Thursday, May 03, 2001SMPLS-Encryption of Payloads1 Secure MPLS Encryption of Payloads V.Rajan - 705073 S.Vidyaraman - 703848.

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

Encrypting Wireless Data with VPN Techniques
Identifying MPLS Applications
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Conventional Encryption: Algorithms
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
P Security Survey and Recommendations By: Ryon Coleman October 16, 2003.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Wired Equivalent Privacy (WEP)
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Multi-Protocol Label Switching
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Forwarding MPLS VPN Packets.
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
Industrial Strength Security for an Insecure World
1 Fabio Mustacchio - IPS-MOME 2005 – Warsaw, March 15th 2005 Overview of RSVP-TE Network Simulator: Design and Implementation D.Adami, C.Callegari, S.Giordano,
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
CCSDS IPsec Compatibility Testing 10/28/2013 OKECHUKWU MEZU CHARLES SHEEHE CCSDS GRC POC.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS Introduction Module 4: Frame Mode MPLS Implementation.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
Case Study: ATM (+ MPLS)
Brief Introduction to Juniper and its TE features Huang Jie [CSD-Team19]
Security Enhancement for Wireless Communication Bassam Almogahed.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Measuring of the time consumption of the WLAN’s security functions Jaroslav Kadlec, Radek Kuchta, Radimír Vrba Dept. of Microelectronics.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Optical Networking & Grid Middleware Final Presentation May 25, 2004.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Chapter 2 Symmetric Encryption.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Seetha Manickam Modified by Sarjana Singh.
IP Traffic Engineering RSP draft-shen-ip-te-rsp-01.txt Naiming Shen Albert Tian Jun Zhuang
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Use of PE-PE IP/GRE/IPsec for MPLS PWs draft-raggarwa-pwe3-pw-over-ip- 00.txt Rahul Aggarwal
Network Layer Security Network Systems Security Mort Anvari.
Tunnel SAFI draft-nalawade-kapoor-tunnel- safi-03.txt SSA Attribute draft-kapoor-nalawade-idr- bgp-ssa-01.txt.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
March 2015 TRILL Link Security March 2015 TRILL Link Security
WEP & WPA Mandy Kershishnik.
Y.1711 & LSP-PING Dave Allan Nortel Networks
IEEE i Dohwan Kim.
PW security measures PWE3 – 65th IETF 21 March 2005 Yaakov (J) Stein.
Counter With Cipher Block Chaining-MAC
Presentation transcript:

Thursday, May 03, 2001SMPLS-Encryption of Payloads1 Secure MPLS Encryption of Payloads V.Rajan S.Vidyaraman

Thursday, May 03, 2001SMPLS-Encryption of Payloads2 Overview 1. Motivation 2. Implementation 3. Testing 4. Conclusion 5. References

Thursday, May 03, 2001SMPLS-Encryption of Payloads3 Motivation Security The need for it :: Do I say any more ? Efficiency Underlying fast switching paradigm offered by MPLS shouldn't be compromised at the expense of providing security Proper choice of encryption Algorithm

Thursday, May 03, 2001SMPLS-Encryption of Payloads4 Implementation Encryption - Entire MPLS Payload Encryption Algorithm - RC4 Stream Cipher Not too “heavyweight” Relatively fast MPLS L3 L4 ……………………….. Header Encrypted

Thursday, May 03, 2001SMPLS-Encryption of Payloads5 Testing - Network Setup Lemondrop Gumdrop Spinach Pumpkin Potato Ingress / EgressCoreIngress / Egress

Thursday, May 03, 2001SMPLS-Encryption of Payloads6 Conclusion Present implementation Hop by hop encryption across one LSP NO “dynamic” key exchange mechanism for authentication Scope for improvement by formulating a better form of key exchange Extension of IKE Possible investigation of integration into LDP No such draft yet

Thursday, May 03, 2001SMPLS-Encryption of Payloads7 References RC4 Algorithm / Code : AES Algorithm / Code : html SMPLS Draft : 01.txt Implementation extended from: