CNS Unit 3
CNS Unit 3
• IP Security: IP overview, IP
Security architecture, Security Header,
security payload, combining security encapsulating
Authentication association,
Key management.
Electronic mail Security
□ Email is one of the most widely used and best network service.
□ In both , there is the need of security services for these mails and
mailing list like :
□ Threats to E-mail :
□ Loss of Confidentiality , Loss of integrity , Lack of Data
origin Authentication , Lack of non Repudiation , Lack of
notification of receipt .
Electronic mail Security
□ Threats Enabled by E-mail :
□ 1. Exposure of systems to malicious code : Email is one of the tool by
which computer viruses spread.
□ 4. Receiver decrypts & recovers hash code using RSA with senders
public key
□ 3. The session key is encrypted with RSA using receiver’s public key
and pre-pended with message.
PGP Operation – Confidentiality
□ 4.The receiver uses RSA with its private key to decrypt and recover
the session key.
□ 5. The session key is used to decrypt the message.
PGP Operation – Confidentiality and
Authentication
□ Confidentiality and Authentication : To increase the trust of any
service, both confidentiality and authentication should be provided.
□ Receiver decrypts the signed message by using its private key and
recovers session key.
PGP Operation – Confidentiality and Authentication
□ when both services are used, the sender first signs the message with
its own private key, then encrypt the message with a session key ,
and finally encrypts the session key with receiver’s public key.
PGP Operation –
Compression ,email
compatibility
□ Compression:
□ By default , PGP compresses the message after applying the
signatures but before encryption.
□ Email Compatibility :
□ In all above cases PGP sends message in encrypted form
(binary data)
□ 2. Allow user to have multiple public –key/ private –key pairs because
user may change his key pair from time to time.
□ So some means is needed for identifying particular keys.
□ 3. Each PGP entity must maintain a file of its own public/private key
pairs as well as file of public keys of correspondents.
Key management of
PGP
□ Session key generation :
□ Algorithm used for session key is CAST-128.
□ The cipher feedback mode generates two 64-bit ciphers that forms
session key.
□ Key Identifiers :
□ One important observation drawn in PGP is that it has multiple public
keys.
□ How recipient know which of its public keys was used to encrypt the
session key.
Key management of PGP
□ To solve this problem key identification is required.
□ Other need is send the sender’s public key ID whose private key used
for signature.
□ Public-key ring contains all the public-keys of other PGP users known
to this user, indexed by key ID
□ Private-key ring contains the public/private key pair(s) for this user,
indexed by key ID & encrypted keyed from a hashed passphrase.
PGP Key Rings
PGP Trust
Model
□ PGP does not include any specification for establishing certifying
authorities pr for establishing trust, it provides a better way of using
trust ,associating trust with public keys and exploiting trust
information.
□ Figure shows public key ring structure regarding trust. Complete trust
is given for You , each other node in the key ring has OWNERTRUST
value.
□ A,B are partially trusted by You to sign keys , D,E,F are fully trusted by
You to sign keys, C,H,M ,N,O,P,Q are keys that are deemed legitimate
by You .G,I,J,K are not having trust.
Model
S/MIME (Secure/Multipurpose Internet Mail
Extensions)
□ Signed data
□ Clear-signed data
□ Registration request
□ Security labels
□ Applicable to use over LANs, across public & private WANs, & for the
Internet
□ IP Security Overview :
□ In 1994, Internet Architecture Board (IAB) issued report “security in
the Internet Architecture “RFC 1636.
□ The outcome of the study and IAB’s report is the protocol for
providing security at the IP levels called as IP security.
□ Applications of IP Security :
□ IPSec provided the capability to provide secure communication
across LAN, WAN and internet.
□ Following are the examples of uses/applications of
IPSec :
□ Creation of virtual private network :
□ Using IPSec, any organization can develop its own secure ,VPN on
internet.
□ So ,need of private network is reduced and it enables to rely on
internet saving costs and overhead.
□ Secure Remote access over internet :
□ IPSec enables ‘remote user to securely access company’s network.
□ 2. Firewall uses IPSec to restrict all those incoming packets which are
not using IP.
Security
□ Since firewall is the only way to enter from the internet into the
organization , restricted packets cannot enter.
2. IP Security Services :
□ IPSec provides security services at the IP layer by a system
which select required security protocols
□
□ Determine algorithms and cryptographic keys required to provide the
requested services.
Architecture
□ IPSec architecture use two protocols to provide security at
IP level :
□ Authentication Header (AH): an authentication protocol
designated by header of protocol.
□ The AH and ESP include this field in their respective header which
allow the receiving system to select type of SA under which received
packet is processed.
Security parameter Index :32 bit used to represent SA with this packet.
Authentication Data : This field is not fixed length field and contains
Integrity check value used for authentication of AH packet.
(ESP)
It is a protocol which provides data confidentiality, also provides origin
authentication , data integrity checking and replay protection.
□ The two nodes can communicate with each other by sharing their
respective secret keys through SA.
Associations
□ Second combination : In this combination , the security of individual
nodes cannot be achieved by implementing services of IPSec,
□ Instead the security is provided at the gateways.
□ The end users sitting anywhere in the world can use the internet to
access the organizational workstations by firewall.
Key Management
□ Key Management is related to the identification and distribution of
the secret keys.
□ IKE protocol helps to negotiate the settings between two hosts that
implement IPSec.
Key Management
□ IKE components :
□ Internet key exchange is based on three protocol shown:
□ Oakley :
□ It is based upon Diffie Hellman algorithm and uses mechanism
called cookies.
□ Feature of Oakley :
□ Five important features of Oakley algorithm :
□ 1. It employs a mechanism known as “cookies” to oppose clogging
attacks.
Key Management
□ In clogging attack, an opponent forges the source address of the
authenticated user and sends the public Diffie Hellman key to the
victim.
□ Every ISAKMP message must follow UDP transport layer protocol for
its implementation and consist of the following two sections :
□ ISAKMP Header
□ ISAKMP Payload
Key Management
□ ISAKMP Header format :
□ The fields of ISAKMP message are as :
□ Next Payload : This field is an 8-bit field which defines first payload
type in ISAKMP message
□ Notification Payload : This Payload can obtain both ISAKMP and DOI
specific data and is used to transmit informational data such as error
conditions .