13.07.2015 Views

ericssonhistory.com

ericssonhistory.com

ericssonhistory.com

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 4Construction of an ESP-protected IP packet in transport mode. IPsec outgoing messagesare processed for Internet protocol version 4 (IPv4). In the encapsulation security payload(ESP) transport mode, in which the payload is encrypted and the integrity of the ESP headerand payload are protected, the <strong>com</strong>munication peers share a security association databasethat contains parameters necessary for secure <strong>com</strong>munication. The database containsshared secret keys and a counter that counts each packet sent over the channel. Asequence number identifies the secure session. The encryption and authentication functionsare denoted by f and h respectively.Protocols for Internet securityCryptographic algorithms make up thebasic mechanisms for secure <strong>com</strong>munication.But we also need standardized ways ofauthenticating users, exchanging keys, decidingwhich algorithm and message formatsto use, and so on. This is where protocols<strong>com</strong>e into play. Several different securityprotocols are in use in the Internet; forexample, TLS 2 , SSH 5 , IPsec 4 and IKE 5 , eachof which uses <strong>com</strong>mon techniques to establisha secure session.• Authentication. Before a <strong>com</strong>municationsession can begin, the <strong>com</strong>municatingparties must verify each other's identity.An authentication protocol does this. Authenticationcan be based on a public orsecret key. If public keys are used, theyare often obtained using some kind ofpublic key infrastructure (PKI).• Cryptographic algorithms. The <strong>com</strong>municatingparties negotiate to determinewhich cryptographic algorithms shouldbe used for exchanging keys and protectingdata.• Key exchange. The parties exchange cryptographicsession keys. This phase oftenincludes public key cryptography.• Generation of session keys. Symmetric sessionkeys are calculated and used to en-Figure 5IKE Phase I mode, authentication withsignatures.100 Ericsson Review No. 2, 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!