NS My Notes
NS My Notes
Mutual Authentication:
Devices that want to communicate must verify each other’s identity.
Uses Extensible Authentication Protocol (EAP) for authentication.
Secure Communication:
Uses MACsec Key Agreement (MKA) protocol to establish encryption.
Ensures confidentiality and integrity of transmitted data.
ESP Format
The structure of an ESP packet is shown in Fig. 3.5.1. It includes different fields to ensure secure
communication.
Field Name Size (Bits) Purpose
Security Parameter Identifies a security association (SA) using source and
32
Index (SPI) destination addresses.
Field Name Size (Bits) Purpose
Sequence Number 32 Prevents replay attacks by numbering each packet uniquely.
Contains encrypted data (transport layer segment in transport
Payload Data Variable
mode or entire IP packet in tunnel mode).
0–255
Padding Extra bits added for encryption or alignment.
bytes
Padding Length 8 Specifies the number of padding bytes used.
Next Header 8 Indicates the type of encapsulated data in the payload.
Stores integrity check values to verify the authenticity of the
Authentication Data Variable
packet.
Padding in ESP
The Padding Field is used for different purposes:
1. Encryption Requirements – Some encryption algorithms require the plain text to be a
multiple of a specific number of bytes. Padding helps achieve this.
2. Alignment of Cipher Text – Ensures the encrypted data is an integer multiple of 32-bits for
proper processing.
3. Traffic Flow Confidentiality – Adds extra padding to hide the actual payload length, making
it harder for attackers to analyze network traffic patterns