rfc1829.The ESP DES-CBC Transform

合集下载

无线方案产品说明书

无线方案产品说明书

Cisco AIR-CT2504-50-K9无线局域网控制器产品介绍:Cisco AIR-CT2504-50-K9无线局域网控制器为大中型机构提供了系统级无线局域网控制器。

通过自动完成WLAN 配置和管理,网络管理员能够利用系统所提供的控制、安全、冗余和可靠性,像扩展和管理传统有线网络一样,轻松而经济高效地扩展和管理无线网络。

Cisco AIR-CT2504-50-K9无线局域网控制器能够与Cisco Aironet 轻型无线接入点、思科无线控制系统(WCS)和思科无线定位设备共用,为关键业务无线数据、语音和视频应用提供支持。

它在轻型无线接入点和其他无线局域网控制器间实现了实时通信,提供了集中安全策略、无线入侵防御系统(IPS)功能、屡获大奖的RF 管理、QoS 和移动性。

产品图参:主要性能网络标准:IEEE 802.11a,IEEE 802.11b,IEEE 802.11g,IEEE 802.11d,IEEE 802.11e,IEEE 802.11h数据传输率:500Mbps状态指示灯:Link Activity,Power,Status,Alarm工作电压:AC 100-240V,50/60Hz产品尺寸:43.9*203.2*271.5mm其它技术参数:支持15个接入点其它特点:工作温度:0-40℃存储温度:-25-70℃工作湿度:10%-90%(非冷凝)端口类型:控制台端口:RJ-45连接器网络:4个1Gbps以太网(RJ-45)管理:专门用于思科无线控制系统基于Web:HTTP/HTTPS单个设备管理器命令行界面:Telnet、安全外壳(SSH)协议、串行端口安全认证:UL 60950-1:第2版,EN 60950:2005管理:专门用于思科无线控制系统基于Web:HTTP/HTTPS单个设备管理器命令行界面:Telnet、安全外壳(SSH)协议、串行端口安全:WiFi保护接入(WPA)IEEE 802.11i(WPA2, RSN)RFC 1321 MD5信息—摘要算法RFC 1851 ESP三重DES转换RFC 2104 HMAC:用于信息验证的密钥散列RFC 2246 TLS协议1.0版本RFC 2401互联网协议安全架构ESP和AH中的RFC 2403 HMAC-MD5-96ESP和AH中的RFC 2404 HMAC-SHA-1-96RFC 2405 ESP DES-CBC密码算法,采用Explicit IVRFC 2406 IP封装安全有效负载(ESP)RFC 2407针对ISAKMP的解释RFC 2408 ISAKMPRFC 2409 IKERFC 2451 ESP CBC —模式密码算法RFC 3280互联网X.509 PKI证书和CRL档案RFC 3602 AES-CBC密码算法及其与IPsec的搭配使用RFC 3686使用AES计数器模式和IPsec ESPRFC 4347数据报传输层安全RFC 4346 TLS协议1.1版本Cisco Aironet 1242 无线接入点产品介绍:Cisco Aironet 1242AG利用思科统一无线网络的无线射频管理和网络管理特性简化了部署,能够将有线网络中的安全性、可扩展性、可靠性、易部署性和可管理性扩展到无线局域网中。

RFC协议标准

RFC协议标准

标准参考文档链路层协议PPP(Point-to-Point Protocol):RFC 1332: The PPP Internet Protocol Control Protocol (IPCP)RFC 1334: PPP Authentication ProtocolsRFC 1552: The PPP Internetworking Packet Exchange Control Protocol (IPXCP) RFC 1570: PPP LCP Extensions(实现了其中的callback选项)RFC 1661: The Point-to-Point Protocol (PPP)RFC 1877: PPP Internet Protocol Control Protocol Extensions for Name Server AddressesRFC 1990: The PPP Multilink Protocol (MP)RFC 1994: PPP Challenge Handshake Authentication Protocol (CHAP)RFC 2509: IP Header Compression over PPPRFC 1962: The PPP Compression Control Protocol (CCP)RFC 1974: PPP Stac LZS Compression ProtocoldX25、LAPB(Link Access Protocol Balanced):RFC1613:Cisco Systems X.25 over TCP(XOT)RFC1598:PPP in X.25RFC1461:SNMP MIB extension for MultiProtocol Interconnect over X.25RFC1382: SNMP MIB Extension for the X.25 Packet LayerRFC1381: SNMP MIB Extension for X.25 LAPBRFC1356: Multiprotocol Interconnect on X.25 and ISDN in the Packet ModeRFC1236: IP to X.121 Address Mapping for DDNRFC1226: Internet Protocol Encapsulation of AX.25 FramesRFC1090: SMTP on X.25RFC1086: ISO-TP0 bridge between TCP and X.25RFC874: Critique of X.25RFC1236: IP to X.121 Address Mapping for DDNRFC1133: Routing between the NSFNET and the DDNCisco-HDLC:Cisco-HDLC是CISCO自己设计的一个协议,没有可参考的标准Frame Relay:RFC1294/1490: Multiprotocol Interconnect over Frame RelayRFC1293: Inverse Address Resolution Protocol(INARP)RFC1315: Management Information Base for Frame Relay DTEsITU-T Q933附录A:帧中继本地管理接口(LMI)协议ANSI T1.617附录D:帧中继本地管理接口(LMI)协议ISDN(Integrated Services Digital Network):ITU-T Q.931建议(网络层)ITU-T Q.921建议(链路层)IP层协议RFC791: Internet Protocol. (IP)RFC792: Internet Control Message Protocol (ICMP)RFC793: TRANSMISSION CONTROL PROTOCOL (TCP)RFC896: Congestion Control in IP/TCP InternetworksRFC768: User Datagram Protocol (UDP)RFC 826: An Ethernet Address Resolution Protocol (ARP)Socket: Unix标准路由协议RIP(Routing Information Protocol):RFC1058: Routing Information ProtocolRFC1723: RIP Version 2RFC2082: RIP-2 MD5 AuthenticationOSPF(Open Shortest Path First):RFC2328: OSPF Version 2RFC1793: Extending OSPF to Support Demand CircuitsIGRP(Interior Gateway Routing Protocol):IGRP协议无标准RFC,与CISCO保持兼容BGP(Border Gateway Protocol):RFC1771: A Border Gateway Protocol 4(BGP-4)RFC1772: Application of the Border Gateway Protocol in the Internet (BGP-4) RFC1965: Autonomous System Confederations for BGPRFC1966: BGP Route Reflection -- An alternative to full mesh IBGPRFC1997: BGP Community AttributeRFC2439: BGP Route Flap Damping网络安全RADIUS(Remote Authentication Dial In User Service):RFC2138: Remote Authentication Dial In User Service (RADIUS)RFC2139: RADIUS AccountingGRE(Generic Routing Encapsulation):RFC1701: Generic Roouting Encapsulation (老版本)RFC1702: Generic Routing Encapsulation over IPv4 networksRFC2784: Generic Roouting Encapsulation (新版本)RFC2667: IP Tunnel MIBIPSEC(IP Security):RFC1825: Security Architechure for the Internet Protocol (老版本)RFC2401: Security Architechure for the Internet Protocol (新版本)AH(Authentication Header)协议:RFC2402: IP Authentication HeaderRFC1321: The MD5 Message-Digest AlgorithmRFC2104: HMAC: Keyed-Hashing for Message AuthenticationRFC2085: IP Authentication with Replay PreventionRFC2403: The Use of HMAC-MD5-96 within ESP and AHRFC2404: The Use of HMAC-SHA-1-96 within ESP and AHESP(Encapsulating Security Payload):RFC2406: IP Encapsulating Security Payload (ESP)RFC2405: The ESP DES-CBC Cipher Algorithm With Explicit IVIKE(Internet Key Exchange):RFC2408:Internet Security Association and Key Management Protocol (ISAKMP) RFC2409:The Internet Key Exchange (IKE)RFC2407:The Internet IP Security Domain of Interpretation for ISAKMP (IPSEC DOI)L2TP(Layer 2 Tunnel Protocol):RFC2661:Layer 2 Tunnel ProtocolNAT(Network Address Translator):RFC1631:The IP Network Address Translator (NAT)RFC2663:IP Network Address Translator (NAT) Terminology and Considerations 网络管理SNMP(Simple Network Management Protocol):RFC 1157: Simple Network Management Protocol (SNMP)。

国际、国内IPv6标准现状及IPv6标准目前发展趋势

国际、国内IPv6标准现状及IPv6标准目前发展趋势

国际、国内IPv6标准现状及IPv6标准目前发展趋势(2003-01-16 09:34:59)摘要:本文重点介绍了国际、国内IPv6标准现状及IPv6标准目前发展趋势。

一、概述IP网络是指TCP/IP协议为基础通信协议的网络,著名的Internet是IP网的一种,也是最具代表性的IP网络。

IP技术正在改变世界的面貌。

IP业务呈现爆炸性的增长,业务量的增长是指数式的。

其增长应该要归功于Web是Web技术以及Web base技术的不断出现,触发了IP业务的发展。

近年来,IP网上业务正在转向实时业务,IP电话为这种转向的代表业务,目前尽管在IP网上运行实时业务还存在一些问题,但IP网上实时业务的尝试是成功的。

IP网络的发展也是惊人的,现在IP网的基础设施平均每一至二年要全面升级一次,其骨干网带宽的增加速率为每6~9个月翻一番,这个增长速率已大大超过著名的预测CPU速度增加的摩尔定律(每18个月翻一番),目前技术的发展支持其发展速度,密集波分复用(DWDM)技术在实用化方面取得了突破性进展,千兆(G)比特路由器、百万兆(T)比特路由器相继问世,IP网的网络资源正在因此而大量创造出来。

随着IP业务的迅速增长,IP网络上应用的不断增加,原有的IP网越来越显得力不从心。

IP网络正在向下一代网络演进。

其网络协议也应产生重大变化。

目前使用的IP协议是IPv4。

IPv4是70年代制定的协议,随着全球IP网络规模的不断扩大和用户数的迅速增长,IPv4协议已经不能适应发展的需要。

90年代初,有关专家就预见到IP协议换代的必然性,提出在下一代网络中用IPv6协议取代IPv4。

IPv6是1992年提出的,主要起因是由于Web的出现导致了IP网的爆炸性发展,IP网用户迅速增加,IP地址空前紧张,由于IPv4只用32位二进制数来表示地址,地址空间很小,IP网将会因地址耗尽而无法继续发展,因而IPv6首先要解决的问题是扩大地址空间,IPv6有许多优良的特性,尤其在IP地址量,安全性,服务质量,移动性等方面优势明显。

cisco 思科 面向云的思科 Catalyst 9800-CL 无线控制器 产品手册

cisco 思科 面向云的思科 Catalyst 9800-CL 无线控制器 产品手册

产品手册面向云的思科 Catalyst 9800-CL无线控制器专为基于意图的网络全新打造目录产品概述3特性6优势8规格10软件要求12许可12保修18订购信息18思科 Capital 19文档历史记录20产品概述思科 Catalyst 9800 系列无线控制器专为基于意图的网络和思科 DNA 全新打造,采用思科 IOS® XE,集成了思科Aironet® 无线接入点的卓越 RF 性能,可为您不断发展壮大的组织提供一流的无线网络体验。

思科 Catalyst 9800 系列无线控制器以可编程的开放式架构为基础,内置安全机制、流传输遥感勘测和丰富的分析功能。

思科 Catalyst 9800 系列无线控制器将保障卓越网络性能的三大支柱作为立足点,即:无间断运行、安全可靠和任意位置部署。

这些要素有助于提供不打折扣的最佳无线网络体验,同时为您节省不必要的时间和成本。

思科® Catalyst® 9800-CL 是面向云的下一代企业级无线控制器,具备为分布式分支机构、中型园区以及大型企业和运营商提供无缝软件更新的强大功能。

思科 Catalyst 9800-CL 控制器是功能齐全的企业就绪型控制器,可以助力业务关键运营,彻底改变最终客户体验。

•通过冷热补丁实现高可用性和无缝软件更新,确保您的客户端和服务在计划内和计划外事件过程中均永不间断。

•使用思科 Catalyst 9800-CL保护无线环境、设备和用户。

借助思科加密流量分析 (ETA) 和软件定义接入 (SD-Access),无线基础设施将成为最强大的第一道防线。

这款控制器具有内置安全功能,包括:运行时防御、映像签名和完整性验证。

•可以部署在任意位置,提供无处不在的无线连接。

无论是在公共云还是私有云中,思科 Catalyst 9800-CL 都能充分满足您组织的需求。

•9800-CL 基于模块化操作系统,采用开放式可编程 API 实现第 0 天至第 N 天的网络操作自动化。

Cisco 5500 系列无线控制器产品手册说明书

Cisco 5500 系列无线控制器产品手册说明书

产品手册Cisco 5500 系列无线控制器Cisco ®5500 系列无线控制器是一款高度可扩展的灵活平台,能够在大中型企业和园区环境中,为关键任务无线网络提供系统级服务。

5500 系列专门采用了独特设计,支持 802.11n 的性能下的最大可扩展性,通过射频的监控和保护能力提供延长的正常工作时间,并且可以同时管理 500 个接入点;它具有卓越的性能,可以提供可靠的视频流和长话级音质;它还具有增强的故障恢复功能,能在要求最严格的环境中提供一致的移动体验。

最大限度提高性能和可扩展性● 支持多达 500 个接入点和 7000 个客户端。

● 经过优化的 802.11n 性能,能够提供相当于 802.11a/g 网络九倍的性能。

● 延长的正常运行时间,每个控制器能同时配置和管理 500 个接入点 增强的移动性和服务● 范围更大的移动域,可以同时关联更多客户端。

● 速度更快的射频资源管理 (RRM) 更新,可在用户漫游时提供不间断的网络接入。

● 智能射频控制平面,可以自行配置、修复和优化。

● 高效漫游功能可提升应用性能,例如长话级音质、一致的视频流及数据备份。

许可灵活性与投资保护● 可以根据需要,逐步添加附加接入点容量许可。

OfficeExtend 解决方案● 安全、简便、经济高效的移动远程办公人员解决方案。

● 每个控制器支持多达 500 个远程接入点。

● 通过支持统一通信无线电话,节约手机费用。

全面的有线/无线安全性● 在接入点和控制器之间提供全面的 CAPWAP 加密。

● 支持检测恶意接入点和拒绝服务攻击。

● 管理帧保护功能可以检测恶意用户,并向网络管理员发出警报。

企业无线网状网● 动态无线网状网支持在室内和室外为难以布线的区域提供网络连接。

支持环保● 支持自适应功率管理,可以在非高峰时段关闭接入点无线电设备,以减少功耗。

● OfficeExtend 解决方案通过减少通勤时间和节省汽油、驾驶里程和保险成本,可降低成本和支持环保最佳实践。

ip封装安全载荷

ip封装安全载荷

ip封装安全载荷Request for Comments: 1827 Naval Research LaboratoryCategory: Standards Track A ugust 1995IP封装安全载荷(ESP)本备忘录的状态这篇文档详述了Internet community中的一个internet标准栈协议,同时要求关于那个标准栈协议的讨论和建议。

标准化的状态和协议的状态请参考internet官方协议标准(std1). 公布本备忘录的发放不受限制。

摘要1 介绍1.1综述在共享系统中使用此规范会增长IP协议处理的代价。

使用此规范也会增长信息通讯的延迟时刻。

延迟时刻的增长要紧是由包含在一个ESP中的每个IP数据包都需要的加密和解密过程引起的。

在隧道模式的ESP中,原始的IP数据包被放置于ESP的被加密部分,然后将完整的ESP帧放入一个数据包内,此数据包有一个未加密的IP报头。

未加密的IP数据报头中的信息被用来将安全数据包从源地址发送到目的地址。

一个未加密的IP路由报头能够被包括在IP报头和ESP之间。

在传输模式的ESP中,ESP头被插入到IP数据包中传输层协议报头(例如,TCP,UDP,或者ICMP)的前面。

在此模式下,因为没有加密的IP 报头或者IP选项因此带宽被爱护。

在IP中,一个IP认证头能够用来作为一个未加密信息报的头部或者在一个传输模式的ESP信息报中位于IP报头和ESP报头之间,也能够作为一个报头位于一个隧道模式的ESP信息报的加密部分。

当一个AH同时显现在纯文本的IP报头和单个信息包的隧道模式ESP头之内时,未加密的IPv 6认证要紧被用于向未加密的IP头的内容提供爱护,加密的认证头被用于向加密的IP信息包提供报头验证。

本文稍后详述。

IP封装安全载荷的组织结构与不的IP有效载荷有专门大不同。

ESP有效载荷的第一个成分是有效载荷的未加密域。

第二个部分是加密的数据。

未加密ESP报头的域通知预期的接收者如何样合适的解密和处理加密的数据。

IPv6与互联网信息安全探讨

IPv6与互联网信息安全探讨

收稿日期:20031117作者简介:陈世清(1964),男,讲师,研究方向:计算机网络与网络安全、并行计算;夏春和,教授。

*国防十五预研“航空网络防御体系(418010703)”IPv 6与互联网信息安全探讨*陈世清1,夏春和2(1.湖南工程学院计算机科学系,湖南湘潭 411104;2.北京航空航天大学六系,北京 100084)摘 要:论述了新一代网络协议IPv 6在安全方面的独到之处及技术要点,探讨了IPv 6对Internet 信息安全的作用及特性。

关键词:IPv 6;网络安全;信息安全;认证;加密Abstract :T his paper points out the distinctive guatity and techno logical po ints o f new generation netw ork protocol in secur ity.It discusses the functio ns and specific characteristic of IPv 6to Internet info rmation security .Key words :IPv6;netw ork security;inform ation secunity ;authentication;encry p-tio n;0 引言Internet 由于自身的缺陷,如网络的开放性及黑客的攻击等造成了网络的不安全,科学家在设计Internet 之初就缺乏对安全性的总体构想和设计。

我们所用的TCP/IP 协议是建立在可信的环境下,首先考虑的是网络互连,因此它缺乏安全方面的考虑。

这种基于地址的协议本身是会泄露口令的,而且有些协议经常会运行一些无关的程序;连接也可以成为盗用的目标;服务器需要读写特权等等,这些都是网络本身的缺陷。

网络的开放性也许是造成威胁的最主要原因,TCP /IP 协议是完全公开的,远程访问使许多攻击者无须到现场就能够得手,连接的主机基于互相信任的原则等等这些性质使网络更加不安全。

IP安全性与IPSec

IP安全性与IPSec
在防火墙或路由器中实现时,可以对所有跨越周界的流量实 施强安全性。而公司内部或工作组不必招致与安全相关处 理的负担。
在防火墙中实现IPSec可以防止IP旁路。 IPSec是在传输层(TCP,UDP)之下,因此对应用透明。不必
改变用户或服务器系统上的软件。
IPSec可以对最终用户透明。无须训练用户。 需要时IPSec可以提供个人安全性。这对非现场工作人员以及
两种情况下都是采用在主IP报头后面接续扩展报头的方法实现的。 认证的扩展报头称为AH(Authentication Header) 加密的扩展报头称为ESP header (Encapsulating Security Payload) 体系结构:包括总体概念,安全需求,定义,以及定义IPSec技术的
体系结构
ESP协议
AH协议
加密算法
加密算法
DOI 密钥管理
IPSec的主要目标
期望安全的用户能够使用基于密码学的安全机制
– 应能同时适用与IPv4和IPv6, IPng. – 算法独立 – 有利于实现不同安全策略 – 对没有采用该机制的的用户不会有副面影响
对上述特征的支持在IPv6中是强制的,在IPv4中是可选的。 这
SA替换或终止,以及一个这些活动发生的指示。 IPSec协议模式:隧道、运输、统配符。 通路MTU:任何遵从的最大传送单位和老化变量
SA选择符
IP信息流与SA关联的手段是通过安全策略数据库SPD(Security Policy Database)
每一个SPD入口通过一组IP和更高层协议域值,称为选择符来定义 。
一标识。因此,任何IP包中,SA是由IPv4中的目的地址或 IPv6头和内部扩展头(AH或ESP)中的SPI所唯一标识的。
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Network Working Group P. Karn Request for Comments: 1829 Qualcomm Category: Standards Track P. Metzger Piermont W. Simpson Daydreamer August 1995 The ESP DES-CBC TransformStatus of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited. AbstractThis document describes the DES-CBC security transform for the IPEncapsulating Security Payload (ESP).Table of Contents1. Introduction (1)1.1 Keys (1)1.2 Initialization Vector (1)1.3 Data Size (2)1.4 Performance (2)2. Payload Format (3)3. Algorithm (5)3.1 Encryption (5)3.2 Decryption (5)SECURITY CONSIDERATIONS (6)ACKNOWLEDGEMENTS (7)REFERENCES (8)AUTHOR’S ADDRESS (10)Karn, Metzger & Simpson Standards Track [Page i]1. IntroductionThe Encapsulating Security Payload (ESP) [RFC-1827] providesconfidentiality for IP datagrams by encrypting the payload data to be protected. This specification describes the ESP use of the CipherBlock Chaining (CBC) mode of the US Data Encryption Standard (DES)algorithm [FIPS-46, FIPS-46-1, FIPS-74, FIPS-81].All implementations that claim conformance or compliance with theEncapsulating Security Payload specification MUST implement thisDES-CBC transform.This document assumes that the reader is familiar with the relateddocument "Security Architecture for the Internet Protocol"[RFC-1825], which defines the overall security plan for IP, andprovides important background for this specification.1.1. KeysThe secret DES key shared between the communicating parties is eight octets in length. This key consists of a 56-bit quantity used by the DES algorithm. The 56-bit key is stored as a 64-bit (eight octet)quantity, with the least significant bit of each octet used as aparity bit.1.2. Initialization VectorThis mode of DES requires an Initialization Vector (IV) that is eight octets in length.Each datagram contains its own IV. Including the IV in each datagram ensures that decryption of each received datagram can be performed,even when other datagrams are dropped, or datagrams are re-ordered in transit.The method for selection of IV values is implementation dependent.Notes:A common acceptable technique is simply a counter, beginning with a randomly chosen value. While this provides an easy method forpreventing repetition, and is sufficiently robust for practicaluse, cryptanalysis may use the rare serendipitous occurrence when a corresponding bit position in the first DES block increments in exactly the same fashion.Karn, Metzger & Simpson Standards Track [Page 1]Other implementations exhibit unpredictability, usually through a pseudo-random number generator. Care should be taken that theperiodicity of the number generator is long enough to preventrepetition during the lifetime of the session key.1.3. Data SizeThe DES algorithm operates on blocks of eight octets. This oftenrequires padding after the end of the unencrypted payload data.Both input and output result in the same number of octets, whichfacilitates in-place encryption and decryption.On receipt, if the length of the data to be decrypted is not anintegral multiple of eight octets, then an error is indicated, asdescribed in [RFC-1825].1.4. PerformanceAt the time of writing, at least one hardware implementation canencrypt or decrypt at about 1 Gbps [Schneier94, p. 231].Karn, Metzger & Simpson Standards Track [Page 2]2. Payload Format+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Security Parameters Index (SPI) |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| |˜ Initialization Vector (IV) ˜| |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| |˜ Payload Data ˜| |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+... Padding | Pad Length | Payload Type |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Security Parameters Index (SPI)A 32-bit value identifying the Security Parameters for thisdatagram. The value MUST NOT be zero.Initialization Vector (IV)The size of this field is variable, although it is constant forall DES-CBC datagrams of the same SPI and IP Destination. Octets are sent in network order (most significant octet first)[RFC-1700].The size MUST be a multiple of 32-bits. Sizes of 32 and 64 bitsare required to be supported. The use of other sizes is beyondthe scope of this specification. The size is expected to beindicated by the key management mechanism.When the size is 32-bits, a 64-bit IV is formed from the 32-bitvalue followed by (concatenated with) the bit-wise complement ofthe 32-bit value. This field size is most common, as it alignsthe Payload Data for both 32-bit and 64-bit processing.All conformant implementations MUST also correctly process a64-bit field size. This provides strict compatibility withexisting hardware implementations.It is the intent that the value not repeat during the lifetime of the encryption session key. Even when a full 64-bit IV isused, the session key SHOULD be changed at least as frequently as 2**32 datagrams.Karn, Metzger & Simpson Standards Track [Page 3]Payload DataThe size of this field is variable.Prior to encryption and after decryption, this field begins withthe IP Protocol/Payload header specified in the Payload Typefield. Note that in the case of IP-in-IP encapsulation (PayloadType 4), this will be another IP header.PaddingThe size of this field is variable.Prior to encryption, it is filled with unspecified implementation dependent (preferably random) values, to align the Pad Length and Payload Type fields at an eight octet boundary.After decryption, it MUST be ignored.Pad LengthThis field indicates the size of the Padding field. It does notinclude the Pad Length and Payload Type fields. The valuetypically ranges from 0 to 7, but may be up to 255 to permithiding of the actual data length.This field is opaque. That is, the value is set prior toencryption, and is examined only after decryption.Payload TypeThis field indicates the contents of the Payload Data field, using the IP Protocol/Payload value. Up-to-date values of the IPProtocol/Payload are specified in the most recent "AssignedNumbers" [RFC-1700].This field is opaque. That is, the value is set prior toencryption, and is examined only after decryption.For example, when encrypting an entire IP datagram (Tunnel-Mode), this field will contain the value 4, which indicatesIP-in-IP encapsulation.Karn, Metzger & Simpson Standards Track [Page 4]3. AlgorithmIn DES-CBC, the base DES encryption function is applied to the XOR of each plaintext block with the previous ciphertext block to yield the ciphertext for the current block. This provides forre-synchronization when datagrams are lost.For more explanation and implementation information for DES, see[Schneier94].3.1. EncryptionAppend zero or more octets of (preferably random) padding to theplaintext, to make its modulo 8 length equal to 6. For example, ifthe plaintext length is 41, 5 octets of padding are added.Append a Pad Length octet containing the number of padding octetsjust added.Append a Payload Type octet containing the IP Protocol/Payload value which identifies the protocol header that begins the payload.Provide an Initialization Vector (IV) of the size indicated by theSPI.Encrypt the payload with DES in CBC mode, producing a ciphertext ofthe same length.Octets are mapped to DES blocks in network order (most significantoctet first) [RFC-1700]. Octet 0 (modulo 8) of the payloadcorresponds to bits 1-8 of the 64-bit DES input block, while octet 7 (modulo 8) corresponds to bits 57-64 of the DES input block.Construct an appropriate IP datagram for the target Destination, with the indicated SPI, IV, and payload.The Total/Payload Length in the encapsulating IP Header reflects the length of the encrypted data, plus the SPI, IV, padding, Pad Length, and Payload Type octets.3.2. DecryptionFirst, the SPI field is removed and examined. This is used as anindex into the local Security Parameter table to find the negotiated Karn, Metzger & Simpson Standards Track [Page 5]parameters and decryption key.The negotiated form of the IV determines the size of the IV field.These octets are removed, and an appropriate 64-bit IV value isconstructed.The encrypted part of the payload is decrypted using DES in the CBCmode.The Payload Type is removed and examined. If it is unrecognized, the payload is discarded with an appropriate ICMP message.The Pad Length is removed and examined. The specified number of pad octets are removed from the end of the decrypted payload, and the IP Total/Payload Length is adjusted accordingly.The IP Header(s) and the remaining portion of the decrypted payloadare passed to the protocol receive routine specified by the PayloadType field.Security ConsiderationsUsers need to understand that the quality of the security provided by this specification depends completely on the strength of the DESalgorithm, the correctness of that algorithm’s implementation, thesecurity of the key management mechanism and its implementation, the strength of the key [CN94], and upon the correctness of theimplementations in all of the participating nodes.Among other considerations, applications may wish to take care not to select weak keys, although the odds of picking one at random are low [Schneier94, p 233].The cut and paste attack described by [Bell95] exploits the nature of all Cipher Block Chaining algorithms. When a block is damaged intransmission, on decryption both it and the following block will begarbled by the decryption process, but all subsequent blocks will be decrypted correctly. If an attacker has legitimate access to thesame key, this feature can be used to insert or replay previouslyencrypted data of other users of the same engine, revealing theplaintext. The usual (ICMP, TCP, UDP) transport checksum can detect this attack, but on its own is not considered cryptographicallystrong. In this situation, user or connection oriented integritychecking is needed [RFC-1826].At the time of writing of this document, [BS93] demonstrated aKarn, Metzger & Simpson Standards Track [Page 6]differential cryptanalysis based chosen-plaintext attack requiring2^47 plaintext-ciphertext pairs, and [Matsui94] demonstrated a linear cryptanalysis based known-plaintext attack requiring only 2^43plaintext-ciphertext pairs. Although these attacks are notconsidered practical, they must be taken into account.More disturbingly, [Weiner94] has shown the design of a DES cracking machine costing $1 Million that can crack one key every 3.5 hours.This is an extremely practical attack.One or two blocks of known plaintext suffice to recover a DES key.Because IP datagrams typically begin with a block of known and/orguessable header text, frequent key changes will not protect against this attack.It is suggested that DES is not a good encryption algorithm for theprotection of even moderate value information in the face of suchequipment. Triple DES is probably a better choice for such purposes. However, despite these potential risks, the level of privacy provided by use of ESP DES-CBC in the Internet environment is far greater than sending the datagram as cleartext.AcknowledgementsThis document was reviewed by the IP Security Working Group of theInternet Engineering Task Force (IETF). Comments should be submitted to the ipsec@ mailing list.Some of the text of this specification was derived from work byRandall Atkinson for the SIP, SIPP, and IPv6 Working Groups.The use of DES for confidentiality is closely modeled on the workdone for SNMPv2 [RFC-1446].Steve Bellovin, Steve Deering, Karl Fox, Charles Lynn, Craig Metz,Dave Mihelcic and Jeffrey Schiller provided useful critiques ofearlier versions of this draft.Karn, Metzger & Simpson Standards Track [Page 7]References[Bell95] Bellovin, S., "An Issue With DES-CBC When Used WithoutStrong Integrity", Proceedings of the 32nd IETF, Danvers,MA, April 1995.[BS93] Biham, E., and Shamir, A., "Differential Cryptanalysis ofthe Data Encryption Standard", Berlin: Springer-Verlag,1993.[CN94] Carroll, J.M., and Nudiati, S., "On Weak Keys and Weak Data: Foiling the Two Nemeses", Cryptologia, Vol. 18 No. 23 pp.253-280, July 1994.[FIPS-46]US National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standard (FIPS) Publication46, January 1977.[FIPS-46-1]US National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standard (FIPS) Publication46-1, January 1988.[FIPS-74]US National Bureau of Standards, "Guidelines forImplementing and Using the Data Encryption Standard",Federal Information Processing Standard (FIPS) Publication74, April 1981.[FIPS-81]US National Bureau of Standards, "DES Modes of Operation"Federal Information Processing Standard (FIPS) Publication81, December 1980.[Matsui94]Matsui, M., "Linear Cryptanalysis method dor DES Cipher,"Advances in Cryptology -- Eurocrypt ’93 Proceedings, Berlin: Springer-Verlag, 1994.[RFC-1446]Galvin, J., and McCloghrie, K., "Security Protocols forVersion 2 of the Simple Network Management Protocol(SNMPv2)", RFC-1446, DDN Network Information Center, April1993.[RFC-1700]Reynolds, J., and Postel, J., "Assigned Numbers", STD 2, Karn, Metzger & Simpson Standards Track [Page 8]RFC-1700, USC/Information Sciences Institute, October 1994. [RFC-1800]Postel, J., "Internet Official Protocol Standards", STD 1,RFC-1800, USC/Information Sciences Institute, July 1995.[RFC-1825]Atkinson, R., "Security Architecture for the InternetProtocol", RFC-1825, Naval Research Laboratory, July 1995.[RFC-1826]Atkinson, R., "IP Authentication Header", RFC-1826, NavalResearch Laboratory, July 1995.[RFC-1827]Atkinson, R., "IP Encapsulating Security Protocol (ESP)",RFC-1827, Naval Research Laboratory, July 1995.[Schneier94]Schneier, B., "Applied Cryptography", John Wiley & Sons, New York, NY, 1994. ISBN 0-471-59756-2[Weiner94]Wiener, M.J., "Efficient DES Key Search", School of Computer Science, Carleton University, Ottawa, Canada, TR-244, May1994. Presented at the Rump Session of Crypto ’93.Karn, Metzger & Simpson Standards Track [Page 9]RFC 1829 ESP DES-CBC August 1995 Author’s AddressQuestions about this memo can also be directed to:Phil KarnQualcomm, Inc.6455 Lusk Blvd.San Diego, California 92121-2779karn@Perry MetzgerPiermont Information Systems Inc.160 Cabrini Blvd., Suite #2New York, NY 10033perry@William Allen SimpsonDaydreamerComputer Systems Consulting Services1384 FontaineMadison Heights, Michigan 48071Bill.Simpson@bsimpson@Karn, Metzger & Simpson Standards Track [Page 10]。

相关文档
最新文档