Attacking Predictable IPsec ESP Initialization Vectors

@inproceedings{Vaarala2002AttackingPI,
  title={Attacking Predictable IPsec ESP Initialization Vectors},
  author={Sami Vaarala and Antti Nuopponen and Teemupekka Virtanen},
  booktitle={ICICS},
  year={2002}
}
Predictable initialization vectors in IPsec ESP encryption, allowed by the IPsec specifications and used by most implementations, compromise IPsec confidentiality. By using an adaptive chosen plaintext attack, an attacker can break low entropy plaintext blocks using brute force, and confirm guesses of the contents of arbitrary plaintext blocks. We analyze the preconditions and the seriousness of such attacks, and provide results of practical attack experiments. 

Security Network with Virtual Private Network & (IPSec) Applications

TLDR
Virtual Private Network (VPN) was chosen as the application in describing how IPSec provides the platform for secure and encrypted channel for communication in an TCP/IP based network.

Testing Topologies for the Evaluation of IPSEC Implementations

TLDR
This work proposes three testing topologies to carry out IPSEC implementation assessment, each of these scenarios will supply an important guide for the determination of objectives, digital evidences to collect and test batteries to develop, in any evaluation of a IPSEC device.

Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol

TLDR
A secure error-signalling scheme for packetswitched network architectures is presented and measurements taken to observe the performance of the FCNS in cases where the FCNSEP implementation has been imperative and reveal applicability issues for the FCnSEP in network protocol systems are revealed.

Intrusion detection in wireless networks using nature inspired algorithms

TLDR
Results attest that the prototype intrusion detection mechanism introduced in the context of the current PhD thesis, namely Termid is able to identify wireless attacks, effectively and in a timely manner, before their disastrous results affect the network.

Attacks and Countermeasures on 802.16: Analysis and Assessment

TLDR
This paper provides a comprehensive taxonomy of attacks and countermeasures on 802.16 and a full-scale assessment study of indicative attacks that belong to broader attack classes is conducted in an effort to better comprehend their impact on the 802.

References

SHOWING 1-10 OF 23 REFERENCES

The ESP CBC-Mode Cipher Algorithms

This document describes how to use CBC-mode cipher algorithms with the IPSec ESP (Encapsulating Security Payload) Protocol. It not only clearly states how to use certain cipher algorithms, but also

Problem Areas for the IP Security Protocols

  • S. Bellovin
  • Computer Science
    USENIX Security Symposium
  • 1996
TLDR
A number of attacks against various versions of IP-layer encryption and authentication protocols, including confidentiality failures and authentication failures are described, which are troubling for the utility of this entire effort.

The ESP DES-CBC Cipher Algorithm With Explicit IV

This document describes the use of the DES Cipher algorithm in Cipher Block Chaining Mode, with an explicit IV, as a confidentiality mechanism within the context of the IPSec Encapsulating Security

The Internet Key Exchange (IKE)

ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them. ISAKMP is designed to be key exchange independant; that is, it is designed to support many

User Datagram Protocol

TLDR
UDP does not guarantee reliability or ordering in the way that TCP does, but its stateless nature is also useful for servers that answer small queries from huge numbers of clients.

Internet Protocol

TLDR
Along with TCP, IP represents the heart of the Internet protocols and has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassembly of data links to support data links with different maximum transmission unit (MTU) sizes.

ESP CBC-Mode Cipher Algorithms, RequestFor Comments 2451,November1998

  • 1998

IP Encapsulating Security Payload (ESP)

This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide

An Attack against IPsec Transport Mode HTTP Access

  • An Attack against IPsec Transport Mode HTTP Access
  • 2002

Transmission Control Protocol, Request For Comments 793

  • Transmission Control Protocol, Request For Comments 793
  • 1981