Cryptology ePrint Archive: Report 2005/416

Cryptography in Theory and Practice: The Case of Encryption in IPsec

Kenneth G. Paterson and Arnold K.L. Yau

Abstract: This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed by users. Our focus is on IPsec, an important and widely-used suite of protocols providing security at the IP layer of network communications. Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards currently mandate its support. We present evidence that such ``encryption-only'' configurations are in fact still often selected by users in practice, even with strong warnings advising against this in the IPsec standards. We then describe a variety of attacks against such configurations and report on their successful implementation in the case of the Linux kernel implementation of IPsec. Our attacks are realistic in their requirements, highly efficient, and recover the complete contents of IPsec-protected datagrams. Our attacks still apply when integrity protection is provided by a higher layer protocol, and in some cases even when it is supplied by IPsec itself. Finally in this paper, we reflect on the reasons why this unsatisfactory situation persists, and make some recommendations for the future development of IPsec and cryptographic software in general.

Category / Keywords: implementation / IPsec, integrity, encryption, ESP

Date: received 18 Nov 2005, last revised 24 Apr 2006

Contact author: kenny paterson at rhul ac uk

Available format(s): PDF | BibTeX Citation

Note: This is an extended version of the Eurocrypt 2006 paper with the same title.

Version: 20060424:152503 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]