unmanageable.
To solve the problem, we use multiple KDCs. We devide the world into domains
In this, KDCs are arranged in hierarchical model, the international KDC are at root, then national next and
local KDCs at lower level.
Session Keys
A KDC creates a secret key for each member. This secret key can be used only between the member and
the KDC, not between two members.
A session symmetric key between two parties is used only once.
KERBEROS
Kerberos is an authentication protocol, and at the same time a KDC, that has become very popular.
Several systems, including Windows 2000, use Kerberos.
Originally designed at MIT, it has gone through several versions.
KERBEROS Servers
Steps:
1. Alice chooses a large random integer number x and calculates R1=gx mod p
2. Bob chooses another large number y and calculates R2=gy mod p
3. Alice sends R1 to Bob and Bob sends R2 to Alice
4. Alice calculates key K=(R2)x mod p
5. Bob calculates key K=(R1)y
mod p Where K is the symmetric key
for the session
The symmetric key in the Diffie-Hellman method is K=gxy mod p
Let us give a trivial example to make the procedure clear. Our example uses small numbers, but note that
in a real situation, the numbers are very large. Assume that g = 7 and p = 23. The steps are as follows:
PUBLIC-KEY DISTRIBUTION
In asymmetric-key cryptography, people do not need to know a symmetric shared key; everyone shields a
private key and advertises a public key.
In public key key cryptography, everyone have access to every one’s public key: public keys are
available to the public.
So, public keys need to be distributed.
1. Public Announcement
2. Trusted Center
3. Controlled Trusted Center
4. Certification Authority
5. X.509
6. Public-Key Infrastructures (PKI)
Public Announcement
The normal method is to announce public keys publicly, but is not secure
While using a service from any server application, the client and server exchange a lot of information on the
underlying intranet or Internet. We are aware of fact that these information transactions are vulnerable to
various attacks.
Network security entails securing data against attacks while it is in transit on a network.
E-mail Security
Nowadays, e-mail has become very widely used network application. Email is one of the most widely
used and regarded network services. Currently message contents are not secure, may be inspected either
in transit or by suitably privileged users on destination system.
E-mail Architecture:
PGP Notation:
Ks = session key used in symmetric encryption scheme
PRa = private key of user A, used in public-key encryption scheme
PUa = public key of user A, used in public-key encryption scheme
EP = public-key encryption
DP = public-key decryption
EC = symmetric encryption
DC = symmetric decryption
H = hash function
|| = concatenation
Z = compression using ZIP algorithm
R64 = conversion to radix 64 ASCII format1
As a default, PGP compresses the message after applying the signature but before encryption. This has the
benefit of saving space both for e-mail transmission and for file storage.
The placement of the compression algorithm, indicated by Z for compression and Z -1 for decompression.
So can store uncompressed message & signature for later verification & because compression is non
deterministic uses ZIP compression algorithm
PGP Operation – Email Compatibility
When PGP is used, at least part of the block to be transmitted is encrypted. If only the signature
service is used, then the message digest is encrypted (with the sender’s private key). If the
confidentiality service is used, the message plus signature (if present) are encrypted (with a one-
time symmetric key).
Thus, part or all of the resulting block consists of a stream of arbitrary 8 -bit octets.
However, many electronic mail systems only permit the use of blocks consisting of ASCII text.
To accommodate this restriction, PGP provides the service of converting the raw 8 -bit binary
stream to a stream of printable ASCII characters. The scheme used for this purpose is radix-64
conversion.
Each group of three octets of binary data is mapped into four ASCII characters. This format also
appends
• Defines a format for text messages that are sent using electronic mail
• Messages are viewed as having an envelope and contents
• The envelope contains whatever information is needed to accomplish transmission and
delivery
• The contents compose the object to be delivered to the recipient
• RFC 5322 standard applies only to the contents
The content standard includes a set of header fields that may be used by the mail system to create the
envelope
The overall structure of a message that conforms to RFC 5322 is very simple. A message consists of some
number of header lines (the header) followed by unrestricted text (the body). The header is separated from
the body by a blank line. Put differently, a message is ASCII text, and all lines up to the first blank line
are assumed to be header lines used by the user agent part of the mail system.
A header line usually consists of a keyword, followed by a colon, followed by the keyword’s arguments;
the format allows a long line to be broken up into several lines. The most frequently used keywords are
From, To, Subject, and Date. Here is an example message:
Hello. This section begins the actual message body, which is delimited from the
message heading by a blank line.
The Five Header Fields Defined in MIME: The five header fields defined in MIME are
• MIME-Version: Must have the parameter value 1.0. This field indicates that the message
conforms to RFCs 2045 and 2046.
• Content-Type: Describes the data contained in the body with sufficient detail that the
receiving user agent can pick an appropriate agent or mechanism to represent the data to
the user or otherwise deal with the data in an appropriate manner.
• Content-Transfer-Encoding: Indicates the type of transformation that has been used to
represent the body of the message in a way that is acceptable for mail transport.
• Content-ID: Used to identify MIME entities uniquely in multiple contexts.
• Content-Description: A text description of the object with the body; this is useful when the
object is not readable (e.g., audio data).
MIME Content Types:
• Enveloped data: This consists of encrypted content of any type and encrypted content
encryption keys for one or more recipients.
• Signed data: A digital signature is formed by taking the message digest of the content to
be signed and then encrypting that with the private key of the signer. The content plus
signature are then encoded using base64 encoding. A signed data message can only be
viewed by a recipient with S/MIME capability.
• Clear-signed data: As with signed data, a digital signature of the content is formed.
However, in this case, only the digital signature is encoded using base64. As a result,
recipients without S/MIME capability can view the message content, although they cannot
verify the signature.
• Signed and enveloped data: Signed-only and encrypted-only entities may be nested, so
that encrypted data may be signed and signed data or clear - signed data may be
encrypted.
S/MIME Messages:
• S/MIME secures a MIME entity with a signature, encryption, or both. forming a MIME
wrapped
Public-Key Cryptography Standards(PKCS) object have a range of content-types:
enveloped data o signed data, clear-signed data o registration request,certificate only message
VeriSign Certificates There are several companies that provide certification authority (CA) services. For
example, Nortel has designed an enterprise CA solution and can provide S/MIME support within an
organization. There are a number of Internet-based CAs, including VeriSign, GTE, and the U.S. Postal
Service.
Enhanced Security Services : three enhanced security services have been proposed in an
Internet draft. The three services are : Signed receipts, Security labels, Secure mailing
lists
13
Cryptography and Network Security B.Tech IV Year I Sem
140
Cryptography and Network Security B.Tech IV Year I Sem
141
Cryptography and Network Security B.Tech IV Year I Sem
5. Supported Cipher Suites − SSL supports RSA, Diffie-Hellman and Fortezza cipher
suites. TLS protocol supports all suits except Fortezza.
6. Client Certificate Types − TLS defines certificate types to be requested in a
certificate_request message. SSLv3 support all of these. Additionally, SSL support
certain other types of certificate such as Fortezza.
7. CertificateVerify and Finished Messages −
142
Cryptography and Network Security B.Tech IV Year I Sem
1. In SSL, complex message procedure is used for thecertificate_verify message. With
TLS, the verified information is contained in the handshake messages itself thus
avoiding this complex procedure.
2. Finished message is computed in different manners in TLS and SSLv3.
8. Padding of Data − In SSL protocol, the padding added to user data before encryption
is the minimum amount required to make the total data-size equal to a multiple of the
cipher’s block length. In TLS, the padding can be any amount that results in data-size
that is a multiple of the cipher’s block length, up to a maximum of 255 bytes.
SSH is a network protocol that runs on top of the TCP/IP layer. It is designed to
replace the TELNET which provided unsecure means of remote logon facility.
SSH provides a secure client/server communication and can be used for tasks
such as file transfer and e-mail.
SSH2 is a prevalent protocol which provides improved network communication
security over earlier version SSH1.
143
Cryptography and Network Security B.Tech IV Year I Sem
Session Key Establishment − After authentication, the server and the client agree upon cipher
to be
used. Session keys are generated by both the client and the server. Session keys are generated before
user authentication so that usernames and passwords can be sent encrypted. These keys are generally
replaced at regular intervals (say, every hour) during the session and are destroyed immediately after
use.
Data Integrity − SSH uses Message Authentication Code (MAC) algorithms to for data
integrity check. It is an improvement over 32 bit CRC used by SSH1.
User Authentication Protocol:
In this part of SSH authenticates the user to the server. The server verifies that access is given to
intended users only. Many authentication methods are currently used such as, typed passwords,
Kerberos, public-key authentication, etc.
Connection Protocol:
This provides multiple logical channels over a single underlying SSH connection
SSH Services:
SSH provides three main services that enable provision of many secure solutions. These services are
briefly described as follows −
Secure Command-Shell (Remote Logon) − It allows the user to edit files, view the contents of
directories, and access applications on connected device. Systems administrators can remotely
start/view/stop services and processes, create user accounts, and change file/directories permissions
and so on. All tasks that are feasible at a machine’s command prompt can now be performed securely
from the remote machine using secure remote logon.
Secure File Transfer − SSH File Transfer Protocol (SFTP) is designed as an extension for SSH -2 for
secure file transfer. In essence, it is a separate protocol layered over the Secure Shell protocol to
handle file transfers. SFTP encrypts both the username/password and the file data being transferred. It
uses the same port as the Secure Shell server, i.e. system port no 22.
Port Forwarding (Tunneling) − It allows data from unsecured TCP/IP based applications to be
secured. After port forwarding has been set up, Secure Shell reroutes traffic from a program (usually a
client) and sends it across the encrypted tunnel to the program on the other side (usually a server).
Multiple applications can transmit data over a single multiplexed secure channel, eliminating the need
to open many ports on a firewall or router.
144
Cryptography and Network Security B.Tech IV Year I Sem
UNIT -VI:
Network Security-II : Security at the Network Layer: IPSec, System Security
1. IP SECURITY OVERVIEW
IPSec is an Internet Engineering Task Force (IETF) standard suite of protocols that provides data
authentication, integrity, and confidentiality as data is transferred between communication points
across IP networks.
IPSec provides data security at the IP packet level. A packet is a data bundle that is organized for
transmission across a network, and it includes a header and payload (the data in the packet).
IPSec ELEMENTS:
IPSec contains the following elements:
Encapsulating Security Payload (ESP): Provides confidentiality, authentication, and integrity.
Authentication Header (AH): Provides authentication and integrity.
Internet Key Exchange (IKE): Establish shared symmetric key. Provides key management and
Security Association (SA) management.
APPLICATIONS OF IPSec:
IPSec provides the capability to secure communications across a LAN, across private and public
WANs, and across the Internet.
Examples of its use include the following:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners:
IPSec can be used to secure communication with other organizations, ensuring authentication
and confidentiality and providing a key exchange mechanism.
Enhancing electronic commerce security:
Even though some Web and electronic commerce applications have built-in security protocols,
the use of IPSec enhances that security.
BENEFITS OF IPSEC:
IPSec provides strong security within and across the LANs.
Firewall uses IPSec to restrict all those incoming packets which are not using IP. Since firewall
is the only way to enter into an organization, restricted packets cannot enter.
IPSec is below the transport layer (TCP, UDP) and so is transparent to applications.
There is no need to change software on a user or server system when IPSec is implemented in
the firewall or router.
Even if IPSec is implemented in end systems, upper- layer software, including applications, is
not affected. IPSec can be transparent to end users.
145
Cryptography and Network Security B.Tech IV Year I Sem
IPSec can provide security for individual users if needed.
IPSec Scenario:
IPSec Architecture:
Architecture covers general concepts of security requirements, definitions, and mechanisms defining
IPSec technology.
146
Cryptography and Network Security B.Tech IV Year I Sem
Encapsulating Security Payload(ESP): The ESP header is designed to provide a mix of security
services in IPv4 and IPv6. ESP may be applied alone, in combination with AH, or in a nested fashion.
It consists of an encapsulating header and trailer used to provide encryption or combined
encryption/authentication. Current specification is RFC 4303
Encryption algorithms: Encryption algorithms encrypt data with a key. The ESP module in IPsec
uses encryption algorithms.
Domain of Interpretation(DOI): DOI is the identifier which support both AH and ESP protocols. It
contains values needed for documentation related to each other.
Key Management: It contains the document that describes how the keys are exchanged between
sender and receiver.
147
Cryptography and Network Security B.Tech IV Year I Sem
SHA…) and session keys are used. SA used by IPsec to track all these parameters for each session.
You will need to configure SA parameters and monitor SAs on Cisco routers and the PIX Firewall.
• A separate pair of IPSec SAs are set up for AH and ESPtransform.
• Each IPSec peer agrees to set up SAs consisting of policy parameters to be used during the
IPSec session.
• The SAs are unidirectional for IPSec so that peer 1 will offer peer 2 a policy.
• If peer 2 accepts this policy, it will send that policy back to peer 1. This establishes two one-
way SAs between the peers.
• Two-way communication consists of two SAs, one for each direction.
• Each SA consists of values such as destination address, a security parameter index (SPI), the
IPSec transforms used for that session, security keys, and additional attributes such as IPSec
lifetime.
A security association is uniquely identified by three parameters:
• Security Parameters Index (SPI): A bit string assigned to this SA and having local
significance only. SPI is located in AH and ESP headers. SPI enables the receiving system
under which the packet is to process.
• IP Destination Address: It is the end point address of SA which can be end user system or a
network system.
• Security Protocol Identifier: security protocol identifier indicates whether the associations is
an AH or ESP.
All the SAs are maintained in Security Association Database(SAD)
SA Parameters:
Sequence Number Counter: A 32-bit value used to generate the Sequence Number field in AH or
ESP headers.
Sequence Counter Overflow: A flag indicating whether overflow of the Sequence Number
Counter should generate an auditable event and prevent further transmission of packets on this
SA.
Anti-Replay Window: Avoid duplicate of packets
AH Information: Authentication algorithm, keys, key lifetimes, and related parameters being used
with AH.
ESP Information: Encryption and authentication algorithm, keys, initialization values, key lifetimes,
and related parameters being used with ESP (required for ESP implementations).
Lifetime of This Security Association: A time interval or byte count after which an SA must be
replaced with a new SA or terminated.
IPSec Protocol Mode: This parameter represents the type of mode used for IPSec implementation.
The mode may be a Tunnel or transport.
148
Cryptography and Network Security B.Tech IV Year I Sem
Tunnel Mode:
With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the
original packet, encrypts it, adds a new IP header and sends it to the other side.
Original IP Header not visible to attacker(if it is using ESP).
Attacker does not know which hosts are talking.
Transport Mode:
IPSec Transport mode is used for end-to-end communications, for example, for communication
between a client and a server or between a workstation and a gateway (if the gateway is being treated
as a host).
When using the transport mode, only the IP payload is encrypted. AH or ESP provides protection for
the IP payload. The original IP header is not changed,
So the passive attackers can see who is talking.
149
Cryptography and Network Security B.Tech IV Year I Sem
1. Next Header: Identifies the type of header that immediately following the AH.
2. Payload Length: Length of Authentication Header in 32-bit words.
3. Reserved: For future use.
4. Security Parameters Index: Identifies a security association.
5. Sequence Number: A monotonically increasing counter value.
6. Authentication Data (variable): A variable-length field that contains the Integrity Check Value
(ICV), or MAC, for this packet.
150
Cryptography and Network Security B.Tech IV Year I Sem
Security Policy(SP)
A Security Policy is a set of rules that define the type security applied to a packet when it is to be sent or
when it has arrived. It defines the network traffic at the IP layer.
IPSec protects your private network from internet attacks through end-to-end security.
151
Cryptography and Network Security B.Tech IV Year I Sem
IPSec policy is determined primarily by the interaction of two databases, the Security Association
Database(SAD) and the Security Policy Databases(SPD)
IPSec policies must be carefully designed, configures, coordinated and managed to ensure that IPSec
communication is successful.
IPSec Policies defines which traffic to be protected, how it is to be protected, and with whom to protect
it.
The sending host determines what policy is appropriate for the packet, depending on various "Selectors"
by checking in the Security Policy Database (SPD).
"Selectors" can include Source and Destination IP Addresses, Name (User ID ir a System Name),
Transport Layer Protocols (TCP or UDP) or Source and Destination Ports.
The Security Policy Database (SPD) indicates what the policy is for a particular packet. If the packet
requires IPsec processing, it will be it is passed to the IPsec module for the required processing.
typical requirement is four keys for communication between two applications: transmit and receive pairs
for both AH and ESP.
• Manual: A system administrator manually configures each system with its own keys and with the
keys of other communicating systems. This is suitable for small, relatively static environments.
• Automated: An automated system enables the on-demand creation of keys for SAs and facilitates
the use of keys in a large distributed system.
The default automated key management protocol for IPSec is referred to as ISAKMP/Oakley .
152
Cryptography and Network Security B.Tech IV Year I Sem
• Oakley is a key exchange protocol based on the Diffie-Hellman algorithm but providing added
security.
• Oakley is generic in that it does not dictate specific formats.
2. The exchange requires no preexisting infrastructure other than an agreement on the global parameters.
However, there are a number of weaknesses to Diffie-Hellman, as pointed outin
Features of Oakley:
An ISAKMP message consists of an ISAKMP header followed by one or more payloads. All of this is
carried in a transport protocol. The specification dictates that implementations must support the use of
UDP for the transport protocol.
153
Cryptography and Network Security B.Tech IV Year I Sem
154