Efficient Session Management mechanism applied Key Recovery technique in IPSec

IPSec에서 키 복구 기술을 적용한 효율적인 연결 관리 메커니즘

  • Kim, Jeong-Beom (Dept.of Computer Science, Graduate School of Korea University) ;
  • Lee, Yun-Jeong (Dept.of Computer Science, Graduate School of Korea University) ;
  • Park, Nam-Seop (Dept.of Computer Science, Graduate School of Korea University) ;
  • Kim, Tae-Yun (Dept.of Computer Sceince, Korea University)
  • 김정범 (고려대학교 대학원 컴퓨터학과) ;
  • 이윤정 (고려대학교 대학원 컴퓨터학과) ;
  • 박남섭 (고려대학교 대학원 컴퓨터학과) ;
  • 김태윤 (고려대학교 컴퓨터학과)
  • Published : 2001.12.01

Abstract

Recently the use of Linux OS is increasing to tremendous figures. But due to the fact that Linux is distributed on an open-source policy, the need of security is an upcoming question which leads to widespread development of security on a Linux based environment. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. In this thesis I am suggesting an mechanism based on the key recovery technique, as a method to save time in recovery and resetting a disconnection between two end-users through IPSec (IP Security) protocols in a VPN (Virtual Private Network) environment. The main idea of the newly suggested mechanism, KRFSH (Key Recovery Field Storage Header), is to store the information of the session in advance for the case of losing the session information essential to establish a tunnel connection between a SG and a host in the VPN environment, and so if necessary to use the pre-stored information for recovery. This mechanism is loaded on the IPSec based FreeS/WAN program (Linux environment), and so the VPN problem mentioned above is resolved.

최근 리눅스에 대한 사용이 빠른 속도로 증가하고 있다. 하지만 리눅스의 오픈 소스 정책에 따른 리눅스 보안의 필요성이 대두되어 리눅스 기반의 효과적인 암호 개발이 급속히 확산되고 있다. 하지만 암호는 본래 가지고 있는 키 관리의 어려움 때문에 여러 가지 문제가 발생할 수 있다. 이러한 암호의 사용이 야기하는 역기능을 해소하고 순기능을 지향하기 위해 키 복구에 대한 연구가 활발히 진행되고 있으며, 지금까지 많은 키 복구 기술들이 제시되어왔다. 본 논문에서는 IPSec(IP Security) protocol로 구현된 VPN(Virtual Private Network) 환경 하에서 종단간에 연결이 끊어졌을 경우 이에 따른 연결 재 설정에서의 시간적 소모를 줄이기 위한 방안으로 키 복구 기술을 이용한 메커니즘을 제안한다. 즉 제안한 KRFSH(Key Recovery Field Storage Header)라는 새로운 메커니즘은 VPN에서 SG와 호스트 사이의 터널 형성을 위한 세션 정보를 잃어버렸을 경우를 대비해서 세션 정보를 미리 저장해두고, 필요할 때 복구 할 수 있다. 이러한 메커니즘을 리눅스상의 IPSec 프로그램인 FreeS/WAN에 탑재함으로써, 위에서 언급한 VPN의 문제점을 해결한다.

Keywords

References

  1. Dave Kosiur, 'Building and Managing Virtual Private Networks?,' John Wiley & Sons, 1998
  2. Atkinson, R., 'Security Architecture for the Internet Protocol,' RFC 2401, NRL, November, 1998
  3. Matt Blaze, 'Protocol Failure in the Escrowed Encryption Standard,' the 2nd ACM Conference on computer and Communications Security, pp.59-67, 1994 https://doi.org/10.1145/191177.191193
  4. Yair Frankel and Moti Yung, 'Escrow Encryption System Visited: Attacks. Analysis and Designs,' Crypto'95. Springer-Verlag. Lecture Notes in Computer Science. LNCS 963. pp.223-235, 1995
  5. Ross Anderson and Micheal Roe, 'The GCHQ Protocol and its Problems,' Eurocrypt'97. Springer-Verlag, Lecture Notes in Computer Science, LNCS 1233, pp.134-148, 1997
  6. Adi Shamir, 'Partial key escrow: A new approach to software key escrow,' Key Escrow conference, 1995
  7. S. J. Kim, I. S. Lee, M. Mambo and S. J. Park, 'On the Difficulty of Key Recovery System,' Proc. of ISW'99 Information Security Workshop. Springer-Verlag, 1999
  8. Brigit Pfizrnann and Micheal Waidner, 'How to Break Fraud Detectable Key Recovery,' ACM Operating Systems Review 32, 1998 https://doi.org/10.1145/280559.280563
  9. Adi Shamir, 'Partial key escrow: A new approach to software key escrow,' Key escrow conference, 1995
  10. D. Maughan, M. Schertler, M. Schneider, J. Tunner, 'Internet Security Association and Key Management Protocol (lSAKMP),' RFC 2408, NRL, November, 1998
  11. Tom Markham, Charles Williams. Key Recovery Header for IPSec, Computer & Security, Vol.19, 2000 https://doi.org/10.1016/S0167-4048(00)86367-1
  12. Atkinson, R., 'IP Authentication Header,' RFC 2402, NRL, November, 1998
  13. Atkinson, R., 'IP Encapsulation Security Payload,' RFC 2406, NRL, November, 1998
  14. Sabari Gupta, A Common Key Recovery Block Format: promoting Interoperability between dissimilar key recovery schemes, KRA white-paper, 1998
  15. Michael J.Markowitz and roge S.Schiafly, Key Recovery in SecretAgent Digital Signiture draft 5, June, 1997
  16. FreeS/WAN, http://www.freeswan.org/freeswan_trees/freeswan-1.8/doc/index.html