Security Protocol
Security Protocol
Security Protocols
Overview
• Network Security
• IPSec
• VPN Protocol
• Kerberos
• Smart Cards
• Firewalls
• Proxy Servers
Network Security
• Security protocols protect a computer from attacks
• Networks and data are vulnerable to both active attacks,
in which information is altered or destroyed, and passive
attacks, in which information is monitored
• Types of Attacks :
– Altering data.
– Eavesdropping eg:sniffing
– IP/mac address spoofing eg:cheating
– Password pilfering eg:guessing
– Denial of service
– Virus
IPSec
• Based on cryptography /encryption
• ensures the privacy of network traffic as well as its authentication.
• IPSec functions at the Network layer
• The fact that IPSec is a network-layer protocol makes its services
transparent to applications
• IPSec ensures that data cannot be tampered with while it is
traversing any part of the network
IPSec
• Hands On Lab on Ipsec : gpedit.msc
• ICMP
– Authentication method:
– Keberos
– PreShared
– Certificates
VPN Protocols
• Virtual private networking is a system of creating a
private network connection that travels through a public
network
• One of the top considerations for using a VPN is to
reduce costs
• L2TP
– L2TP is a VPN protocol used along with IPSec to
ensure confidentiality of the data transmission
– PPTP Point-to-Point Tunneling Protocol courtesy of
Microsoft and Cisco’s Layer 2 Forwarding (L2F)
protocol
VPN
• Why Use L2TP Instead of PPTP
– L2TP client is included in Windows 2000 and later
operating systems
– L2TP supports both Cisco TACACS+ and Remote
Authentication Dial-In User Service (RADIUS)
authentication
– L2TP was developed to be a standard that is already
natively supported by Cisco routers and Windows
2000 servers
– offers a much higher level of security than PPTP
– L2TP offers a wider variety of protocols than PPTP—
supporting not only TCP/IP but also IPX/SPX and
Systems Network Architecture (SNA)
Secure Sockets Layer (SSL)
• SSL is a protocol that uses a public key to encrypt the
data transmitted across the Internet
• SSL runs transparently to applications, because it sits
below upper-layer applications and above the IP
• Working on behalf of upper-layer protocols, the SSL
server authenticates itself using a certificate and public
ID to an SSL-enabled client, which includes both
Netscape Navigator and Microsoft Internet Explorer Web
browsers, and others
SSL
SSL
• The SSL client ensures that the server’s certificate has
been issued by a trusted certificate authority (CA), it
authenticates itself back to the server using the same
process, and an encrypted link is created between the
two
• During the ensuing data transmission, SSL enacts a
mechanism to ensure that the data is not tampered with
before it reaches its destination
SSL is able to use several different types
of ciphers
• Data encryption standard (DES) and Triple DES.
– DES is a private key exchange that applies a 56-bit key to each 64-bit
block of data. Triple DES is the application of three DES keys in
succession.
• Key Exchange Algorithm (KEA).
– KEA enables the client and server to establish mutual keys to use in
encryption.
• Message Digest version 5 (MD5).
– This cipher creates a 128-bit message digest to validate data.
• Rivest-Shamir-Adleman (RSA).
– This is the most commonly used key exchange for SSL. It works by
multiplying two large prime numbers, and through an algorithm
determining both public and private keys. The private key does not need
to be transmitted across the Internet but is able to decrypt the data
transmitted with the public key.
• Secure Hash Algorithm (SHA).
– SHA produces a message digest of 160 bits using the SHA-1 80-bit key
to authenticate the message.
Client makes certain that the SSL server’s