【24h】

Cryptography in Theory and Practice: The Case of Encryption in IPsec

机译:理论与实践中的密码学:IPsec中的加密案例

获取原文
获取原文并翻译 | 示例

摘要

Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards mandate its support. We present evidence that such "encryption-only" configurations are in fact still often selected by users of IPsec in practice, even with strong warnings advising against this in the IPsec standards. We then describe a variety of attacks against such configurations and report on their successful implementation in the case of the Linux kernel implementation of IPsec. Our attacks are realistic in their requirements, highly efficient, and recover the complete contents of IPsec-protected datagrams. Our attacks still apply when integrity protection is provided by a higher layer protocol, and in some cases even when it is supplied by IPsec itself.
机译:尽管理论上的加密技术众所周知的结果突出了未经身份验证的加密的漏洞,但是IPsec标准要求其提供支持。我们提供的证据表明,即使在IPsec标准中强烈建议这样做,实际上实际上仍由IPsec用户选择这种“仅加密”配置。然后,我们描述针对此类配置的各种攻击,并报告在IPsec的Linux内核实现的情况下它们的成功实现。我们的攻击在其要求上是切合实际的,高效的,并且可以恢复受IPsec保护的数据报的完整内容。当完整性保护由高层协议提供时,甚至在某些情况下,即使由IPsec本身提供,我们的攻击仍然适用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号