16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6778990
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the IPsec standards when applied to IPv6 in confidentiality-only ESP tunnel mode

Abstract: Abstract-Attacks which can break RFC-compliant IPsec implementation built on IPv6 in confidentiality-only ESP tunnel mode are proposed. The attacks combine the thought of IV attack, oracle attack and spoof attack to decrypt a encrypted IPv6 datagram. The attacks here are more efficient than the attacks presented by Paterson and Degabriele because no checksum issue has to be handled. The paper shows that using IPsec with confidentiality-only ESP configuration is insecure to convince users to select it carefully. Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…As a result, identity authentication is incorporated into security protocols. Different techniques of attacking the IPSec protocol have been documented in the literature [2][3][4], and man-in-the-middle attacks have always been a major threat source for security protocols [5]. Wireless networks, local area networks, and even wide-area networks are all vulnerable to man-in-themiddle attacks.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, identity authentication is incorporated into security protocols. Different techniques of attacking the IPSec protocol have been documented in the literature [2][3][4], and man-in-the-middle attacks have always been a major threat source for security protocols [5]. Wireless networks, local area networks, and even wide-area networks are all vulnerable to man-in-themiddle attacks.…”
Section: Introductionmentioning
confidence: 99%