2006
DOI: 10.1007/11761679_2
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography in Theory and Practice: The Case of Encryption in IPsec

Abstract: Abstract. Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards mandate its support. We present evidence that such "encryption-only" configurations are in fact still often selected by users of IPsec in practice, even with strong warnings advising against this in the IPsec standards. We then describe a variety of attacks against such configurations and report on their successful implementation in the case of the Linux kernel im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 26 publications
0
28
0
Order By: Relevance
“…For example, problems relating to IPsec support for encryption-only modes of the Encapsulating Security Payload (ESP) protocol seems conceptually similar; a comprehensive overview and resulting attack is given by Paterson and Yau [29]. One can conjecture that the motivation for encryption-only ESP, like ephemeral-static ECDH, is efficiency.…”
Section: Discussionmentioning
confidence: 99%
“…For example, problems relating to IPsec support for encryption-only modes of the Encapsulating Security Payload (ESP) protocol seems conceptually similar; a comprehensive overview and resulting attack is given by Paterson and Yau [29]. One can conjecture that the motivation for encryption-only ESP, like ephemeral-static ECDH, is efficiency.…”
Section: Discussionmentioning
confidence: 99%
“…An interesting case is that of encryption-only-mode of IPsec, for which Paterson and Yau [5] exploited CBC mode of encryption. Their attacks work if an implementation does not follow the standard strictly.…”
Section: Related Workmentioning
confidence: 99%
“…In Setup-(a), I obtains the term {iv 2 For instance, in an attack on IPsec [5] that is based on address rewriting, the first phase of the attack succeeds with a probability of 2 −17 , due to a specific block alignment of IPsec. This means that an attacker may have to repeat the first phase 2 17 times in order to succeed.…”
Section: Nssk With Cbc Mode Of Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some other padding schemes leading to decryption attacks have been identified (see e.g. [2,5,7,11]). …”
Section: Introductionmentioning
confidence: 99%