Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
|
|
|
- Horatio Wilson
- 10 years ago
- Views:
Transcription
1 Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration Alan Mink, Sheila Frankel and Ray Perlner National Institute of Standards and Technology (NIST), 100 Bureau Dr., Gaithersburg, MD ABSTRACT We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, we propose how QKD could be integrated into these security applications. For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applications. KEYWORDS Quantum Key Distribution, Quantum Networks, IPsec, TLS, Network Security Protocols 1. Introduction Quantum Key Distribution (QKD) [1, 2] is a technology, based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems, to generate and distribute provably secure cipher keys over unsecured channels. It does this using single photon technology and can detect potential eavesdropping via the quantum bit error rates of the quantum channel. Sending randomly encoded information on single photons produces a shared secret that is a random string and the probabilistic nature of measuring the photon state provides the basis of its security. A QKD system consists of a quantum channel and a classical channel. The quantum channel is only used to transmit qbits (single photons) and must consist of a transparent optical path (fiber, free-space and optical switches, no routers, amplifiers or copper). It is a lossy and probabilistic channel. The classical channel can be a conventional IP channel (not necessarily optical), but depending on system design it may need to be dedicated and closely tied to the quantum channel for timing requirements. It would not be unusual for the quantum and classical channels to share a common fiber via wavelength division multiplexing (WDM). A quantum network connects a number of point-to-point QKD systems together so that one can develop shared secrets between users anywhere on that sub-network. A quantum network would be an embedded sub-network within a conventional communication network for the purpose of developing shared secrets, not transporting secure messages. The physical link (e.g., fiber) that carries the classical channel could certainly support general messages, but not within the QKD classical channel. Commodity security protocols, such as Internet Protocol Security (IPsec) and Transport Layer Security (TLS, often referred to as Secure Sockets Layer or SSL), currently handle the bulk of today s internet encrypted traffic. Although these protocols are standardized, they have no 101
2 standard application programming interface (API) and a number of different implementations exist. With the advent of quantum computers, several of the cryptographic constructs underlying the security model of IPsec and TLS will be broken. Breakthroughs in cryptanalysis continue to present a possible threat as well. Quantum-resistant replacements will have to be found for public-key cryptography and for Diffie-Hellman key agreement. Using quantum keying material within these protocols would solve this problem. Alternate approaches to this problem are being considered via quantum resistant public key cryptographic algorithms [3], although promising, all such algorithms are based on unproven computational complexity assumptions, and if these assumptions are shown to be false, the algorithms will be insecure. QKD does not solve the authentication problem and would rely on conventional authentication techniques (public key or pre-shared secret). QKD does offer perfect forward security and therefore past QKD secrets will remain secure, even when the public key algorithm is broken (since, at most, it was only used for QKD authentication). Although quantum computers are not yet a reality, it is necessary to develop alternative technologies well in advance, since past secrets will be at risk once the threat is realized. There are a few commercial QKD systems and active QKD research programs in Europe [4] and Japan [5] as well as a recently formed European QKD standards effort [6]. This level of activity suggests that QKD and the threats to current cryptography are being taken seriously. 2. QKD Overview The BB84 [7] protocol and its variants are the only known provably secure QKD protocols. Other QKD protocols (e.g., differential phase shift keying [8]), although promising, have yet to be proven secure. The BB84 protocol consists of four stages (See Fig 1). The first stage is the transmission of the randomly encoded single photon stream over the quantum channel from Alice (the sender) to Bob (the receiver) to establish the initial raw key. Alice maintains a temporary database of the state of each photon sent. The second stage is sifting, where Bob sends a list of photons detected and their basis, but not their value, back to Alice over the classical channel. Basis refers to how the photons were measured. Photons can be encoded in one of two bases (e.g., horizontal/vertical or diagonal polarization). There is only one photon and it can only be measured once, so only one basis can be applied. If it s measured in the correct basis the value measured will be correct. If it s measured in the wrong basis, the value will be random. Alice retains, from its database, only those entries received by Bob in the correct basis and sends this revised list back to Bob over the classical channel. Bob retains only those entries on this revised list. Alice and Bob now have a list of sifted keys. These lists are of the same length but may have some errors between them. This is the quantum bit error rate and it is an indication of eavesdropping. The third stage is reconciliation to correct these errors. Cascade [9, 10] and its variants are the predominant reconciliation algorithm that exchange parity and error correcting codes to reconcile errors without exposing the key values. This process requires a number of communications between Bob and Alice, over the classical channel, and results in a list smaller than the sifted list. The fourth stage is privacy amplification, which computes a new (smaller) set of bits from the reconciled set of bits using a hashing algorithm and requires no communication between Alice and Bob. Since the reconciled set of bits were random, the resulting privacy amplified set will also be random. Unless the eavesdropper knows all or most of the original bits, she will not be able to compute the new set. The benefits of QKD are that it can generate and distribute provably secure keys over unsecured channels and that potential eavesdropping can be detected. QKD is not subject to threats from quantum computers or break through algorithms that can defeat the current computationally complex key exchange methods. Because QKD generates random strings for shared secrets, attaining a QKD system and reverse engineering its theory of operation would yield no mechanism to defeat QKD. QKD can use existing optical media infrastructure for both quantum 102
3 and classical channels, but the quantum channel photons cannot pass through amplifiers or routers. Optically transparent switches are okay and thus switched networks of QKD systems are possible and have been demonstrated. Figure 1. QKD protocol flow The limitations of QKD are that it s currently a costly technology and requires dedicated hardware, it s still in its infancy, it s restricted in distance until quantum repeaters are developed, its key generation rate decreases with distance, engineered realization of components are subject to attack and it requires an optically transparent path for the quantum channel. The end-to-end distance can be extended by concatenating multiple short distance QKD systems to span a longer distance, however this does require a multi-hop propagation of the key to the distant end point or sequential encryption/decryption of the message along this path. In either case, the intermediate points must all be trusted systems for this strategy to be successful. QKD requires its own sub-network to generate keys, although this sub-network may use/share existing communication infrastructure (i.e., existing fiber and transparent optical switches). Unlike current key exchange methods that are purely software based and have the range of the entire network, QKD is limited to the sub-network that connects its hardware. So if QKD were invoked between two nodes in the network, some additional checking would be needed to verify that both nodes can support QKD and that there is a QKD sub-network connection between them that is operational. Although security proofs exist for the theoretical BB84 protocol, no engineering models exist for it. Such engineering models would be necessary to determine when an implementation s parameters stray too far from the theoretic and are no longer covered by the security proofs. Real systems based on engineered components that are not identical and do not operate exactly as the theory requires have been shown to be vulnerably to attack [11]. Without solutions to 103
4 these limitations, QKD may not be a viable alternative security technology and may be limited to niche markets. Engineering shrinks and mass production could make the hardware small and more affordable, while future research may solve many of the current limitations. A small QKD network [12] has been demonstrated that interfaced with IPsec, but did not include the use of a One-Time Pad cipher [13]. Another small QKD network [14, 15] using a One-Time Pad cipher was demonstrated, but it did not use any existing security protocol utility (e.g., IPsec, TLS, etc). The encryption/decryption was built directly into the application. What is needed as these QKD networks emerge, grow and eventually interact, are guidelines and standards as to how they should integrate with existing network infrastructure and security protocols. 3. IPsec Overview IPsec [16, 17] is a suite of protocols that provides security to Internet communications at the network layer, and thus IPsec must also handle any non-malicious errors in the data stream. The most common current use of IPsec is to provide a Virtual Private Network (VPN), either between two locations (gateway-to-gateway) or between a remote user and an enterprise network (host-to-gateway). IPsec can also provide end-to-end security. Security controls exist for network communications at various layers of the ISO model. Controls applied at the network layer apply to all applications and are not applicationspecific. For example, all network communications between two hosts or networks can be protected at this layer without modifying any applications on the clients or the servers. Network layer controls also provide a way for network administrators to enforce certain security policies. Another advantage of network layer controls is that since IP information (e.g., IP addresses) is added at this layer, the controls can protect both the data within the packets and the IP information for each packet. However, network layer controls provide less control and flexibility for protecting specific applications than transport and application layer controls. IPsec is a protocol with the following components: Two security protocols, Authentication Header (AH) [18] and Encapsulating Security Payload (ESP) [19] comprise the base IPsec protocol. The IPsec ESP header provides confidentiality and/or integrity protection. The AH header provides integrity protection without confidentiality. Both ESP and AH provide data origin authentication, access control, and, optionally, replay protection and/or traffic analysis protection. ESP is used much more frequently than AH because of its encryption capabilities, as well as other operational advantages. For a VPN, which requires confidential communications, ESP is the natural choice. Internet Key Exchange (IKE) protocol is IPsec s preferred key management protocol. IKE [20, 21] negotiates the cryptographic algorithms and related settings to be used for AH and ESP. IPsec also uses IKE to negotiate IPsec connection settings; authenticate endpoints; define the security parameters of IPsec-protected connections; and manage, update, and delete IPsec-protected communication channels. The protections provided by IPsec, and the protection that IKE provides to its own key exchange traffic, require the use of cryptographic algorithms, which include encryption algorithms, MACs (Message Authentication Codes, used for integrity protection), and prfs (Pseudo-Random Functions, which generate secret keys and other values used within the IPsec protocols). IPsec security mechanisms are not tied to any specific cryptographic algorithms. Standard default algorithms are, however, specified in order to support interoperability [22, 23]. 104
5 In order to use automated key management protocols such as IKE to negotiate and manage IPsec protections and secret keys between two peers, those peers must be able to definitively authenticate each other (i.e. verify each others identities) in the course of the IKE negotiation. The methods used within IKE are: pre-shared secret keys, Public Key Certificates, or, for hostto-gateway IPsec, a combination of a certificate for the gateway and an Extensible Authentication Protocol (EAP)-based authentication method for the host. An IKE negotiation generally consists of two round-trip exchanges between the peers, referred to as the initiator and the responder. In the first exchange, the initiator proposes a list of cryptographic algorithms acceptable to the initiator for the protection of further IKE traffic (a protected channel called the IKE Security Association, or IKE SA), and sends its own public Diffie-Hellman (DH) value. The responder selects a single set of cryptographic algorithms from that list, and sends its public DH value. At this point, the peers are ready to generate the shared secret that will be used to generate all of the secret keys. Once a shared secret is established a two-step process is used to generate the set of secret keys: SKEYSEED = prf(randoms, DH shared secret) Secret Keys = prf(skeyseed, randoms) where randoms include nonces and other information. Additional iterative calculations may be required to supply the requisite amount of keying material. The keys are used to protect the IKE SA and the IPsec-protected data between the peers (i.e. the IPsec or child SA). Once these keys are generated, all further IKE traffic is encrypted and integrity-protected. In the second exchange, the peers authenticate each other s identities by signing or MACing some data: all of the previous messages exchanged by the peers, plus the peers nonces (random values) and other values. The peers also negotiate the set of cryptographic algorithms that will be used to provide IPsec protection to data exchanges between the peers, and the secret keys that will provide this protection are calculated. 4. TLS Overview The Transport Layer Security (TLS) protocol [24] is based on the earlier Secure Sessions Layer (SSL) protocol and is explicitly invoked by an application. Although it is now used in a wide variety of applications, its most common use is for the encryption of traffic between a web server and a browser. It is assumed that a mechanism such as the transmission control protocol (TCP) is in place to correct any non-malicious errors in the data stream. TLS is made up of two phases: - The TLS handshake protocol allows two parties to agree upon a key agreement method, as well as the encryption and MAC algorithms that will be used to protect the data, collectively known as a ciphersuite. The two parties then use the key agreement method to agree upon a shared master secret -- one or both of the parties may be authenticated during this process. Finally, the master secret is used to derive encryption and MAC keys. The TLS record protocol uses the established keys to encrypt and integrity protect the data packets along with a sequence number (to prevent malicious reordering of the packets in the data stream.) - The TLS record protocol handles TLS I/O, data compression, encryption/decryption, and MAC and key generation. TLS security mechanisms are not tied to any specific cryptographic algorithms and implement both public key and pre-shared secret key trust models. Standard default algorithms are, however, specified in order to support interoperability. The first round trip exchange of TLS handshake protocol establishes the ciphersuite to be used during a TLS session and subsequent exchanges are used to establish a shared secret and authenticate one or both of the two parties. 105
6 Once a shared secret (referred to in TLS as the Pre-master Secret) is established a two-step process is used to generate the set of secret keys: Master Secret = prf (Pre-Master Secret, randoms, nonces) Secret Keys = prf(master Secret, randoms, additional nonces) where randoms are random values chosen by each of the parties during the first round trip of the handshake and nonces are non-random strings specified by the protocol to prevent identical keys from being chosen in different contexts. Then the protocol proceeds directly to the TLS record protocol to send encrypted and integrity protected data. 5. QKD Service Interface In order to function properly, any system using QKD needs to transport both quantum and classical data from a specified source to a specified destination, resolve competing requests for shared hardware, and manage shared keys between neighboring trusted nodes via a multi-hop mechanism. For classical data, similar functionality can be provided by standard lower level protocols such as TCP/IP and Ethernet, however the unique demands of transporting quantum data intact require us to design a new service interface in order to provide the same functionality to the quantum portion of the protocol flow. This service interface should provide the following services: a Network Layer protocol to manage the QKD sub-network, QKD Key Synchronization/Demultiplexing and QKD multi-hop keying. As with other QKD stages, messages between service layer peers will need to be integrity-protected, while network layer messages for routing configuration may not. We can view the QKD protocol flow as an independent application that produces a database of secure keys at both ends of a link. The service interface distributes synchronized key from the QKD secure key database to the security applications. The QKD protocols may use conventional security applications (e.g., IPsec or TLS) or apply its own for authentication and integrity-protection of its classical messages. Network management features of a QKD service interface include handling switching, routing, and QKD protocol startup operations along with normal operations of the quantum devices. When a QKD connection between two nodes is requested by an application, this utility should determine (via routing tables) if such a connection is possible (are there QKD links and are they operational) and, if switching is necessary, can it be accomplished (depending on current use and priorities). Complications arise when switching (vs. static fixed links) is required, because QKD currently uses circuit switching that requires 10s of seconds to switch, initialize and produce usable keys. Besides managing the network and quantum devices, the QKD service interface should provide Synchronization and Demultiplexing of the quantum key stream. Demultiplexing divides up the bits in the QKD key store into multiple independent key streams to each application. Synchronization makes sure that the same bits, in the same order, are allocated to the same demultiplexed stream on both sides of the network connection. This also requires a mechanism to detect and recover from loss of synchronization. QKD is a point-to-point protocol on a single link. If a quantum network topology results in communication end points that aren t directly connected, such as a mesh network where there are multiple connected QKD links, then a Multi-Hop mechanism is necessary to deliver the QKD key across the network to the end point node. For example, see Fig 2, if QKD links A-B, C-D and E-F are three QKD links in a quantum network that connect node 1, 2, 3 and 4, and B and C are co-located in the same node as are D and E. If we want to send a message from node 1 to node 4, encrypted with key(a), then we need to get key(a) to node 4, but it exists only on Nodes 1 and 2. So node 2 gets key(c) and One-Time Pad encrypts key(a) with key(c) and then sends that encrypted key(ac) as a message to node 3. Node 3 decrypts it using key(c), extracting the original key(a). Node 3 then gets key(e) and One-Time Pad encrypts key(a) with 106
7 key(e) and then sends that encrypted key(ae) as a message to node 4. Node 4 decrypts it using key(e), extracting the original key(a). This multi-hop mechanism relies on the security of the intermediate nodes (2 and 3) and may not always be acceptable for some applications. So whether two nodes are directly connected or require multi-hop key transport, is information necessary to the application so it can decide if the QKD connection is acceptable. Figure 2. Example of QKD multi-hop mechanism across 3 QKD links 6. Integration of QKD Material into IPsec/TLS There are two models we can apply for interfacing QKD with security applications. One is where the QKD service interface provides keys to the application and lets the application handle encryption, authentication and transport of the message, as they currently do. Thus the QKD service interface acts as a key exchange function to the security applications. The other model is to keep the keys within the QKD service interface and require the application to pass it the message to be encrypted, authenticated and transported end-to-end. This would require the security application to specify to the QKD service interface the cipher for encryption and the MAC for integrity algorithms, as well as the end point destination of the message. Although either model should be able to attain the same level of security, we believe that letting the QKD support layer process the messages duplicates the existing functionality of the security protocols, possibly introducing unintended consequences, and bypasses all of the specifications and validation efforts that they have demonstrated. Pursuing the key exchange model, we attempt to minimize the effect to the existing protocol by constraining the QKD integration to the smallest part of the application possible. One approach to integrating QKD with IPsec is to keep QKD within IKE rather than spawning a parallel key exchange function. IKE would access the QKD key when directed, rather than calculate the key. This approach serves two purposes. First, it avoids having to develop another key exchange 107
8 function, fraught with duplication of effort, bugs and unintended consequences. Second it keeps QKD encapsulated and external from the security protocol itself. Although TLS doesn t have an explicit key exchange function like IKE, that function is embedded in the protocol and QKD integration should minimize any impact. The use of QKD Material in IPsec and TLS Both IPsec and TLS develop a shared secret and then use that to compute keys for encryption and integrity protection. Thus, QKD Material could be used within TLS, IPsec and IKE as the shared secret, the keys or as a One-Time Pad: A. A Quantum Key could be used to establish the shared secret for a TLS session or an IKE SA. In this scenario, quantum keys would replace the DH shared secret that is calculated in IKE and either the premaster secret or the master secret in TLS, thus eliminating the need to calculate a DH shared secret. B. Quantum Keys could be used to protect the IKE SA s traffic and/or the peers IPsecprotected data or to replace TLS encryption and MAC keys. Instead of calculating these keys from the shared secret, Quantum Keys could be used for both encryption and integrity-protection. These keys would be used in conjunction with the negotiated encryption and integrity-protection algorithms, thus eliminating the need to both calculate a shared secret and compute secret keys. C. As an alternative to option B, Quantum Keying Material could be used as a One-Time Pad, requiring an amount of key equal to the message size for each type of protection that is provided. A One-Time Pad could be used to protect the IKE SA s traffic and/or the peers IPsec-protected data as well as the TLS bulk encryption process. In this case, the One-Time Pad would be used to perform encryption instead of a conventional encryption algorithm. For integrity-protection, the One-Time Pad would have to be used in conjunction with a standard MAC integrity-protection algorithm, such as UMAC. Since symmetric key algorithms are quantum-resistant, option A, together with a quantumresistant authentication method (pre-shared secret keys, a Kerberos-based method, or the use of Public Key Certificates that use quantum-resistant algorithms) would enable IKE or TLS to negotiate traditional symmetric keys in a quantum-resistant manner. Options B or C would add an extra dimension of security: keys that would be resistant to discovery at the point when current symmetric-key encryption algorithms will no longer be strong enough to resist attacks. This would provide protection to data that requires extremely long-term resistance to discovery. Changes to IKE and the TLS handshake protocol In the course of an IKE or TLS handshake ciphersuite negotiation, it is necessary to agree on the selection of several cryptographic mechanisms. These include: The encryption algorithm(s) (e.g., AES-CBC) that will protect data exchanges The MAC(s) (e.g., HMAC-SHA) that will provide integrity protection to traffic The PRF (e.g., HMAC-SHA for IPsec TLS 1.1 specifies a standard PRF) that will be used to generate the secret keys The key exchange method (e.g., a 2048-bit MODP DH group for IPsec, or a TLS ciphersuite specifying the use of RSA in TLS) that will be used to generate the shared secret For cases A, B and C above, IKE and TLS would either have to negotiate using a new value for an existing cryptographic attribute (e.g., One-Time Pad as an encryption algorithm) or a new cryptographic attribute (e.g., use of Quantum Keys for encryption) in addition to the regular set of attributes. 108
9 Before this could be done, IKE and TLS would need to verify that a functioning quantum channel was available between the peers. If the answer were negative, IKE and TLS would not propose any of these quantum attributes. Since failures and stalls can occur during a security session, exchanges must incorporate timeout procedures. IKE exchanges include standardized procedures for handling situations in which expected responses are not received within a predefined time, but TLS requests and exchanges do not and will need to include them. The negotiated PRF is used by IKE and TLS to iteratively derive all of the keys required by the IKE SA, the IPsec SA and TLS. If some or all of those keys are replaced by quantum keying material or by a One-Time Pad, IKE and TLS would need to adjust the key length calculations accordingly. If only quantum keys and One-Time Pads will be used as keys, and the peers are not willing to negotiate the use of conventional keys for any purpose, IKE still needs to negotiate a PRF, since the PRF is also used for peer authentication within IKE. Similarly, the DH shared secret is used as input to the key calculations. If no key calculations are necessary, it is not necessary to negotiate the DH group attribute for the IKE SA or TLS. The randomly generated nonces (IKE) and randoms (TLS) that are used in the conventional key calculations are part of TLS and IKE s security infrastructure. They ensure liveness of negotiations, protecting against replay attacks. Furthermore, each participant must sign the peer s nonce as part of the peer authentication process. Thus, even if all of the keys derive from quantum key material, the peers must still generate and send nonces and randoms. Changes to IPsec and the TLS record protocol Once the secret keys are calculated by IKE, they are passed over to IPsec for secure storage within the IPsec SA Database. Similarly TLS stores its keys in its Database. Using quantum keying material in IKE or TLS, instead of calculated keys would thus not require any changes to their normal processing. Similarly, IPsec s SA Database or TLS s Database would not need to have any indication that the source of the keys differed from the normal source, since the keys would be used in conjunction with their conventional cryptographic algorithms. The use of a One-Time Pad is a different matter. Normally, the secret keys are stored in IPsec s SA Database. When it is time to require a new key, IPsec notifies IKE, and a new SA, with fresh keying material, is negotiated. For the One-Time Pad, it would not be practical for IKE to initially supply IPsec with sufficient keying material to last for the whole lifetime of the SA. IKE would not necessarily know how much keying material would be required. In addition, sufficient keying material might not be available when the SA is initially negotiated. Finally, storage space for the totality of keying material could be a problem. A more reasonable solution would be for the IPsec routines to periodically request fresh keying material. This would necessitate some sort of communication mechanism between the quantum key generation mechanism and IPsec. TLS supports a stream cipher that is similar to a One-Time Pad. It uses the cipher key stored in the TLS database to compute a key stream via a repeated computation similar to that of computing the key from the shared secret. Using QKD keys for this purpose would require a stream interface to QKD keys rather than this computational function. The encryption process would become an interactive process rather than a deterministic algorithm that simply derives a keystream from a fixed length key. Possible Complications When IKE, IPsec or TLS requests quantum keying material, it would be problematic if sufficient key material is not available. For cases A and B above, an IKE or TLS negotiation could fail if it times out while waiting for the delivery of initial keying material. This would necessitate another negotiation, which might succeed if more keying material has become available. But it could also cause repeated failures, resulting in blocking the traffic that needs 109
10 IPsec or TLS protection. The peers would then have to choose whether to fall back to conventional cryptographic protection, or to postpone the communications until sufficient quantum keying material is available. If sufficient quantum keying material is not available during negotiations, and the peers are not willing to use conventional cryptographic mechanisms instead, the negotiation will fail, and a security association will not be established. Use of One-Time Pads, case C above, for IPsec and TLS keys presents a different problem. In this case, after a TLS session or IPsec security association is established, an undetermined and potentially large amount of key may be required. What if, at some point, keying material for the One-Time Pad is requested, but not available? Either the peers would have to delay the data communications, or they would then have to choose whether to fall back to conventional cryptographic protection, or to postpone the communications until sufficient quantum keying material is available. This presents a new situation to these protocols, since currently once the initial security association or session is established all keys are algorithmically generated internally. Renegotiating at this point would require additions to the protocol. In both cases, sane heuristics for re-sending and/or re-negotiating would need to be set in place. Protecting the BB84 exchange IPsec or TLS, with conventional keys, can be used to integrity protect the BB84 exchange. Each IPsec SA is defined with specific traffic selectors that determine to which types of traffic the SA will be applied. For example, a single IPsec SA could protect all traffic between designated IP addresses and/or ports. By using a set of standard ports for the QKD classical channels IPsec can protect that traffic. Since TLS is an application specific protocol, a separate instance of TLS would need to be programmed into the QKD protocol flow. Using IPsec or TLS with QKD keys to integrity protect the BB84 exchange using quantum keys presents a bootstrapping problem. Since quantum key material will not be available until the completion of a number of BB84 exchanges, TLS and IPsec must use conventional keys until a sufficient amount of quantum key material is developed. Manually established keys could be installed, or conventional keys could be generated via a standard IKE or TLS negotiation. However, manual keys do not scale well as the network expands. The BB84 exchange does not require confidentiality protection; its only security requirement is integrity-protection, to prevent data tampering. Thus, one would not need to negotiate an encryption algorithm. Also, the amount of key needed for integrity-protection is small so it should not use much of the quantum key supply. 7. Summary We have presented overviews of the QKD protocol and the widespread internet security applications, IPsec and TLS. Pursuing a key exchange model, we proposed how QKD could be integrated into these security applications. We also note that existing security protocols could be used to authenticate and integrity protect QKD protocol messages, but care must be taken to avoid the use of quantum keys before they exist. Finally we discussed a QKD service interface between the QKD protocol and the security applications. This interface provides a set of common QKD services needed by existing security protocols. QKD may not develop into a viable widely deployable technology, but with on-going research and commercially available systems, it s too early to dismiss it. ACKNOWLEDGEMENTS The identification of any commercial product or trade name does not imply endorsement or recommendation by the National Institute of Standards and Technology 110
11 REFERENCES [1] Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Quantum cryptography Rev. Mod. Phys, [2] Chou C W, Laurat J, Deng H, Choi K S, de Riedmatten H, Felinto D and Kimble H J 2007 Functional quantum nodes for entanglement distribution over scalable quantum networks Science [3] R. Perlner and D. Cooper, Quantum Resistant Public Key Cryptography: A Survey, Proc of IDtrust 2009, Gaithersburg, MD, Apr , [4] SECQO, QKD Network Demonstration and Conference, Vienna, Austria, Oct 8-10, [5] Proc. Updating Quantum Cryptography 2008 Conf., Tokyo, Japan, Dec 1-2, 2008 < [6] European Telecommunications Standards Institute (ETSI), Standards work started in Dec 2008 < (select Committees & Portals, then select ISG and then select QKD ) [7] C. H. Bennet and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, in Proc IEEE Intern l Conf on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp [8] K. Inoue, E. Woks and Y. Yamamoto, Differential phase shift quantum key distribution Phys. Rev. Lett. 89, , (2002). [9] Gilles Brassard and Louis Salvail, Secret-Key Reconciliation by Public Discussion, proceedings of Eurocrypt 94, Lecture notes in computer Science, 765, Spriger Verlag, [10] A. Nakassis, J. Bienfang, and C. Williams, Expeditious reconciliation for practical quantum key distribution, Proce of SPIE Quantum Information and Computation II, Volume 5436, Orlando Florida, Apr 2004, pp [11] V. Scarani and C. Kurtsiefer, The black paper of quantum cryptography: real implementation problems, arxiv: v1 [quant-ph], June 2009, < [12] C. Elliott, A. Colvin, D Pearson, O. Pikalo, J. Schlafer and H. Yeh, Current Status of the DARPA Quantum Network, March 2005, < [13] [14] L. Ma, A. Mink, H. Xu, O. Slattery and X. Tang, Experimental Demonstration of an Active Quantum Key Distribution Network with Over Gbps Clock Synchronization, IEEE Communication Letters, Vol 11(12): 1019~1021 (2007) [15] A.. Mink, L. Ma, H. Xu, O. Slattery, B. Hershman and X. Tang, A Quantum Network Manager That Supports A One-Time Pad Stream, Proc of the 2 nd Intern l Conf on Quantum, Nano, and Micro Technology, St. Luce, Martinique, Feb 10-15, 2008, pp [16] S. Kent and K. Seo, Security Architecture for the Internet Protocol, RFC 4301, Dec [17] S. Frankel, "Demystifying the IPsec Puzzle", Artech House, 2001, 273 pp. [18] S. Kent, IP Authentication Header, RFC 4302, Dec [19] S. Kent, IP Encapsulating Security Payload (ESP), RFC 4303, Dec [20] C. Kaufman, ed., Internet Key Exchange (IKEv2) Protocol, RFC 4306, Dec [21] P. Eronen and P. Hoffman, IKEv2 Clarifications and Implementation Guidelines, RFC 4718, Oct [22] V. Manral, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH), RFC 4835, Apr
12 [23] J. Schiller, Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2), RFC 4307, Dec [24] T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol, Version 1.2, RFC 5246, Aug Authors Alan Mink is an electronic engineer in the Advanced Networking Division at The National Institute of Standards and Technology. He holds a PhD in electrical engineering and has been a lecturer at the University of Maryland, where he taught computer architecture. He has worked on projects in the areas of computer aided design, networking, parallel processing, performance measurement, cluster computing, digital TV and quantum communications. Sheila Frankel is a computer scientist in the Computer Security Division at the National Institute of Standards and Technology. She holds a Masters degree in computer science. She participates in the Internet Engineering Task Force (IETF) IPsec standardization effort, and was responsible for NIST's IPsec/IKE reference implementation and interactive Web-based interoperability tester. She is the author of a book on IPsec, "Demystifying the IPsec Puzzle". Currently, she is involved with the Federal Government s transition to IPv6, the next generation Internet protocol. Ray Perlner is a Mathematician in the Computer Security Division at The National Institute of Standards and Technology. He holds bachelor's degrees in Physics and Mathematics. He has worked on projects in electronic authentication, cryptographic protocols, and cryptanalysis. 112
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
A High Speed Quantum Communication Testbed
A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Security agility solution independent of the underlaying protocol architecture
Security agility solution independent of the underlaying protocol architecture Valter Vasić and Miljenko Mikuc University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 10000 Zagreb,
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Internetwork Security
Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Study on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With
IP SECURITY (IPSEC) PROTOCOLS
29 IP SECURITY (IPSEC) PROTOCOLS One of the weaknesses of the original Internet Protocol (IP) is that it lacks any sort of general-purpose mechanism for ensuring the authenticity and privacy of data as
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Branch Office VPN Tunnels and Mobile VPN
WatchGuard Certified Training Branch Office VPN Tunnels and Mobile VPN Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Notice to Users Information
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Dr. Arjan Durresi. Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/
Set of Problems 2 Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec
Network Security #10 Parts modified from Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross, Addison-Wesley, 2002. 1 Overview Encryption Authentication
Chapter 8 Virtual Private Networking
Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang [email protected]
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang [email protected] Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
