CSC 526 Chapter 9 IPSec Fall 2023
CSC 526 Chapter 9 IPSec Fall 2023
SSL
service
• For SSL such connections are peer-to-peer
connection
relationships
• Connections are transient
• Every connection is associated with one session
SSL session
• Define a set of cryptographic security parameters
which can be shared among multiple connections
• Are used to avoid the expensive negotiation of new
security parameters for each connection
A session state is defined by the
following parameters:
Cipher Algorithms
• RC4, RC2, DES, 3DES
MAC Algorithms
• MD5 or SHA-1
Cipher type:
• Block or stream
HashSize
Key Material
IV Size
IsExportable
Cryptographic
Computations
• Two further items are of interest:
• The creation of a shared master secret by means of the key
exchange
• The shared master secret is a one-time 48-byte value generated
for this session by means of secure key exchange
Cipher Algorithms
• RC4, RC2, DES, 3DES
MAC Algorithms
• MD5 or SHA-1
Cipher type:
• Block or stream
HashSize
Key Material
IV Size
IsExportable
Transport Layer
Security (TLS)
• An IETF standardization Differences include:
initiative whose goal is to
produce an Internet • Version number
standard version of SSL • Message Authentication
Code
• Is defined as a Proposed • Pseudorandom function
Internet Standard in RFC • Alert codes
5246 • Cipher suites
• RFC 5246 is very similar to • Client certificate types
SSLv3
• Certificate_verify and
Finished Messages
• Cryptographic computations
• Padding
Chapter 9
IP Security
“If a secret piece of news is divulged by a spy
before the time is ripe, he must be put to
death, together with the man to whom the
secret was told.”
type of
ver head. length
len service
fragment
16-bit identifier flgs
offset
time to upper header
live layer checksum
32 bit source IP address
• An optional ICV (Integrity Check Value) field is present only if the integrity
service is selected and is provided by either a separate integrity algorithm or a
combined mode algorithm that uses an ICV
• ICV is computed after the encryption is performed
• This order of processing facilitates reducing the impact of DoS attacks
• Because the ICV is not protected by encryption, a keyed integrity algorithm must
be employed to compute the ICV
head. type of
ver length
len service
fragment
16-bit identifier flgs offset
time to upper header
live layer checksum
data
(variable length,
typically a TCP
or UDP segment)
Combining Security
Associations
• An individual SA can implement either the AH or ESP protocol but not both
• Cookie depends on
• IP address and port
• Secret known only to host
• Cookie = hash( source and dest IP and port + local secret )