Chap5_1 Flashcards
What is IP
The Internet Protocol (IP) for interconnecting systems
IPsec Overview
IPsec is NOT a single protocol. Instead,
IPsec provides a set of security algorithmsand a general framework that Includes: Authentication (Tunnel mode, transport mode), confidentiality by encryption, and
key management system
IPsec Can be added to either IPv4 or IPv6 by means of ….
additional headers
IPsec Includes:……
Authentication, confidentiality, and
key management
IPsec Authentication uses ….. on entire IP packet ….. or IP packet except ………..
Authentication uses HMAC on entire IP packet
(Tunnel mode) or IP packet except IP header
(Transport mode)
Confidentiality by
encryption (Tunnel or
transport modes)
IP protocol vulnerabilities
IP spoofing Intruders (create packets with false IP addresses)
Eavesdropping and packet sniffing( read transmitted information)
Benefits of IPsec
Transparent to applications (below transport layer (TCP, UDP)
Provide security for individual users
IPsec ensures redirect message comes from the router to which the initial packet was sent
IPsec Architecture
Security features are implemented as……
Authentication is
Encryption is
extension headers
Authentication Header (AH)
Encapsulating Security Payload (ESP) header
IPsec Architecture
Support for Security features is….. for
IPv6 and ……. for IPv4
mandatory
optional
Security Associations (SA) is …….. IPsec connection
Same as
e
e
IPsec composition
IPsec is composed of ……….. plane and ……….. plane.
The …………… plane contains ………….. which is used to establish …………………..
The ……………. plane is made up from …….. and ………….. Both provides framework for validating, encrypting and authentication data
control, data
control, IKE (Internet Key exchange) , authenticated keys
data, AH (authentication header) , ESP (encapsulating security payload)
Both AH and ESP are vehicles for access
control, They may be applied ….. to provide a desired set of
security services in IPv4 and IPv6.
alone or in combination with each other
IPSec uses two distinct protocols, ……. and ………
Authentication Header (AH)
Encapsulating Security Payload (ESP)
AH provides
Connectionless integrity
Data origin authentication and
An optional anti-replay service.
ESP may provide
Confidentiality (encryption) Limited traffic flow confidentiality Connectionless integrity Data origin authentication, and Anti-replay service.
Slide 27
TRUE
Authentication Header (AH) Protocol provides ………. and ………. but does not provide …….
Authentication Header (AH) Guards against ………..
Authentication uses ……….. implies the two parties share a ……….
AH header inserted between ……….. and ………
Provides source authentication, data integrity, NO
confidentiality
Guards against replay attacks
Authentication uses MAC implies the two parties share
a secret key.
AH header inserted between IP header, data field.
In Transport Mode (AH Authentication) Authentication covers the ……. packet,
excluding ………………..
Authentication covers the entire packet,
excluding mutable fields
Tunnel Mode (AH Authentication) ……….. original IP packet is authenticated
AH inserted between …………… and new …………….
…………. header may contain different IP
addresses
Entire original IP packet is authenticated
AH inserted between original IP header and
new outer IP header
Outer IP header may contain different IP
addresses
Encapsulating Security Payload (ESP)
Protocol
Provides secrecy, host authentication (optional),
data integrity, limited traffic flow confidentiality
Tunnel Mode
ESP Encryption and Authentication
New IP header will contain sufficient information
for routing but not for traffic analysis
Why multilayer Security
Because Most layers have control information that must be decoded before decryption is possible and these control information must be sent in the clear