Internet Security CS457 Seminar Zhao Cheng
Security attacks interruption, interception, modification, fabrication passive attack, active attack
Security services Confidentiality Authentication Integrity Nonrepudiation
IPSec services SA(Security Association): one way relationship, identified by SPI(Security Parameter Index). IP Destination Address. Security Protocol Identifier: AH(authentication Header) ESP(Encapsulation Security Payload)
Two modes Transport mode: protection for upper layer protocol. Tunnel mode: protection to entire IP packet.
Authentication header Header definition. Anti-Replay service Integrity check value
Encapsulating Security Payload Format. Encryption and authentication.
Key management Manual: configured by system administrator with its own keys and keys of other systems. Automated: on demand creation of keys for SAs, ISAKMP(Internet Security Association and Key Management Protocol) by default.
Benefit of IPSec Strong and easy security for group behind firewall. Transparent to applications. Transparent to end users. Security for individual users can be provided.
TLS(transport layer security) Object: reliable end to end security over TCP. Construction: two layers of protocols.
SSL Record Protocol Record Protocol Operation and format.
SSL Handshake Protocol Phases: Establish Security Capabilities. Server Authentication and Key Exchange. Client Authentication and Key Exchange. Finish.
Example on handshake protocol
Services of TSL Integrity: by cryptographic checksums. Confidentiality: by encryption on SSL payloads. Authentication: by handshake protocol.
Summary Attacks on network security and corresponding security services. IPSec: Services approaches on IP layer. TLS: Services approaches on transport layer.