WO1998032065A2 - Improved network security device - Google Patents

Improved network security device Download PDF

Info

Publication number
WO1998032065A2
WO1998032065A2 PCT/US1997/024201 US9724201W WO9832065A2 WO 1998032065 A2 WO1998032065 A2 WO 1998032065A2 US 9724201 W US9724201 W US 9724201W WO 9832065 A2 WO9832065 A2 WO 9832065A2
Authority
WO
WIPO (PCT)
Prior art keywords
packet
address
network
security device
network security
Prior art date
Application number
PCT/US1997/024201
Other languages
French (fr)
Other versions
WO1998032065A3 (en
Inventor
Aharon Friedman
Eva Bozoki
Original Assignee
Fortress Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fortress Technologies, Inc. filed Critical Fortress Technologies, Inc.
Priority to JP53439998A priority Critical patent/JP2001508627A/en
Priority to AU58115/98A priority patent/AU743258B2/en
Priority to EP97954307A priority patent/EP0951767A2/en
Priority to IL13077497A priority patent/IL130774A0/en
Publication of WO1998032065A2 publication Critical patent/WO1998032065A2/en
Publication of WO1998032065A3 publication Critical patent/WO1998032065A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2596Translation of addresses of the same type other than IP, e.g. translation from MAC to MAC addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/35Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Definitions

  • the present invention is directed to improvements in a network security device that is connected between a protected computer("the client") and a network and/or a protected local area network (LAN) and a wide area network (WAN) as well as a method for using the network security device.
  • a protected computer the client
  • LAN local area network
  • WAN wide area network
  • FIG. 1 An Internet communications network 100 is depicted in FIG. 1 including five transmit or backbone networks A,B,C,D, and E and three stub networks R, Y, and Z.
  • a "backbone” network is an intermediary network which conveys communicated data from one network to another network.
  • a "stub” network is a terminal or endpoint network from which communicated data may only initially originate or ultimately be received.
  • Each network, such as the stub network R includes one or more interconnected subnetworks I, J, L, and M.
  • subnetwork refers to a collection of one or more nodes, e.g.
  • Each subnetwork may be a local area network (or "LAN") .
  • Each subnetwork has one or more interconnected nodes which may be host computers ("hosts”) u,v,w,x,y,z (indicated by triangles) or routers a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s (indicated by squares) .
  • a host is an endpoint node from which communicated data may initially originate or ultimately be received.
  • a router is a node which serves solely as an intermediary node between two other nodes; the router receives communicated data from one node and retransmits the data to another node.
  • Collectively, backbone networks, stub networks, subnetworks, and nodes are referred to herein as "Internet systems" .
  • FIG. 2 shows a block diagram of a host or router node 1 0.
  • the node may include a CPU 1 1 , a memory 1 2 and one or more I/O ports (or network interfaces) 1 3-1 , 1 3-2,. . ., 1 3-N connected to a bus 14.
  • each I/O port 1 3-1 , 1 3-2, . . ., 1 3-N is connected by wires, optical fibers, and/or switches to the I/O port of another node.
  • the I/O ports 1 3-1 , 1 3-2, . . . , 1 3-N are for transmitting communicated data in the form of a bitstream organized into one or more packets to another node and for receiving a packet from another node. If the host 1 0 is a host computer attached to a subnetwork which is an Ethernet, then the host will have an I/O port which is an Ethernet interface.
  • a host which initially generates a packet for transmission to another node is called the source node and a host which ultimately receives the packet is called a destination node.
  • Communication is achieved by transferring packets via a sequence of nodes including the source node, zero or more intermediary nodes, and the destination node, in a bucket brigade fashion. For example a packet may be communicated from the node w to the node c, to the node d, to the node b, and to the node x.
  • An exemplary packet 40 is shown in FIG. 3A having a payload 41 which contains communicated data (i.e. , user data) and a header 42 which contains control and/or address information.
  • the header information is arranged in layers including an IP layer and a physical layer.
  • the IP layer typically includes an IP source address, an IP destination address, a checksum, and a hop count which indicates a number of hops in a multihop network.
  • a physical layer header includes a MAC (Media Access Control)address (hardware address) of the source and a MAC address of the destination.
  • the user data may include a TCP (Transfer Control Protocol) packet including TCP headers or a UDP (User Data Protocol) packet including UDP headers.
  • TCP Transfer Control Protocol
  • UDP User Data Protocol
  • IP address Internet address
  • an address portion 32 indicating a particular subnetwork of the node
  • a host portion 33 which identifies a particular host or router and discriminates between the individual nodes within a particular subnetwork.
  • IP addresses of the source and destination nodes are placed in the packet header 42 (see FIG . 3A) by the source node.
  • a node which receives a packet can identify the source and destination nodes by examining these addresses.
  • the IP address of a destination In an Internet system, it is the IP address of a destination that is known, and the physical address (i.e. , MAC address) to be placed in the MAC frame header is to be determined. If the destination host is on the same local area subnetwork (and this is easily determined by observing that the network part in both the source and destination IP addresses is the same), then the destination address that is to go into the MAC header destination address field is simply the physical address of the destination host.
  • the MAC destination address may be found by means of the ARP (Address Resolution Protocol) which comprises having the source host broadcast an ARP request packet with the IP address of the destination host and having the destination host respond with its hardware (MAC) address. This MAC address may be placed in the MAC frame (physical layer) headers.
  • ARP Address Resolution Protocol
  • Eavesdropping in a network can be thwarted through the use of a message encryption technique.
  • a message encryption technique employs an encipherment function which utilizes a number referred to as a session key to encipher data (i.e., message content) . Only the pair of hosts in communication with each other have knowledge of the session key, so that only the proper hosts, as paired on a particular conversation, can encrypt and decrypt digital signals.
  • encipherment functions are ( 1 ) the National Bureau of Standards Data Encryption Standard (DES) (see e.g.
  • CDH Composite Diffie-Hellman
  • each user I has a public key P ; (e.g., a modulus N) and a secret key Si (e.g., the factors p and q) .
  • a message to user I is encrypted using a public operation which makes use of the public key known to everybody (e.g., squaring a number mod N) .
  • this message is decrypted using a secret operation (e.g., square root mod N) which makes use of the secret key (e.g. , the factors p and q) .
  • a secret operation e.g., square root mod N
  • Network Security Devices At present, existing network security products are categorized into two classes: ( 1 ) firewalls, such as Janus and ANS, and (2) software products, such as encrypted mail, secured http, one time password, etc.
  • a firewall is a dedicated computer, usually running a Unix operating system. It acts as a filter for incoming and outgoing communications.
  • the firewall is placed as a router between the local area network (LAN) and the outside world. The decision whether to pass a packet is made based on the source and/or destination IP address, and the TCP port number.
  • Some firewalls also have the ability to encrypt data, provided that both sides of the communication employ the same brand of firewall.
  • Some firewalls have a personal authentication feature. Software products are based on the premise that the computer on which they are installed are secure, and protection is only needed outside on the network. Thus, such software products can easily be bypassed by breaking into the computer.
  • a typical scheme is when an intruder implants a "Trojan Horse” on a computer which sends him an unencrypted copy of every transaction. Sometimes, it is even done as a delayed action during the off-hours when the computer is not likely to be supervised.
  • Firewalls are more effective in maintaining network security. However they are very expensive. Their price range is between $ 1 0,000 and $50,000, plus the price of the hardware. They require a high level of expertise to install and maintain. The most sophisticated and effective firewalls require a specially trained technician or engineer for their maintenance. The special training cost is up to $ 10,000 per person, and the salary adds $60,000 to $ 1 20,000 or more per annum to the cost.
  • Firewalls have to be constantly maintained, modified, and monitored in order to yield reasonable security. They only cover the TCP part of the Internet Protocol and not the UDP part. Thus, they do not provide security to NFS (Network File Services) and many client/server applications.
  • NFS Network File Services
  • the firewall is a full service computer which can be logged into for maintenance and monitoring. Thus, it can be broken into. Once a firewall is compromised it loses its effectiveness and becomes a liability rather than a security aid. Firewalls only protect the connection between a LAN and a WAN (Wide Area Network) . It does not protect against intrusion into a particular host from within the LAN.
  • the present invention provides improvements to the Network Security
  • a preferred embodiment of the inventive network security device comprises a first network interface connected to a protected client, a second network interface connected to a portion of a network, and a processing circuit connected to both interfaces.
  • a communication from the protected client goes from the client, to the first interface, to the processing circuit, to the second interface and into the network.
  • a communication received from the network goes from the second interface, to the processing circuit, to the first interface and to the protected client.
  • the public keys are exchanged between two network security devices in order to establish a common secret key.
  • the common secret key is the key which is used to encrypt/decrypt all messages between two particular devices. This key should not be transmitted.
  • the static keys are permanent keys unique to each device.
  • the dynamic keys have a predetermined lifespan and are replaced periodically, such as every 24 hours.
  • the static keys are generated using a seed derived from the host's IP address, MAC address of the network interface connected between the protected host and the network security device, and the security device's serial number.
  • the dynamic keys are generated using seeds derived from current date and time information.
  • Packets received from the protected client are encrypted using an encipherment function such as IDEA, FEAL, or DES before being transmitted via the network to a destination.
  • Encipherment function such as IDEA, FEAL, or DES
  • Encrypted packets received from a destination are decrypted.
  • Such encryption and decryption requires a common session key to be possessed jointly by the protected client and the destination (the destination being a protected client of another network security device located someplace else in the network) .
  • the common crypto key i.e. , the common secret key
  • the network security device maintains two databases.
  • a static database (SDB) contains information about secured hosts or nodes in the network.
  • a secured host or node is a host or node that is protected by a network security device.
  • Each entry in the static database contains information about a particular secured host, i.e., the host IP address, time entered in the database, and the host's permanent public key.
  • a dynamic data base contains information about secured and unsecured hosts.
  • Each entry in the dynamic database includes a host's IP address, the time that the host's dynamic key was generated, a flag indicating whether or not the host is secured, a flag indicating whether the host is in transition (i.e., in the middle of a key exchange), and a pointer to a common secret session key.
  • the protocol used by the network security device of host i to agree on a common crypto key with a network security device of host j is as follows.
  • a communication from host i to host j The communication arrives at the network security device of host i from host i.
  • the network security device checks if host j is in the dynamic database. If host j is in the dynamic database, it is determined if the dynamic database has a common crypto key for communication between host i and host j. If there is such a common session key, the communication from host i is encrypted using the common crypto key and transmitted to host j. If there is no common crypto key, then host i sends the dynamic part of its public key P ; to host j and host j replies by sending the dynamic part of its public key P j to host i.
  • the exchange of dynamic parts of the public keys may be encrypted using the static part of the public keys, which may be obtained from the static databases at host i and host j.
  • the common crypto key is then calculated according to a Diffie-Hellman technique.
  • the dynamic keys of each network security have a particular lifespan, such as 24 hours, there may be a time difference between times when two device's keys expire. Thus, it is possible that one device's dynamic key may expire before the packet is received. One way to prevent this occurrence is to take into account this time difference.
  • the DDB may correct the time difference between the time the packet was sent and the time the packet is received. Also, the DDB time generation entry indicates to the network security device when the other party's dynamic key expires. Thus, when a communication between the nodes is initiated, it may be determined whether a new dynamic key exchange is warranted, rather than attempting to use an expired common dynamic key.
  • a packet received by the network security device and the connected host is preferably processed in the following manner.
  • the IP and MAC headers from the packet are copied into a new IP packet.
  • the client host's physical address e.g., the MAC address of the network interface between the client and the network security device
  • the network security device's MAC address e.g., the MAC address of the network interface between the network security device and the network.
  • the new IP packet includes a proprietary header and proprietary tail. Information about the packet is stored in the proprietary tail, including check sum information.
  • the data and proprietary tail are then encrypted.
  • the proprietary header is then filled in, including check sum information for the encrypted data. This packet is then transmitted into the network. This processing method provides a double integrity check.
  • the check sum which was calculated after encryption is checked by the receiver before decryption, providing an integrity test of the encrypted data in transit.
  • the check sum in the proprietary tail was calculated before encryption and checked by the received after decryption.
  • This checksum provides a means of strong authentication because the static and dynamic keys used to encrypt the checksum are known only to the two communicating hosts. This check sum will differ if the common secret key is not identical on both sides and also provides an integrity test of the actual data. Note that if the check sum is replaced with a secured hash function, after the packet is encrypted, it becomes a digital signature. I t should be noted that encryption takes place at the IP level so that TCP and UDP packets are encoded. In short, the inventive network security device has a number of significant advantages.
  • the inventive network security device is a hardware/software combination in a preferred implementation. However, it is a sealed "box" and cannot be logged into. Hence, it cannot be compromised the way a firewall can. It is much cheaper than a firewall. Thus, each node in the LAN can be equipped with it. This way, it provides protection inside the LAN as well as outside.
  • the network security device works directly at the IP level. It therefore, covers all types of IP protocols and requires no special configuration to different network applications. Thus, the inventive network security device is maintenance free.
  • FIG. 1 schematically illustrates an Internet system.
  • FIG. 2 schematically illustrates the architecture of a host in the network of
  • FIG. 1 is a diagrammatic representation of FIG. 1 .
  • FIGs. 3A and 3B illustrate the format of a packet transmitted in the network of FIG. 1 .
  • FIG. 4A illustrates a network security device for use with a host in the network of FIG. 1 in accordance with an embodiment of the present invention.
  • FIG. 4B illustrates a network security device for use with a LAN in accordance with an embodiment of the present invention.
  • FIG. 5 illustrates an entry in a static database maintained by the network security device of FIG. 4.
  • FIG. 6 illustrates an entry in a dynamic database maintained by the network security device of FIG. 4.
  • FIG. 7 is a flow chart illustrating an activation method used by the network security device of FIG. 4.
  • FIG. 8 is a flowchart illustrating a key exchange method used by the network security device of FIG. 4.
  • FIG. 9 is a flow chart illustrating an IP packet handling algorithm utilized by the network security device of FIG. 4.
  • FIG. 10 illustrates an IP packet received from a connected host by the network security device and an IP packet transmitted from the network security device into a network.
  • FIG. 1 1 is a flowchart illustrating a method of processing the packets of FIG. 10.
  • FIG. 4A schematically illustrates a network security device for protecting a host according to an embodiment of the invention.
  • the security device 400 comprises a first interface 402 which is connected to the client host 404. Specifically, the interface 402 is connected to a network interface in the client host 404 (e.g., an interface 1 3 of Fig. 2) via a cable or wire 406.
  • the security device 400 comprises a second interface 408 which is connected to a portion of a network 1 00.
  • the interface 408 is connected to an Ethernet so that the interfaces 402, 408 are Ethernet interfaces such as SMC Elite Ultra Interfaces.
  • FIG. 4B schematically illustrates a network security device 400' for protecting a LAN according to an embodiment of the invention.
  • a network security device 400' according to the invention is connected between a LAN 450, such as an Ethernet network (including, for example, a file server 452 and a workstation 454), and a router 456 which routes communications between the LAN 450 and a WAN 100, such as the Internet.
  • a LAN 450 such as an Ethernet network (including, for example, a file server 452 and a workstation 454)
  • a router 456 which routes communications between the LAN 450 and a WAN 100, such as the Internet.
  • WAN 100 such as the Internet.
  • network security devices may be arranged in a cascaded topology. Note that workstation 454 is associated with a network security device 400.
  • a CPU 410 is connected to the interfaces 402, 408.
  • the CPU is, for example, an Intel 486 DX 62-66 or Pentium.
  • the processing circuit may be implemented as one or more ASICs (Application Specific
  • An optional encryption module 41 8 may be provided to perform encryption and large number arithmetic operations.
  • the encryption unit may be implemented as a programmable logic array.
  • the encryption module 41 8 may be omitted and its function may be carried out using a software program which is executed by the CPU 410.
  • the software executed by the CPU 1 1 preferably has three components: ( 1 ) operating system, (2) networking system, and
  • the operating system and the networking system may both be part of a Unix-like kernel.
  • the key computation algorithms reside in memory and are signaled into action by the networking system.
  • the operating system is a lobotomized Linux system with all drivers taken out except the RAM, disk, and Ethernet interfaces.
  • the networking system is for communication, key exchange, encryption, configuration, etc.
  • the key computation software may run independently of the other software. This shifts the computationally intensive task of key computation away from the operating system and networking system.
  • the CPU 410 maintains two databases.
  • One database is a static database
  • FIG. 5 illustrates one entry in the SDB 41 2.
  • the SDB may have an entry for the client host as well as other hosts.
  • the static database entry 500 contains permanent information about the network security device 400 and other secured nodes in the network.
  • the static database entry 500 may include the following information about another secured node: the other node's IP address 502, time that this other node was entered into the database 504, the node's permanent public key 506, and a pointer to the static common key shared by the network security device 400 and the other node's device 508.
  • the static database 500 may also contain the IP address and the serial number of the connected host 51 0.
  • a second database is a dynamic database (DDB) 41 6, which may be stored in a volatile memory, such as a RAM.
  • FIG. 6 illustrates one entry in the DDB 41 6.
  • the dynamic database entry 600 contains information about secured and unsecured nodes, i.e., the other node's IP address 602, the time a last packet was sent from that other node 604, a time the other node's dynamic key was generated 606, a pointer to a common secret key shared with that node, time last updated, a secured flag indicating whether the node is secured (e.g., has its own network security device) 602, and a transition flag indicating whether the node is in transition (i.e., in the middle of a key exchange) .
  • secured flag indicating whether the node is secured (e.g., has its own network security device) 602
  • transition flag indicating whether the node is in transition (i.e., in the middle of a key exchange) .
  • a preferred embodiment of the present invention operates in the following manner.
  • the interface 402 is put in a promiscuous mode. In this mode, the interface 402 passes all communications from the client host 404 that are sensed on the cable 406 to the CPU 410.
  • the network connection is via the interface 408 which is set to the same IP address as the client 404.
  • the network security device 400 responds to the Address Resolution Protocol by sending its own (rather than the client's) MAC address. This adds a level of security by blocking attempts to bypass the device 400 using the Ethernet protocol.
  • Received communications are checked to see if they are from a secured host.
  • the DDB entry 600 is checked to determine if there is a current dynamic common key shared with the node sending the communication. If yes, this key is used to encrypt and decrypt subsequent packets. If no, if these nodes have communicated previously, a dynamic key exchange is performed. If it is the first time these nodes have communicated, a static key exchange is performed to obtain a static dynamic key. This static key is used to encrypt and decrypt the dynamic key exchange communications.
  • the network security device 400 is a sealed box which cannot be logged into.
  • the network security device 400 senses the IP
  • the client 404 is prevented by the network security device 400 from changing its IP (and/or MAC) address.
  • the network security device 400 is activated before the network security device 400 is placed into service.
  • the role of activation is to allow or disallow burning the host's 404 IP address into an entry 500 in the static database 41 2.
  • the SDB 41 2 may have an entry 500 for the connected client host.
  • the network security device's serial number (element 510) and the time of activation (element 504) may also be burned into the static database entry 500. As discussed below, these values may be used to generate a seed for the network security device's static private key.
  • FIG. 7 is a flowchart 700 illustrating a preferred activation method.
  • an "activation packet" containing an activation string in the payload may be sent from a connected computer, such as a host 404, through the network security device 400 (step 702) .
  • the packet is received by the device 400, which determines whether it has been activated (step 704) . If it has not been activated, the IP address and other information are written into the flash memory (step 706), as described above, and an acknowledgment packet is returned to the computer (step 708).
  • the device 400 may also generate a confirmation message for display on a monitor of the connected computer (step 71 0) .
  • ARP Address Resolution Protocol
  • MAC Ethernet machine
  • the private keys are 1 28 bits long and are known only to that network security device.
  • the public keys are 51 2 bits long and are revealed to others.
  • Public keys, as described above, are exchanged between two network security devices in order to establish a 1 28 bit long common secret key.
  • the common secret key is the key which is used to encrypt/decrypt all messages between two particular devices. The common secret keys should never be transmitted.
  • the keys are generated when the device 400 is turned on.
  • the static keys are permanent keys unique to each device and the dynamic keys have a predetermined lifespan and are replaced periodically, such as every 24 hours.
  • Static Keys Keys are generated using a "seed", or number, which is then processed to generate a key.
  • the seed for a randomly generated static private key for a particular network security device 400 is derived from the device's IP-address, MAC-address, serial number, and a time-stamp.
  • a private key (preferably 1 28 bits long), is then randomly generated using a random number generator, such as the GNU Multiple Precision library copyrighted by Free Software Foundation Inc. ( 1 996), Boston, Massachusetts, 021 1 1 . If the box is non-activated, the seed is the present time, thus it will be different every time the box is turned-on. On the other hand, for activated boxes, the static private key is a property of the box, it will not change by turning the box on/off.
  • a random number generator such as the GNU Multiple Precision library copyrighted by Free Software Foundation Inc. ( 1 996), Boston, Massachusetts, 021 1 1 .
  • Dynamic Keys The dynamic private key is randomly generated at predetermined intervals.
  • dynamic keys may be generated every 24 hours.
  • the dynamic keys are derived from a random seed obtained from seconds, minutes, and hours of the present time.
  • the dynamic secret key may be processed from the seed using a random number generator, such as the GNU Multiple Precision library
  • X is the public key
  • Xi is the private key
  • q and n prime numbers which are preferably installed in each network security device.
  • a protocol is executed by which the two devices (i) exchange static public keys (unencrypted), (ii) generate a static common key, and then (iii) exchange dynamic public keys encrypted with their static common key.
  • FIG. 8 is a flowchart 800, illustrating the key exchange algorithm.
  • the DDB includes an entry for a "secured" flag 61 2 and a "transition” flag 614.
  • the secured flag indicates the current security status between the two network security devices.
  • the secured flag may be in one of five states:
  • the transition flag 614 indicates the status of a key exchange.
  • the transition flag maybe in one of four states: 0 not in transition i ⁇ N waiting to receive a dynamic public key packet N + 2 waiting for a dynamic common key calculation
  • the "transition” and “secured” flags in the DDB may then be set accordingly.
  • the following table sets out possible outcomes of a DDB/SDB search.
  • DB size is the number of entries i for node A in the entry number in the dynamic database.
  • the common dynamic key has not expired and the packet is encrypted using the session key and an encipherment function such as
  • the host client i.e., the source
  • sends its dynamic public key and IP address to the node with IP A (the destination)
  • step 808 and waits for a reply (step 81 0) .
  • Steps 808 and 810 may be repeated several times, such as three times.
  • step 81 2 If no reply is received (step 81 2) from the destination, the source network security device sets the secured flag to 2 and the transition flag to 0 (step 81 4) in the DDB entry for the destination. If the packet to be encrypted originated from the host (step 81 6), the packet may be dropped (step 81 8). If the packet originated from another party, the network security device may try to decrypt the packet using the static private key(step 820) .
  • the transition flag for the destination node in the DDB entry 600 of the network security device of the host is set to N + 2 (step 822), indicating that the common dynamic key is being calculated.
  • a common dynamic (crypto) key for the source and destination is calculated by the network security device of the source (step 824) using, for example, a Diffie-Hellman technique as described above.
  • the common session key is then entered into the DDB entry 600 of the source network security device (step 826) and the transition flag for this DDB entry is marked 0 (step 828)because the transition is complete.
  • the secured flag 1 .
  • the network security device calculates a common static key using its static key and a standard Diffie-Hellman technique.
  • the transition flag is set to -(N + 2) .
  • the static common key is calculated, it is used to encrypt the dynamic key exchange (steps 808-822) .
  • the inventive device preferably uses the well-known Diffie-Hellman key exchange protocol.
  • the secured flag 2 and the transition flag in the entry in the DDB is 0 because the transition off (step 81 4) .
  • Both the static and the dynamic key request maybe repeated N try times at not less then t exp ⁇ re time intervals (in a preferred embodiment they are set to 8 tries and 2 ms, respectively) .
  • entries in the SDB are burned in and are permanent. Entries in the DDB may be volatile, that is, the entries may be overwritten or lost if the device 400 is turned off.
  • the second flag for another node is set at either 2, 3, or 4, the network security device will continue to attempt a dynamic key exchange every predetermined period, such as every five minutes.
  • the dynamic keys have a predetermined lifespan. For example, new dynamic keys may be generated every 24 hours. When the lifespan expires, all of the dynamic common key entries, which were calculated using an expired dynamic key, for other nodes are incorrect. Thus, all secured flags in the
  • a new dynamic key is generated .
  • the secured flag is then changed back to 1 (or 2) when the next packet (sent to or received from that
  • IP-address initiates a successful dynamic key exchange.
  • the dynamic keys of each network security device have a particular lifespan, such as 24 hours, there may be a time difference between times when two device's keys expire. For example, if two devices in different time zones are both programmed to generate new dynamic keys at midnight, there may be several hours difference between key expiration times. Thus, it is possible that one device's dynamic key may expire during a communication. Also, because Internet communications are connectionless, that is, the receiving party does not have to be connected to the sending party when the packet is transmitted, one or the other party's dynamic key may have expired before the packet is received. One way to prevent this occurrence is to take into account this time difference. Referring back to FIG.
  • the DDB entry 600 contains an entry "time generated” 606, which indicates the time that the other device's dynamic key was generated. This is done by correcting the "time generated” entry by the time difference between the time the packet was sent (the time stamp entry 604 in the DDB entry) and the time the packet is received (the present time) .
  • time generated 606 entry indicates to the network security device
  • one party may have received the other party's dynamic key.
  • the other side may be calculating the common dynamic key and sending dynamic key requests encrypted with the static common key.
  • the device tries to decrypt the packet using the static key.
  • the packet is dropped only if the packet cannot be decrypted with the static key, that is, if it is an illegal packet.
  • a network security device When a network security device receives an IP-packet containing another party's static or dynamic public key (sent either as a reply to a key-request or as an initiation for a key exchange), the public key is extracted from the packet and sent to either the CPU 41 0 or the encryption module 41 8 for further processing . There the shared secret key is calculated from the device's own private key and the other party's just received public key.
  • Packet Processing Fig. 9 is a flowchart 900 illustrating a packet handling algorithm utilized by the inventive network security device.
  • the packet may arrive from the connected host at interface 402 or from the network at interface 408.
  • the packet arrives from the host at interface 402. If the packet carries an ICMP (Internet Control Message Protocol) or IGMP (Internet Gateway Message Protocol) identification (step 902), the packet is passed to the interface 408 without encryption. However, the source MAC address in the packet is translated to the MAC address of interface 408 (step 904). ICMP and IGMP Packets are not addressed to a destination host. Rather these packets are utilized by intermediate entities in the network, e.g., routers, for various functions. The source IP address is checked to make sure that it is the same as the entry burned into the SDB 41 2 for the connected host. This prevents an adversary from posing as the connected host to gain access to secure communications. This is called preventing " IP spoofing" and is described in detail in U.S. Patent Application Serial No. 08/529,497. The discussion of preventing IP spoofing is incorporated herein by reference.
  • the packet is dropped (step 906, 908) .
  • the device may be in a secured/unsecured mode (special order) . In such case the packet will be sent unchanged.
  • step 91 0 it is determined if the packet contains a part of a message that has been fragmented. If the packet contains a fragment, the fragments are collected (step 91 2) and the message is encrypted (step 91 4) . The encryption takes place using the common session key and an encipherment function. If the encrypted message is too long for the particular LAN (step 91 6) , it is fragmented (step 91 8) . An encrypted packet is then transmitted to interface 408 for transmission into the network 100 (step 920) .
  • An encrypted packet carries a signature in the protocol part of the IP header. This indicates that the packet is encrypted.
  • the IP address of a packet is not encrypted, otherwise the packet could not be routed through the network.
  • the packet arrives via the network at interface 408 is now considered. If the packet is an ICMP or IGMP packet (step 940) no decryption is necessary and the packet is sent to the first interface 402 (step 942) . If the packet is a key exchange packet (step 944) the packet is processed according to the key exchange protocol (step 946) . If the packet is not encrypted (step 948) the packet is dropped (step 950) . The device may be in a secured/unsecured mode (special order) . In such a case the packet will be sent to the client unchanged. If the packet is encrypted but the network security device does not have the key (step 952) , the key exchange protocol is carried out (step 954) and the packet is dropped (step 956) . If the key is available in the dynamic data base of the network security device, the packet is decrypted (step 958) and sent to interface 402 (step 960) .
  • the network security device 1 00 receives an IP-packet on the first interface 402, processes it, and sends it onto network 1 00 via the second interface 408.
  • FIG. 10 illustrates an IP packet 1 01 0 (IP received from host 404, an IP packet (IP out ) 101 0 prepared by the network security device 400, and an encrypted IP out packet 1 030 transmitted by the second interface 408.
  • the IP ⁇ n packet 1000 includes a MAC header 1002, containing the host's 404 MAC address, an IP header 1 004, containing the host's IP address, and a payload 1 006 containing data.
  • the IP 0Ut packet 1 01 0 includes a MAC header 1 01 2 containing the network security device's MAC address, an IP header 1014 containing the host's 404 IP address, a proprietary header 101 6, a payload 1 1 18 containing the data, and a proprietary tail 1020.
  • the data in the payload 1 1 18 is compressed and the proprietary tail 1 120 includes packet length, protocol fragment, and checksum information.
  • the encrypted IP out packet 1030 preferably has everything after the proprietary header 101 6 encrypted, including the compressed data 101 8 and the proprietary tail 1020.
  • FIG. 1 1 is a flowchart 1 100 illustrating the processing of IP ⁇ n and IP 0Ut .
  • Packet IP ⁇ n 1000 is received from the host 404 at the first interface 402 (step 1 102) .
  • the IP and MAC headers are copied from IP m to IP 0 ⁇ t (step 1 104) .
  • step 1 1 1 0 Compress the data from IP ⁇ n to IP 0Ut (step 1 1 1 0) .
  • the data is compressed using the LZRW1 compression algorithm.
  • IP out (step 1 1 1 8) .
  • steps (b)-(j) are performed in reverse order.
  • Double Integrity Checks The method illustrated in FIG. 1 1 provides a double integrity check.
  • the checksum in the proprietary-header on the sender's side is calculated after the encryption and checked on the receiver's side before decryption, thus providing an integrity test of the encrypted data in transit.
  • the checksum in the proprietary-tail on the sender's side is calculated before encryption and checked on the receiver's side after decryption.
  • This checksum provides strong authentication because the static and dynamic keys used to encrypt the checksum are known only by the two communicating devices. (Strong authentication is where one can prove it knows a secret without revealing the secret.) By using a decrypted checksum that agrees with the packet proves the sender and receiver share the same key.
  • the encrypted tail checksum is replaced with a secure hash function, such as the well-known MD5 algorithm, after the packet is encrypted, it becomes a digital signature.
  • a secure hash function such as the well-known MD5 algorithm
  • the tail checksum is encrypted with a static common key, it verifies that the dynamic public key originated from the sender, thus authenticating the sender.
  • the tail checksum is encrypted with a dynamic common key, it also verifies that the packet originated from the sender, authenticating that the packet originated from the sender.
  • the network security device 400' may be modified to protect a LAN 450 instead of a single host. These modifications are described below.
  • the network security device may protect a Class-C LAN having up to 254 clients (i.e. , workstations 454, server 452, etc.), but other LAN types, such as Class-A and Class-B, are also contemplated by the invention.
  • the IP address burned into the flash memory 41 2 is the
  • Class-C post of the client LAN's IP address A default MAC address, such as Oxf may also be burned into the flash memory 41 2. This default MAC address is used in the static key generation. Recall that the MAC address is used in the static key seed generation.
  • a LAN-type network security device 400' may build a MAC-table 460 which contains its clients' IP and MAC addresses. This table serves two functions. First, it prevents IP spoofing of any of the LAN device's 400' clients. Thus, if a packet is received on the first interface 402 that does not have an IP or MAC address of one of the nodes in the LAN, that packet is dropped. Second, it facilitates the delivery of packets to clients connected to the LAN 450. This permits packets to be sent from one protected client to another without the packet appearing at the second interface 408.

Abstract

A network security device (400) is connected between a protected client (404) and a network(100). The network security device (400) negotiates a session key with an other protected client. Then, all communications between the two clients are encrypted. The inventive device is self-configuring and locks itself to the IP address of its client. Thus, the client cannot change its IP address once set and therefore cannot emulate the IP address of another client. While a packet is transmitted from the protected host, the security device translates the MAC address of the client to its own MAC address before transmitting the packet into the network. Packets addressed to the host contain the MAC address of the security device. The security device translates its MAC address to the client's MAC address before transmitting the packet to the client.

Description

IMPROVED NETWORK SECURITY DEVICE Related Application
This patent claims the benefit of U.S. Provisional Patent Application Serial Number 60/033,995 entitled "Improved Network Security Device" , filed on January 3, 1 997 for Dr. Aharon Friedman and Dr. Eva Bozoki. This patent application is directed to improvements in the invention described in U.S. Patent Application Serial No. 08/529,497 entitled "Network Security Device" and filed on September 1 8, 1 995. The contents of these two documents are incorporated herein by reference.
Field of the Invention
The present invention is directed to improvements in a network security device that is connected between a protected computer("the client") and a network and/or a protected local area network (LAN) and a wide area network (WAN) as well as a method for using the network security device.
Background of the Invention A. Network Architecture An Internet communications network 100 is depicted in FIG. 1 including five transmit or backbone networks A,B,C,D, and E and three stub networks R, Y, and Z. A "backbone" network is an intermediary network which conveys communicated data from one network to another network. A "stub" network is a terminal or endpoint network from which communicated data may only initially originate or ultimately be received. Each network, such as the stub network R, includes one or more interconnected subnetworks I, J, L, and M. As used herein, the term "subnetwork" refers to a collection of one or more nodes, e.g. , (c,w), (d), (a) , (b,x,y), (q,v), (r,z), (s,u), (e,f,g),(h,i),(j,k,l),(m,n) , and (o,p), interconnected by wires and switches for local internodal communication. Each subnetwork may be a local area network (or " LAN") . Each subnetwork has one or more interconnected nodes which may be host computers ("hosts") u,v,w,x,y,z (indicated by triangles) or routers a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s (indicated by squares) . A host is an endpoint node from which communicated data may initially originate or ultimately be received. A router is a node which serves solely as an intermediary node between two other nodes; the router receives communicated data from one node and retransmits the data to another node. Collectively, backbone networks, stub networks, subnetworks, and nodes are referred to herein as " Internet systems" . FIG. 2 shows a block diagram of a host or router node 1 0. As shown, the node may include a CPU 1 1 , a memory 1 2 and one or more I/O ports (or network interfaces) 1 3-1 , 1 3-2,. . ., 1 3-N connected to a bus 14. Illustratively, each I/O port 1 3-1 , 1 3-2, . . ., 1 3-N is connected by wires, optical fibers, and/or switches to the I/O port of another node. The I/O ports 1 3-1 , 1 3-2, . . . , 1 3-N are for transmitting communicated data in the form of a bitstream organized into one or more packets to another node and for receiving a packet from another node. If the host 1 0 is a host computer attached to a subnetwork which is an Ethernet, then the host will have an I/O port which is an Ethernet interface.
A host which initially generates a packet for transmission to another node is called the source node and a host which ultimately receives the packet is called a destination node. Communication is achieved by transferring packets via a sequence of nodes including the source node, zero or more intermediary nodes, and the destination node, in a bucket brigade fashion. For example a packet may be communicated from the node w to the node c, to the node d, to the node b, and to the node x.
An exemplary packet 40 is shown in FIG. 3A having a payload 41 which contains communicated data (i.e. , user data) and a header 42 which contains control and/or address information. Typically, the header information is arranged in layers including an IP layer and a physical layer. The IP layer typically includes an IP source address, an IP destination address, a checksum, and a hop count which indicates a number of hops in a multihop network. A physical layer header includes a MAC (Media Access Control)address (hardware address) of the source and a MAC address of the destination. The user data may include a TCP (Transfer Control Protocol) packet including TCP headers or a UDP (User Data Protocol) packet including UDP headers. These protocols control among other things, the packetizing of information to be transmitted, the reassembly of received packets into the originally transmitted information, and the scheduling of transmission and reception of packets (see e.g., D. Commer, "Internetworking With TCP/IP", Vol. 1 ( 1 991 ); D. Commer and D. Stevens, " Internetworking With TCP/IP", Vol. 2 ( 1 991 )) . As seen in FIG. 3B, in an exemplary Internet protocol (IP), each node of the
Internet 100 is assigned an Internet address (IP address) which is unique over the entire Internet 100 such as the Internet address 30 for the node y shown in FIG. 3B. See, Information Sciences Institute, RFC 791 "Internet Protocol" , September, 1 981 . The IP addresses are assigned in an hierarchical fashion; the Internet (IP) address 30 of each node contains an address portion 31 indicating the network of
> the node, an address portion 32 indicating a particular subnetwork of the node, and a host portion 33 which identifies a particular host or router and discriminates between the individual nodes within a particular subnetwork.
In an Internet system 1 00 which uses the IP protocol, the IP addresses of the source and destination nodes are placed in the packet header 42 (see FIG . 3A) by the source node. A node which receives a packet can identify the source and destination nodes by examining these addresses.
In an Internet system, it is the IP address of a destination that is known, and the physical address (i.e. , MAC address) to be placed in the MAC frame header is to be determined. If the destination host is on the same local area subnetwork (and this is easily determined by observing that the network part in both the source and destination IP addresses is the same), then the destination address that is to go into the MAC header destination address field is simply the physical address of the destination host. The MAC destination address may be found by means of the ARP (Address Resolution Protocol) which comprises having the source host broadcast an ARP request packet with the IP address of the destination host and having the destination host respond with its hardware (MAC) address. This MAC address may be placed in the MAC frame (physical layer) headers.
B. Encryption Techniques
Eavesdropping in a network, such as the Internet system 100 of FIG . 1 , can be thwarted through the use of a message encryption technique. A message encryption technique employs an encipherment function which utilizes a number referred to as a session key to encipher data (i.e., message content) . Only the pair of hosts in communication with each other have knowledge of the session key, so that only the proper hosts, as paired on a particular conversation, can encrypt and decrypt digital signals. Three examples of encipherment functions are ( 1 ) the National Bureau of Standards Data Encryption Standard (DES) (see e.g. , National Bureau of Standards, "Data Encryption Standard", FIPS-PUB-45, 1 977), (2) Fast Encipherment Algorithm (FEAL)(see e.g., Shimizu and S. Miyaguchi, "FEAL-Fast Data Encipherment Algorithm," Systems and Computers in Japan, Vol. 1 9, No. 7, 1 988 and S. Miyaguchi, "The FEAL Cipher Family", Proceedings of CRYPTO '90, Santa Barbara, Calif., Aug., 1 990); and (3) International Data Encryption Algorithm ("IDEA") (see e.g., X. Lai, "On the Design and Security of Block Ciphers," ETH Series in Information Processing, v.1 , Konstanz: Hartung - Gorre Verlag 1 992) . One way to use an encipherment function is the electronic codebook technique. In this technique a plain text message m is encrypted to produce the cipher text message c using the encipherment function f by the formula c = f(m,sk) where sk is a session key. The message c can only be decrypted with the knowledge of the session key sk to obtain the plain text message m = f(c,sk). Session key agreement between two communicating hosts may be achieved using public key cryptography. (See e.g., U.S. Patent Nos. 5,222, 1 40 and 5,299,263) .
Before discussing public key cryptographic techniques, it is useful to provide some background information. Most practical modern cryptography is based on two notorious mathematical problems believed (but not proven) to be hard (i.e. , not solvable in polynomial time, on the average). The two problems are known as Factorization and Discrete-Log. The Factorization problem is defined as follows: Input: N, where N = pq where p and q are large prime numbers Output: p and/or q. The Discrete-Log problem is defined as follows:
Input: P,g,y, where y ≡g mod P, and P is a large prime number Output: x. (The Discrete-Log problem can be similarly defined with a composite modulus N = pq) .
Based on the Factorization and Discrete-Log problems, some other problems have been defined which correspond to the cracking problems of a cryptographic system.
One system of such a problem which has previously been exploited in cryptography (see, e.g., H.C. Williams, "A Modification of RSA Public-Key
Encryption", IEEE Transactions on Information Theory, Vol. IT-26, No. Nov. 6,
1 980) is the Modular Square Root problem, which is defined as follows: Input: N,y, where y ≡ x2 mod N, and N = pg, where p and q are large primes
Output: x.
Calculating square roots is easy if p and q are known but hard if p and q are not known. When N is composed of two primes, there are in general four square roots mod N. As used herein, z ≡V~ mod N is defined to mean that x is the smallest integer whereby z2 ≡ x mod N.
Another problem is known as the Composite Diffie-Hellman (CDH) problem, which is defined as follows:
Input: N, g, gx mod N, gγ mod N, where N ≡ pq and p and q are large primes. Output: gxy mod N. It has been proven mathematically that the Modular Square Root and
Composite Diffie-Hellman problems are equally difficult to solve as the above- mentioned factorization problem (see, e.g., M.O. Rabin, "Digitalized Signatures and Public Key Functions as Intractable as Factorization" , MIT Laboratory for Computer Science, TR 21 2, Jan. 1 979; Z. Shmuely, "Composite Diffie-Hellman Public Key Generating Schemes Are Hard To Break" , Computer Science Department of Technion, Israel, TR 356, Feb. 1 985; and K.S. McCurley, "A Key Distribution System Equivalent to Factoring", Journal of Cryptology, Vol. 1 , No. 2, 1 988, pp. 95- 1 05) .
In a typical public-key cryptographic system, each user I has a public key P; (e.g., a modulus N) and a secret key Si (e.g., the factors p and q) . A message to user I is encrypted using a public operation which makes use of the public key known to everybody (e.g., squaring a number mod N) . However, this message is decrypted using a secret operation (e.g., square root mod N) which makes use of the secret key (e.g. , the factors p and q) .
C. Network Security Devices At present, existing network security products are categorized into two classes: ( 1 ) firewalls, such as Janus and ANS, and (2) software products, such as encrypted mail, secured http, one time password, etc.
A firewall is a dedicated computer, usually running a Unix operating system. It acts as a filter for incoming and outgoing communications. The firewall is placed as a router between the local area network (LAN) and the outside world. The decision whether to pass a packet is made based on the source and/or destination IP address, and the TCP port number. Some firewalls also have the ability to encrypt data, provided that both sides of the communication employ the same brand of firewall. Some firewalls have a personal authentication feature. Software products are based on the premise that the computer on which they are installed are secure, and protection is only needed outside on the network. Thus, such software products can easily be bypassed by breaking into the computer. A typical scheme is when an intruder implants a "Trojan Horse" on a computer which sends him an unencrypted copy of every transaction. Sometimes, it is even done as a delayed action during the off-hours when the computer is not likely to be supervised.
In addition, there are authentication products designed to maintain the integrity of the computer against intrusion. These products are based on the premise that the products are 1 00% secure. Once the product is compromised, it becomes totally ineffective. Sometimes, careless use by one user may jeopardize all other users of the product.
Firewalls are more effective in maintaining network security. However they are very expensive. Their price range is between $ 1 0,000 and $50,000, plus the price of the hardware. They require a high level of expertise to install and maintain. The most sophisticated and effective firewalls require a specially trained technician or engineer for their maintenance. The special training cost is up to $ 10,000 per person, and the salary adds $60,000 to $ 1 20,000 or more per annum to the cost.
Firewalls have to be constantly maintained, modified, and monitored in order to yield reasonable security. They only cover the TCP part of the Internet Protocol and not the UDP part. Thus, they do not provide security to NFS (Network File Services) and many client/server applications.
The firewall is a full service computer which can be logged into for maintenance and monitoring. Thus, it can be broken into. Once a firewall is compromised it loses its effectiveness and becomes a liability rather than a security aid. Firewalls only protect the connection between a LAN and a WAN (Wide Area Network) . It does not protect against intrusion into a particular host from within the LAN.
In view of the foregoing, it is an object of the present invention to provide a network security device which overcomes the shortcomings of the prior art network security devices.
It is another object of the present invention to provide a hardware device to provide network security for individual hosts attached to a network.
It is a further object of the present invention to provide a hardware device to provide network security for a local area network connected to a wide area network.
Summary of the Invention
The present invention provides improvements to the Network Security
Device described in U.S. Patent Application Serial Number 08/529,497. These improvements include ( 1 ) modifications in the device which adapt it to protect a
LAN, (2) improved key generation, (3) an improved key exchange algorithm, and
(4) improved packet handling procedures which provide double integrity checks.
A preferred embodiment of the inventive network security device comprises a first network interface connected to a protected client, a second network interface connected to a portion of a network, and a processing circuit connected to both interfaces. A communication from the protected client goes from the client, to the first interface, to the processing circuit, to the second interface and into the network.
Similarly, a communication received from the network goes from the second interface, to the processing circuit, to the first interface and to the protected client.
A preferred embodiment of the present invention has four keys associated with it:
( 1 ) a static (permanent) private key;
(2) dynamic (changing) private key; (3) a static public key; and
(4) a dynamic public key. In a preferred embodiment, the public keys are exchanged between two network security devices in order to establish a common secret key. The common secret key is the key which is used to encrypt/decrypt all messages between two particular devices. This key should not be transmitted.
The static keys are permanent keys unique to each device. The dynamic keys have a predetermined lifespan and are replaced periodically, such as every 24 hours. Preferably, the static keys are generated using a seed derived from the host's IP address, MAC address of the network interface connected between the protected host and the network security device, and the security device's serial number. Preferably, the dynamic keys are generated using seeds derived from current date and time information.
Packets received from the protected client are encrypted using an encipherment function such as IDEA, FEAL, or DES before being transmitted via the network to a destination. Similarly encrypted packets received from a destination are decrypted. Such encryption and decryption requires a common session key to be possessed jointly by the protected client and the destination (the destination being a protected client of another network security device located someplace else in the network) . The common crypto key (i.e. , the common secret key) is obtained using a public key cryptography technique. To aid in the key exchange, the network security device maintains two databases. A static database (SDB) contains information about secured hosts or nodes in the network. A secured host or node is a host or node that is protected by a network security device. Each entry in the static database contains information about a particular secured host, i.e., the host IP address, time entered in the database, and the host's permanent public key. A dynamic data base (DDB) contains information about secured and unsecured hosts. Each entry in the dynamic database includes a host's IP address, the time that the host's dynamic key was generated, a flag indicating whether or not the host is secured, a flag indicating whether the host is in transition (i.e., in the middle of a key exchange), and a pointer to a common secret session key. The protocol used by the network security device of host i to agree on a common crypto key with a network security device of host j is as follows.
Consider a communication from host i to host j. The communication arrives at the network security device of host i from host i. The network security device checks if host j is in the dynamic database. If host j is in the dynamic database, it is determined if the dynamic database has a common crypto key for communication between host i and host j. If there is such a common session key, the communication from host i is encrypted using the common crypto key and transmitted to host j. If there is no common crypto key, then host i sends the dynamic part of its public key P; to host j and host j replies by sending the dynamic part of its public key Pj to host i. The exchange of dynamic parts of the public keys may be encrypted using the static part of the public keys, which may be obtained from the static databases at host i and host j. The common crypto key is then calculated according to a Diffie-Hellman technique.
Because the dynamic keys of each network security have a particular lifespan, such as 24 hours, there may be a time difference between times when two device's keys expire. Thus, it is possible that one device's dynamic key may expire before the packet is received. One way to prevent this occurrence is to take into account this time difference. The DDB may correct the time difference between the time the packet was sent and the time the packet is received. Also, the DDB time generation entry indicates to the network security device when the other party's dynamic key expires. Thus, when a communication between the nodes is initiated, it may be determined whether a new dynamic key exchange is warranted, rather than attempting to use an expired common dynamic key.
Note that this assumes that there is an entry for host j in the static database of host i. If there is not, the exchange of dynamic public keys is preceded by an exchange of static public keys and the forming of a database entry for host j in the static database at host I. Moreover, if there is no entry for host j in the dynamic database of host I, such an entry will be generated before the dynamic key exchange.
A packet received by the network security device and the connected host is preferably processed in the following manner. The IP and MAC headers from the packet are copied into a new IP packet. The client host's physical address (e.g., the MAC address of the network interface between the client and the network security device) is replaced with the network security device's MAC address (e.g., the MAC address of the network interface between the network security device and the network). The new IP packet includes a proprietary header and proprietary tail. Information about the packet is stored in the proprietary tail, including check sum information. The data and proprietary tail are then encrypted. The proprietary header is then filled in, including check sum information for the encrypted data. This packet is then transmitted into the network. This processing method provides a double integrity check. The check sum which was calculated after encryption is checked by the receiver before decryption, providing an integrity test of the encrypted data in transit. The check sum in the proprietary tail was calculated before encryption and checked by the received after decryption. This checksum provides a means of strong authentication because the static and dynamic keys used to encrypt the checksum are known only to the two communicating hosts. This check sum will differ if the common secret key is not identical on both sides and also provides an integrity test of the actual data. Note that if the check sum is replaced with a secured hash function, after the packet is encrypted, it becomes a digital signature. I t should be noted that encryption takes place at the IP level so that TCP and UDP packets are encoded. In short, the inventive network security device has a number of significant advantages.
Like a firewall, the inventive network security device is a hardware/software combination in a preferred implementation. However, it is a sealed "box" and cannot be logged into. Hence, it cannot be compromised the way a firewall can. It is much cheaper than a firewall. Thus, each node in the LAN can be equipped with it. This way, it provides protection inside the LAN as well as outside. The network security device works directly at the IP level. It therefore, covers all types of IP protocols and requires no special configuration to different network applications. Thus, the inventive network security device is maintenance free.
Brief Description of the Drawings
The present invention is described with reference to the following figures:
FIG. 1 schematically illustrates an Internet system. FIG. 2 schematically illustrates the architecture of a host in the network of
FIG. 1 .
FIGs. 3A and 3B illustrate the format of a packet transmitted in the network of FIG. 1 .
FIG. 4A illustrates a network security device for use with a host in the network of FIG. 1 in accordance with an embodiment of the present invention.
FIG. 4B illustrates a network security device for use with a LAN in accordance with an embodiment of the present invention.
FIG. 5 illustrates an entry in a static database maintained by the network security device of FIG. 4. FIG. 6 illustrates an entry in a dynamic database maintained by the network security device of FIG. 4.
FIG. 7 is a flow chart illustrating an activation method used by the network security device of FIG. 4.
FIG. 8 is a flowchart illustrating a key exchange method used by the network security device of FIG. 4.
FIG. 9 is a flow chart illustrating an IP packet handling algorithm utilized by the network security device of FIG. 4. FIG. 10 illustrates an IP packet received from a connected host by the network security device and an IP packet transmitted from the network security device into a network.
FIG. 1 1 is a flowchart illustrating a method of processing the packets of FIG. 10.
Detailed Description of the Invention Overview of the Invention
FIG. 4A schematically illustrates a network security device for protecting a host according to an embodiment of the invention. The security device 400 comprises a first interface 402 which is connected to the client host 404. Specifically, the interface 402 is connected to a network interface in the client host 404 (e.g., an interface 1 3 of Fig. 2) via a cable or wire 406. The security device 400 comprises a second interface 408 which is connected to a portion of a network 1 00. Illustratively, the interface 408 is connected to an Ethernet so that the interfaces 402, 408 are Ethernet interfaces such as SMC Elite Ultra Interfaces.
FIG. 4B schematically illustrates a network security device 400' for protecting a LAN according to an embodiment of the invention. As seen in FIG. 4B, a network security device 400' according to the invention is connected between a LAN 450, such as an Ethernet network (including, for example, a file server 452 and a workstation 454), and a router 456 which routes communications between the LAN 450 and a WAN 100, such as the Internet. As discussed in detail below, several modifications are made in the Network Security Device to adapt it for use in protecting a LAN. As also seen in FIG. 4B, network security devices may be arranged in a cascaded topology. Note that workstation 454 is associated with a network security device 400.
Returning to FIG. 4A, a CPU 410 is connected to the interfaces 402, 408.
The CPU is, for example, an Intel 486 DX 62-66 or Pentium. Alternatively, the processing circuit may be implemented as one or more ASICs (Application Specific
Integrated Circuits) or a combination of ASICs and a CPU . A static memory 41 2
(e.g. , flash EEPROM) is also connected to the CPU 41 0 and a dynamic memory 41 6 (e.g., RAM) is connected to the CPU 410. An optional encryption module 41 8 may be provided to perform encryption and large number arithmetic operations. The encryption unit may be implemented as a programmable logic array. Alternatively, the encryption module 41 8 may be omitted and its function may be carried out using a software program which is executed by the CPU 410. However, because certain encryption functions are calculation intensive, it may be preferable to separate the encryption functions from other functions of the Network Security Device 400.
The software executed by the CPU 1 1 preferably has three components: ( 1 ) operating system, (2) networking system, and
(3) key computation algorithms. The operating system and the networking system may both be part of a Unix-like kernel. The key computation algorithms reside in memory and are signaled into action by the networking system. The operating system is a lobotomized Linux system with all drivers taken out except the RAM, disk, and Ethernet interfaces. The networking system is for communication, key exchange, encryption, configuration, etc. In a preferred embodiment, the key computation software may run independently of the other software. This shifts the computationally intensive task of key computation away from the operating system and networking system. The CPU 410 maintains two databases. One database is a static database
(SDB) 41 2 preferably stored in a permanent memory, such as a Flash ROM 41 2. FIG. 5 illustrates one entry in the SDB 41 2. The SDB may have an entry for the client host as well as other hosts. As seen in FIG. 5, the static database entry 500 contains permanent information about the network security device 400 and other secured nodes in the network. The static database entry 500 may include the following information about another secured node: the other node's IP address 502, time that this other node was entered into the database 504, the node's permanent public key 506, and a pointer to the static common key shared by the network security device 400 and the other node's device 508. The static database 500 may also contain the IP address and the serial number of the connected host 51 0. A second database is a dynamic database (DDB) 41 6, which may be stored in a volatile memory, such as a RAM. FIG. 6 illustrates one entry in the DDB 41 6. As seen in FIG. 6, the dynamic database entry 600 contains information about secured and unsecured nodes, i.e., the other node's IP address 602, the time a last packet was sent from that other node 604, a time the other node's dynamic key was generated 606, a pointer to a common secret key shared with that node, time last updated, a secured flag indicating whether the node is secured (e.g., has its own network security device) 602, and a transition flag indicating whether the node is in transition (i.e., in the middle of a key exchange) . Briefly, a preferred embodiment of the present invention operates in the following manner. The interface 402 is put in a promiscuous mode. In this mode, the interface 402 passes all communications from the client host 404 that are sensed on the cable 406 to the CPU 410. The network connection is via the interface 408 which is set to the same IP address as the client 404. The network security device 400 responds to the Address Resolution Protocol by sending its own (rather than the client's) MAC address. This adds a level of security by blocking attempts to bypass the device 400 using the Ethernet protocol.
Received communications are checked to see if they are from a secured host. First, the DDB entry 600 is checked to determine if there is a current dynamic common key shared with the node sending the communication. If yes, this key is used to encrypt and decrypt subsequent packets. If no, if these nodes have communicated previously, a dynamic key exchange is performed. If it is the first time these nodes have communicated, a static key exchange is performed to obtain a static dynamic key. This static key is used to encrypt and decrypt the dynamic key exchange communications.
Activation and Initialization
In a preferred embodiment, the network security device 400 is a sealed box which cannot be logged into. The network security device 400 senses the IP
(and/or MAC) address of the client host 404 and locks itself to it. Once the network security device is locked to the address, the client 404 is prevented by the network security device 400 from changing its IP (and/or MAC) address. Preferably, before the network security device 400 is placed into service, it is activated. The role of activation is to allow or disallow burning the host's 404 IP address into an entry 500 in the static database 41 2. As discussed above, the SDB 41 2 may have an entry 500 for the connected client host. The network security device's serial number (element 510) and the time of activation (element 504) may also be burned into the static database entry 500. As discussed below, these values may be used to generate a seed for the network security device's static private key.
FIG. 7 is a flowchart 700 illustrating a preferred activation method. First, an "activation packet" containing an activation string in the payload may be sent from a connected computer, such as a host 404, through the network security device 400 (step 702) . The packet is received by the device 400, which determines whether it has been activated (step 704) . If it has not been activated, the IP address and other information are written into the flash memory (step 706), as described above, and an acknowledgment packet is returned to the computer (step 708). The device 400 may also generate a confirmation message for display on a monitor of the connected computer (step 71 0) . The Address Resolution Protocol (ARP) is the protocol which is used to resolve an IP address into a matching Ethernet machine (MAC) address which is the actual address to which the network interface responds. As discussed above, the inventive network security device uses ARP (Address Resolution Protocol) to configure itself and hide the client host. The manner in which the network security device processes an ARP request is described in related application Serial No. 08/529,497, the contents of this description are incorporated herein by reference. Key Calculation
A preferred embodiment of the present invention has four keys associated with it:
( 1 ) a static (permanent) private key;
(2) dynamic (changing) private key; (3) a static public key; and
(4) a dynamic public key. In a preferred embodiment, the private keys are 1 28 bits long and are known only to that network security device. In a preferred embodiment, the public keys are 51 2 bits long and are revealed to others. Public keys, as described above, are exchanged between two network security devices in order to establish a 1 28 bit long common secret key. The common secret key is the key which is used to encrypt/decrypt all messages between two particular devices. The common secret keys should never be transmitted.
In a preferred embodiment, the keys are generated when the device 400 is turned on. As described in detail below, the static keys are permanent keys unique to each device and the dynamic keys have a predetermined lifespan and are replaced periodically, such as every 24 hours. Static Keys Keys are generated using a "seed", or number, which is then processed to generate a key. The seed for a randomly generated static private key for a particular network security device 400 is derived from the device's IP-address, MAC-address, serial number, and a time-stamp. The seed may be determined in the following manner: seed = IP + MAC, + MACh + serial + time where: MAC, is the low four bytes of the device's six byte MAC address; MACh is the high two bytes of the MAC address.
Using this seed, a private key (preferably 1 28 bits long), is then randomly generated using a random number generator, such as the GNU Multiple Precision library copyrighted by Free Software Foundation Inc. ( 1 996), Boston, Massachusetts, 021 1 1 . If the box is non-activated, the seed is the present time, thus it will be different every time the box is turned-on. On the other hand, for activated boxes, the static private key is a property of the box, it will not change by turning the box on/off.
Dynamic Keys The dynamic private key is randomly generated at predetermined intervals.
For example, dynamic keys may be generated every 24 hours. Preferably, the dynamic keys are derived from a random seed obtained from seconds, minutes, and hours of the present time. The dynamic secret key may be processed from the seed using a random number generator, such as the GNU Multiple Precision library
Public Keys The static and dynamic public keys are calculated from the private keys according to the equation:
X ≡ qxl(mod n) where:
X; is the public key; Xi is the private key; and q and n prime numbers which are preferably installed in each network security device.
Key Exchanges
The first time a client 404 or LAN 450 sends a message to another network security device, a protocol is executed by which the two devices (i) exchange static public keys (unencrypted), (ii) generate a static common key, and then (iii) exchange dynamic public keys encrypted with their static common key. RG
8 is a flowchart 800, illustrating the key exchange algorithm.
Consider the case where the host client wants to send a communication to a node in the network whose IP = A. When the communication arrives at the network security device of the host client the dynamic data base 41 6 (DDB) is checked to determine if there is an entry 600 for node A in the dynamic data base
(step 702).
Note that the DDB includes an entry for a "secured" flag 61 2 and a "transition" flag 614. The secured flag indicates the current security status between the two network security devices. Preferably, the secured flag may be in one of five states:
0 - unsecured
1 = secured 2 = other party was secured, but now does not respond to dynamic key exchange request (i.e. , other party has an entry in the SDB 500 but no current entry in the DDB 600) 3 = the device's dynamic key has expired and must renegotiate all dynamic keys
4 = cannot allocate key storage for the other party's key
The transition flag 614 indicates the status of a key exchange. Preferably, the transition flag maybe in one of four states: 0 not in transition i < N waiting to receive a dynamic public key packet N + 2 waiting for a dynamic common key calculation
-i > -N waiting for static public key packet
-(N + 2) waiting for a static common key calculation where N is the maximum number of tries, and i is the actual number of tries. As discussed in detail below, if there is no entry 600 in the DDB 41 6, the SDB 41 2 is searched for an entry 500 corresponding to node A. The database searches return:
(i) a transition flag; and
(ii) and a reference to the entry number in the database.
The "transition" and "secured" flags in the DDB may then be set accordingly. The following table sets out possible outcomes of a DDB/SDB search.
Possible Outcomes of Database Search.
Figure imgf000020_0001
Figure imgf000021_0001
Where DB size is the number of entries i for node A in the entry number in the dynamic database. Returning to FIG. 8, if there is an entry for node A in the dynamic data base, a check is made to see if a common dynamic key for node A and the protected client has expired (step 803).
If, for example, there is an entry for node A and the secured flag = 1 , then node A is secured. Thus, the common dynamic key has not expired and the packet is encrypted using the session key and an encipherment function such as
IDEA (step 806) .
If the common dynamic key has expired, the dynamic data base entry for the node IP = A has a secured flag = 3 and the transition flag is i ≤ N (step 804) which means a key exchange is taking place. The exchange of the dynamic parts of the public keys of the host client and the node with IP = A proceeds as follows. The host client (i.e., the source) sends its dynamic public key and IP address to the node with IP = A (the destination)
(step 808) and waits for a reply (step 81 0) . The dynamic public key of the host may be encrypted with the static public key of the node with IP = A. The reply is the dynamic public key of the destination node with IP = A. This may be encrypted with the static public key of the host client. Steps 808 and 810 may be repeated several times, such as three times.
If no reply is received (step 81 2) from the destination, the source network security device sets the secured flag to 2 and the transition flag to 0 (step 81 4) in the DDB entry for the destination. If the packet to be encrypted originated from the host (step 81 6), the packet may be dropped (step 81 8). If the packet originated from another party, the network security device may try to decrypt the packet using the static private key(step 820) .
If a reply is received, the transition flag for the destination node in the DDB entry 600 of the network security device of the host is set to N + 2 (step 822), indicating that the common dynamic key is being calculated. Then a common dynamic (crypto) key for the source and destination is calculated by the network security device of the source (step 824) using, for example, a Diffie-Hellman technique as described above. The common session key is then entered into the DDB entry 600 of the source network security device (step 826) and the transition flag for this DDB entry is marked 0 (step 828)because the transition is complete. The secured flag = 1 .
The exchange of dynamic public keys and the calculation of a common crypto key assumes that there is an entry for the destination node with IP = A in the static data base 41 2 (SDB) of the source network security device and in the dynamic data base 41 6 of the source network security device. That is, that these two network security devices have communicated before. If these entries do not exist (i.e., these two devices have not previously communicated), they may be created prior to the dynamic public key exchange (steps 708-722 described above) .
If there is no DDB entry for node IP = A (step 802), an entry is created (step 830), the secured flag = 0, and the transition flag is marked -i >-N (step 832) . The SDB 500 is checked to determine if the source network security device has an entry for node IP = A (step 834) . If there is such an entry, proceed with the dynamic key exchange (steps
808-822), the secured flag is set to 1 and the transition flag is set as described above. If there is no entry for node A in the SDB, then the network security device 400 sends its static public key in a key-packet to node A and drops the original IP- packet (step 836) . The device waits a predetermined time, such as five seconds, for a reply (step 838) . Steps 836 and 838 may be repeated several, e.g., three times. While waiting for a response, the transition flag is -i >-N. If a reply is received (step 840), an entry is created in the SDB (step 842), the secured flag = 1 and the transition flag is 0. When the static key is received, the network security device calculates a common static key using its static key and a standard Diffie-Hellman technique. The transition flag is set to -(N + 2) . Once the static common key is calculated, it is used to encrypt the dynamic key exchange (steps 808-822) . The inventive device preferably uses the well-known Diffie-Hellman key exchange protocol.
If no reply is received, the secured flag = 2 and the transition flag in the entry in the DDB is 0 because the transition off (step 81 4) . Both the static and the dynamic key request maybe repeated Ntry times at not less then texpιre time intervals (in a preferred embodiment they are set to 8 tries and 2 ms, respectively) . Note that entries in the SDB are burned in and are permanent. Entries in the DDB may be volatile, that is, the entries may be overwritten or lost if the device 400 is turned off. Note that if the second flag for another node is set at either 2, 3, or 4, the network security device will continue to attempt a dynamic key exchange every predetermined period, such as every five minutes.
Expiration of the Dynamic Keys and Synchronization
As indicated above, the dynamic keys have a predetermined lifespan. For example, new dynamic keys may be generated every 24 hours. When the lifespan expires, all of the dynamic common key entries, which were calculated using an expired dynamic key, for other nodes are incorrect. Thus, all secured flags in the
DDB are marked as secured = 3. When the dynamic key of a network security device's 24 hours expires, a new dynamic key is generated . The secured flag is then changed back to 1 (or 2) when the next packet (sent to or received from that
IP-address) initiates a successful dynamic key exchange. Because the dynamic keys of each network security device have a particular lifespan, such as 24 hours, there may be a time difference between times when two device's keys expire. For example, if two devices in different time zones are both programmed to generate new dynamic keys at midnight, there may be several hours difference between key expiration times. Thus, it is possible that one device's dynamic key may expire during a communication. Also, because Internet communications are connectionless, that is, the receiving party does not have to be connected to the sending party when the packet is transmitted, one or the other party's dynamic key may have expired before the packet is received. One way to prevent this occurrence is to take into account this time difference. Referring back to FIG. 6, the DDB entry 600 contains an entry "time generated" 606, which indicates the time that the other device's dynamic key was generated. This is done by correcting the "time generated" entry by the time difference between the time the packet was sent (the time stamp entry 604 in the DDB entry) and the time the packet is received (the present time) .
Also, the time generated 606 entry indicates to the network security device
400 when the other party's dynamic key expires. Thus, when a communication between the nodes is initiated, it may be determined whether a new dynamic key exchange is warranted, rather than attempting to use an expired common dynamic key.
During a dynamic key exchange, one party may have received the other party's dynamic key. The other side, however, may be calculating the common dynamic key and sending dynamic key requests encrypted with the static common key. To avoid having to drop the packet, if a received packet cannot be decrypted with a dynamic key, the device tries to decrypt the packet using the static key.
As a result, the packet is dropped only if the packet cannot be decrypted with the static key, that is, if it is an illegal packet.
Receiving a Key Packet
When a network security device receives an IP-packet containing another party's static or dynamic public key (sent either as a reply to a key-request or as an initiation for a key exchange), the public key is extracted from the packet and sent to either the CPU 41 0 or the encryption module 41 8 for further processing . There the shared secret key is calculated from the device's own private key and the other party's just received public key.
As discussed above, these tasks are calculation-intensive, and it may be preferable to provide a separate structure, such as the encryption module 41 8, so that the throughput of the entire device is not affected. Packet Processing Fig. 9 is a flowchart 900 illustrating a packet handling algorithm utilized by the inventive network security device. Illustratively, the packet arrives with the source address IP = C (step 901 ). The packet may arrive from the connected host at interface 402 or from the network at interface 408.
First consider the case where the packet arrives from the host at interface 402. If the packet carries an ICMP (Internet Control Message Protocol) or IGMP (Internet Gateway Message Protocol) identification (step 902), the packet is passed to the interface 408 without encryption. However, the source MAC address in the packet is translated to the MAC address of interface 408 (step 904). ICMP and IGMP Packets are not addressed to a destination host. Rather these packets are utilized by intermediate entities in the network, e.g., routers, for various functions. The source IP address is checked to make sure that it is the same as the entry burned into the SDB 41 2 for the connected host. This prevents an adversary from posing as the connected host to gain access to secure communications. This is called preventing " IP spoofing" and is described in detail in U.S. Patent Application Serial No. 08/529,497. The discussion of preventing IP spoofing is incorporated herein by reference.
If the destination to which the packet is addressed is insecure, the packet is dropped (step 906, 908) . The device may be in a secured/unsecured mode (special order) . In such case the packet will be sent unchanged.
Next, it is determined if the packet contains a part of a message that has been fragmented (step 91 0) . If the packet contains a fragment, the fragments are collected (step 91 2) and the message is encrypted (step 91 4) . The encryption takes place using the common session key and an encipherment function. If the encrypted message is too long for the particular LAN (step 91 6) , it is fragmented (step 91 8) . An encrypted packet is then transmitted to interface 408 for transmission into the network 100 (step 920) .
An encrypted packet carries a signature in the protocol part of the IP header. This indicates that the packet is encrypted. The IP address of a packet is not encrypted, otherwise the packet could not be routed through the network.
The case where the packet arrives via the network at interface 408 is now considered. If the packet is an ICMP or IGMP packet (step 940) no decryption is necessary and the packet is sent to the first interface 402 (step 942) . If the packet is a key exchange packet (step 944) the packet is processed according to the key exchange protocol (step 946) . If the packet is not encrypted (step 948) the packet is dropped (step 950) . The device may be in a secured/unsecured mode (special order) . In such a case the packet will be sent to the client unchanged. If the packet is encrypted but the network security device does not have the key (step 952) , the key exchange protocol is carried out (step 954) and the packet is dropped (step 956) . If the key is available in the dynamic data base of the network security device, the packet is decrypted (step 958) and sent to interface 402 (step 960) .
For packets received from the network the MAC address of the network security device is translated into the MAC address of the client. For packets received from the protected client, the MAC address of the client is translated into the MAC address of the network security device. Outgoing Packets As discussed above, the network security device 1 00 receives an IP-packet on the first interface 402, processes it, and sends it onto network 1 00 via the second interface 408.
FIG. 10 illustrates an IP packet 1 01 0 (IP received from host 404, an IP packet (IPout) 101 0 prepared by the network security device 400, and an encrypted IPout packet 1 030 transmitted by the second interface 408. As seen in FIG. 1 0, the IPιn packet 1000 includes a MAC header 1002, containing the host's 404 MAC address, an IP header 1 004, containing the host's IP address, and a payload 1 006 containing data. The IP0Ut packet 1 01 0 includes a MAC header 1 01 2 containing the network security device's MAC address, an IP header 1014 containing the host's 404 IP address, a proprietary header 101 6, a payload 1 1 18 containing the data, and a proprietary tail 1020. Preferably, the data in the payload 1 1 18 is compressed and the proprietary tail 1 120 includes packet length, protocol fragment, and checksum information. The encrypted IPout packet 1030 preferably has everything after the proprietary header 101 6 encrypted, including the compressed data 101 8 and the proprietary tail 1020.
FIG. 1 1 is a flowchart 1 100 illustrating the processing of IPιn and IP0Ut. (a) Packet IPιn 1000 is received from the host 404 at the first interface 402 (step 1 102) . (b) The IP and MAC headers are copied from IPm to IP0ϋt (step 1 104) .
(c) The destination MAC address in IPιn is replaced by the client's MAC- address (step 1 106) .
(d) Skip over the proprietary-header (step 1 108) .
(e) Compress the data from IPιn to IP0Ut (step 1 1 1 0) . Preferably, the data is compressed using the LZRW1 compression algorithm.
(f) Save original length, protocol, frag-info from IPιn into the proprietary tail (step 1 1 1 2) .
(g) In the IP0Ut header, set do not frag = off, and set IPout-protocol = 99 (indicating proprietary protocol) (step 1 1 14) . (h) Calculate the checksum and save it in the proprietary tail 1 1 20(step
1 1 1 6) . (i) Encrypt everything from after the proprietary header until the end of
IPout (step 1 1 1 8) . (j) Fill the proprietary-header in IPout; set protocol = 1 91 (encrypted packet) and calculate the header-checksum (step 1 1 20) .
Incoming Packets For incoming packets, steps (b)-(j) are performed in reverse order.
Double Integrity Checks The method illustrated in FIG. 1 1 provides a double integrity check. The checksum in the proprietary-header on the sender's side is calculated after the encryption and checked on the receiver's side before decryption, thus providing an integrity test of the encrypted data in transit. The checksum in the proprietary-tail on the sender's side is calculated before encryption and checked on the receiver's side after decryption. This checksum provides strong authentication because the static and dynamic keys used to encrypt the checksum are known only by the two communicating devices. (Strong authentication is where one can prove it knows a secret without revealing the secret.) By using a decrypted checksum that agrees with the packet proves the sender and receiver share the same key.
If the encrypted tail checksum is replaced with a secure hash function, such as the well-known MD5 algorithm, after the packet is encrypted, it becomes a digital signature. Where the tail checksum is encrypted with a static common key, it verifies that the dynamic public key originated from the sender, thus authenticating the sender. When the tail checksum is encrypted with a dynamic common key, it also verifies that the packet originated from the sender, authenticating that the packet originated from the sender. Modifications for Use With LANS
Referring again to FIG. 4B, the network security device 400' may be modified to protect a LAN 450 instead of a single host. These modifications are described below. In this illustrative embodiment, the network security device may protect a Class-C LAN having up to 254 clients (i.e. , workstations 454, server 452, etc.), but other LAN types, such as Class-A and Class-B, are also contemplated by the invention.
During activation, the IP address burned into the flash memory 41 2 is the
Class-C post of the client LAN's IP address. A default MAC address, such as Oxf may also be burned into the flash memory 41 2. This default MAC address is used in the static key generation. Recall that the MAC address is used in the static key seed generation.
A LAN-type network security device 400' may build a MAC-table 460 which contains its clients' IP and MAC addresses. This table serves two functions. First, it prevents IP spoofing of any of the LAN device's 400' clients. Thus, if a packet is received on the first interface 402 that does not have an IP or MAC address of one of the nodes in the LAN, that packet is dropped. Second, it facilitates the delivery of packets to clients connected to the LAN 450. This permits packets to be sent from one protected client to another without the packet appearing at the second interface 408.
In short, a unique network security device has been disclosed. Finally, the above described embodiments of the invention are intended to be illustrative only. Numerous alternative embodiments may be devised by those skilled in the art without departing from the scope of the following claims.

Claims

CLAIMSI claim:
1 . A network security device configured to protect at least one particular node, the node having a first physical layer address and an Internet address and which communicates via a network, comprising: a. a first interface connected to the at least one particular node and having said first physical layer address of the node; b. a second interface connected to the network and having a second physical layer address, and c. a processing circuit connected to said first and second interfaces, said processing circuit:
( 1 ) for a packet received at said first interface from said one particular node and the packet having a header containing a source address that is the Internet address of the at least one particular node and said first physical layer address of said one particular node, the circuit configured to: A. replace the first physical layer address contained in the received packet header with the second physical layer address; B. determine a checksum verifying the packet and saving the determined checksum in the packet; and C. encrypting the packet including the checksum, but leaving the Internet address unencrypted and its position in the packet header unchanged;
(2) for a packet received at said second interface from said network and the packet having a header containing a destination address that is the Internet address of the at least one particular node and said second physical layer address of said second interface, the circuit configured to:
A. decrypt the packet including a received checksum
B. determine if the checksum verifies the packet; and C. replace the second physical layer address contained in the received packet header with said first physical layer address of said at least one particular node before said packet is transmitted to the at least one particular node, and leaving the Internet address unencrypted and its position in the packet header unchanged.
2. The network security device of claim 1 , wherein the processing circuit is further configured to: a. for a packet received at the first interface:
(1 ) determine a second checksum verifying the encrypted packet; and
(2) save the second checksum in an unencrypted portion of the packet; and b. for a packet received at the second interface:
( 1 ) determine if the second checksum verifies the encrypted packet.
3. A method for transmitting a packet into a network comprising the steps of: a. generating a packet having a header containing a first media access control (MAC) address, an IP address of a destination, and user data, b. in a network security device which does no routing and is connected to said network, translating said first MAC address into a second MAC address of said network security device, c. determining a checksum for the packet and saving the checksum in the packet d. encrypting the user data and the checksum, but not the IP address and retaining as unchanged said IP address and its position in said header, and e. transmitting said packet into said network.
. The method of claim 3, further comprising the steps of: a. determining a second checksum for the packet, including the encrypted user data and checksum; b. saving the second checksum in an unencrypted portion of the packet.
5. A network security device connected between: ( 1 ) a node having an Internet address and (2) a communication network, the device comprising: (a) a first interface connected to at least one node, the first interface having a first media access control (MAC) address; (b) a second interface connected to the communication network and having a second MAC address; (c) a processor connected to the first and second interfaces, the processor configured to:
( 1 ) receive a packet from the first interface, the packet having a transport layer header, a network layer header, and the first
MAC address; the processor configured to:
A. replace the first MAC address with the second MAC address in the received packet,
B. determine a first checksum verifying the received packet and save the first checksum in the packet;
C. encrypt the received transport layer header and the first checksum, and to not encrypt the received network layer header; and to transmit the packet to the second interface; and (2) receive a packet from the second interface, the packet having an encrypted transport layer header and second checksum, an unencrypted network layer header, and the second MAC address; the processor configured to:
A. replace the second MAC address with the first MAC address in the received packet;
B. decrypt the packet including the transport layer header and the second checksum; and C. to transmit the packet to the first interface.
6. A method for generating a secret key for a network security device configured to protect at least one host, the secret key being unique to that network security device, the method comprising the steps of: a. deriving a seed based on at least one of an Internet protocol (IP) and physical layer address of the at least one host; and b. generating a random number based on the seed.
7. The method of claim 6, wherein the step of deriving the seed further comprises deriving the seed according to: seed = IP + MAC, + MACh + serial + time where:
IP = an IP address for the host; MAC, is a least significant portion of a physical layer address of the host;
MACh is a most significant portion of host's physical layer address; serial is a serial number of the network security device; and time is a time the seed is derived.
8. The method of claim 6, wherein the step of generating a random number further comprises supplying the seed to a random number generator and using an output of the random number generator as the secret key.
9. A method for synchronizing a key exchange between a first network security device having a first dynamic key and a second network security device having a second dynamic key, said first and second dynamic keys having a predetermined lifespan and in which at least a first dynamic key of the first network security device may expire before being received by the second network security device, the method comprising : a. including with the first dynamic key a time stamp indicating a time that the dynamic key was transmitted and a time that the dynamic key was generated; b. the second network security device receiving the first dynamic key, time stamp, and time the first dynamic key was generated; c. maintaining in the second network security device a database containing the received time stamp and time the first dynamic key was generated; and d. determining a difference between a time indicated in the received time stamp and a current time; and e. correcting the time that the first dynamic key was generated by the determined difference.
10. A network security device configured to protect a local area network (LAN) having a plurality of nodes, each node having a physical layer address and an Internet address, the LAN being in communication with a second network, the network security device comprising: a. a first interface connected to the LAN; b. a second interface connected to the second network and having a second physical layer address, and c. a processing circuit connected to said first and second interfaces, said processing circuit including a table of physical layer and Internet addresses of each of the plurality of nodes in the LAN;
(1 ) for a packet received at said first interface from one of the plurality of nodes in the LAN and the packet having a header containing a source address that is the Internet address of the one of the plurality of nodes, a physical layer address of the one of the plurality of nodes, and a destination address, the circuit configured to:
A. determine if the destination address is an Internet address of another node in the LAN; i. if so, transmit the packet to the destination node using the first interface; ii. if not, then replace the first physical layer address contained in the received packet header with the second physical layer address; and encrypt the packet leaving the Internet address unencrypted and its position in the packet header unchanged;
(2) for a packet received at said second interface from said network and the packet having a header containing a destination address that is the Internet address of one of the plurality of nodes and said second physical layer address of said second interface, the circuit configured to: A. decrypt the packet; B. replace the second physical layer address contained in the received packet header with said physical layer address of said one of the plurality of nodes before the packet is transmitted to the one of the plurality of particular nodes.
The network security device of claim 10, wherein when a packet is received on the first interface, the processing circuit is further configured to compare at least one of the physical layer address and the Internet address in the received packet with the physical layer and Internet addresses in the table to determine whether the packet originated from one of the plurality of nodes and, if not, dropping the packet.
PCT/US1997/024201 1997-01-03 1997-12-31 Improved network security device WO1998032065A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP53439998A JP2001508627A (en) 1997-01-03 1997-12-31 Improved network security device
AU58115/98A AU743258B2 (en) 1997-01-03 1997-12-31 Improved network security device
EP97954307A EP0951767A2 (en) 1997-01-03 1997-12-31 Improved network security device
IL13077497A IL130774A0 (en) 1997-01-03 1997-12-31 Improved network security device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US3399597P 1997-01-03 1997-01-03
US60/033,995 1997-01-03

Publications (2)

Publication Number Publication Date
WO1998032065A2 true WO1998032065A2 (en) 1998-07-23
WO1998032065A3 WO1998032065A3 (en) 1998-10-22

Family

ID=21873677

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/024201 WO1998032065A2 (en) 1997-01-03 1997-12-31 Improved network security device

Country Status (6)

Country Link
US (2) US6240513B1 (en)
EP (1) EP0951767A2 (en)
JP (1) JP2001508627A (en)
AU (1) AU743258B2 (en)
IL (1) IL130774A0 (en)
WO (1) WO1998032065A2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000035163A1 (en) * 1998-12-08 2000-06-15 Nokia Mobile Phones Ltd. A method for optimizing of data transmission
WO2000078008A1 (en) * 1999-06-15 2000-12-21 Ssh Communications Security Ltd A method and arrangement for providing security through network address translations using tunneling and compensations
KR20010027146A (en) * 1999-09-10 2001-04-06 서평원 Apparatus For Encryption And Decryption Of Packet Data
WO2001035591A2 (en) * 1999-11-09 2001-05-17 Aware, Inc. Par reduction by carriers phase randomization in multicarrier communications
GB2357019A (en) * 1999-11-26 2001-06-06 Mitsubishi Electric Corp Apparatus which encrypts data received from a plaintext side of its local IP subnet and transmits it on a ciphertext side of the same subnet
EP1355504A1 (en) * 2002-04-19 2003-10-22 Anritsu Corporation Ciphering tester for mobile terminal with W-CDMA scheme
US6961369B1 (en) 1999-11-09 2005-11-01 Aware, Inc. System and method for scrambling the phase of the carriers in a multicarrier communications system
US7287269B2 (en) 2002-07-29 2007-10-23 International Buiness Machines Corporation System and method for authenticating and configuring computing devices
EP1941651A2 (en) * 2005-10-28 2008-07-09 Cisco Technology, Inc. Approaches for automatically switching message authentication keys
US8098819B2 (en) 2004-07-01 2012-01-17 Tecnostore Ag Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys
US8166561B2 (en) 2008-02-13 2012-04-24 Infineon Technologies Ag Security device, secure memory system and method using a security device
US9003199B2 (en) 2004-03-23 2015-04-07 Harris Corporation Modular cryptographic device providing multi-mode wireless LAN operation features and related methods
US9628454B2 (en) 2007-02-12 2017-04-18 Telefonaktiebolaget Lm Ericsson (Publ) Signalling delegation in a moving network

Families Citing this family (111)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU740012B2 (en) 1997-03-12 2001-10-25 Nomadix, Inc. Nomadic translator or router
IL123028A (en) * 1998-01-22 2007-09-20 Nds Ltd Protection of data on media recording disks
US6101499A (en) * 1998-04-08 2000-08-08 Microsoft Corporation Method and computer program product for automatically generating an internet protocol (IP) address
US7096494B1 (en) * 1998-05-05 2006-08-22 Chen Jay C Cryptographic system and method for electronic transactions
FI105739B (en) * 1998-06-10 2000-09-29 Ssh Comm Security Oy Network-connectable arrangement and method for its installation and configuration
US6760778B1 (en) * 1998-09-09 2004-07-06 At&T Wireless Services, Inc. System and method for communication between airborne and ground-based entities
US6618385B1 (en) * 1998-09-23 2003-09-09 Cirrus Logic, Inc. High performance, high bandwidth, and adaptive local area network communications
US7194554B1 (en) 1998-12-08 2007-03-20 Nomadix, Inc. Systems and methods for providing dynamic network authorization authentication and accounting
US8266266B2 (en) 1998-12-08 2012-09-11 Nomadix, Inc. Systems and methods for providing dynamic network authorization, authentication and accounting
US8713641B1 (en) 1998-12-08 2014-04-29 Nomadix, Inc. Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device
US6578143B1 (en) * 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
IL128814A (en) * 1999-03-03 2004-09-27 Packet Technologies Ltd Local network security
US7107612B1 (en) * 1999-04-01 2006-09-12 Juniper Networks, Inc. Method, apparatus and computer program product for a network firewall
US6701432B1 (en) * 1999-04-01 2004-03-02 Netscreen Technologies, Inc. Firewall including local bus
US7177939B2 (en) 1999-05-14 2007-02-13 Cingular Wireless Ii, Llc Aircraft data communications services for users
US7197144B1 (en) * 1999-06-08 2007-03-27 Ethos Technologies, Inc. Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to users
JP2001066989A (en) * 1999-08-31 2001-03-16 Fuji Xerox Co Ltd Unidirectional function generating method, unidirectional function generating device, certification device, authentication method and authentication device
US7181014B1 (en) 1999-09-10 2007-02-20 Cisco Technology, Inc. Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange
US7434046B1 (en) * 1999-09-10 2008-10-07 Cisco Technology, Inc. Method and apparatus providing secure multicast group communication
US7013389B1 (en) 1999-09-29 2006-03-14 Cisco Technology, Inc. Method and apparatus for creating a secure communication channel among multiple event service nodes
US7103185B1 (en) * 1999-12-22 2006-09-05 Cisco Technology, Inc. Method and apparatus for distributing and updating private keys of multicast group managers using directory replication
US7260716B1 (en) 1999-09-29 2007-08-21 Cisco Technology, Inc. Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach
US7177952B1 (en) * 1999-10-01 2007-02-13 Nortel Networks Limited Method and system for switching between two network access technologies without interrupting active network applications
US8190708B1 (en) 1999-10-22 2012-05-29 Nomadix, Inc. Gateway device having an XML interface and associated method
US7089211B1 (en) 2000-01-12 2006-08-08 Cisco Technology, Inc. Directory enabled secure multicast group communications
US7757272B1 (en) * 2000-06-14 2010-07-13 Verizon Corporate Services Group, Inc. Method and apparatus for dynamic mapping
US7113996B2 (en) * 2000-07-21 2006-09-26 Sandy Craig Kronenberg Method and system for secured transport and storage of data on a network
DE10045975A1 (en) * 2000-09-16 2002-04-11 Bosch Gmbh Robert Procedure for controlling access
US6823453B1 (en) * 2000-10-06 2004-11-23 Hewlett-Packard Development Company, L.P. Apparatus and method for implementing spoofing-and replay-attack-resistant virtual zones on storage area networks
JP2002247047A (en) * 2000-12-14 2002-08-30 Furukawa Electric Co Ltd:The Session shared key sharing method, radio terminal authenticating method, radio terminal and base station device
US7076538B2 (en) * 2001-01-12 2006-07-11 Lenovo (Singapore) Pte. Ltd. Method and system for disguising a computer system's identity on a network
US7174368B2 (en) * 2001-03-27 2007-02-06 Xante Corporation Encrypted e-mail reader and responder system, method, and computer program product
US7516325B2 (en) 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US7162634B2 (en) 2001-04-18 2007-01-09 Thomson Licensing Method for providing security on a powerline-modem network
US7228412B2 (en) * 2001-07-06 2007-06-05 Juniper Networks, Inc. Bufferless secure sockets layer architecture
US7149892B2 (en) * 2001-07-06 2006-12-12 Juniper Networks, Inc. Secure sockets layer proxy architecture
US7908472B2 (en) * 2001-07-06 2011-03-15 Juniper Networks, Inc. Secure sockets layer cut through architecture
US7853781B2 (en) * 2001-07-06 2010-12-14 Juniper Networks, Inc. Load balancing secure sockets layer accelerator
US7571257B2 (en) * 2001-07-31 2009-08-04 Guthery Scott B Communications network with smart card
US20030037258A1 (en) * 2001-08-17 2003-02-20 Izchak Koren Information security system and method`
US7162736B2 (en) * 2001-08-20 2007-01-09 Schlumberger Omnes, Inc. Remote unblocking with a security agent
US7334125B1 (en) 2001-11-27 2008-02-19 Cisco Technology, Inc. Facilitating secure communications among multicast nodes in a telecommunications network
US20030235309A1 (en) 2002-03-08 2003-12-25 Marinus Struik Local area network
US20050071657A1 (en) * 2003-09-30 2005-03-31 Pss Systems, Inc. Method and system for securing digital assets using time-based security criteria
US7941559B2 (en) * 2002-04-23 2011-05-10 Tellabs Bedford, Inc. Media access control address translation for a fiber to the home system
US7370194B2 (en) * 2002-06-10 2008-05-06 Microsoft Corporation Security gateway for online console-based gaming
KR100878764B1 (en) * 2002-07-06 2009-01-14 삼성전자주식회사 Wireless local area network system with a guarantee of users' anonymity and method of guaranteeing users' anonymity therein
US7352867B2 (en) * 2002-07-10 2008-04-01 General Instrument Corporation Method of preventing unauthorized distribution and use of electronic keys using a key seed
US7143435B1 (en) * 2002-07-31 2006-11-28 Cisco Technology, Inc. Method and apparatus for registering auto-configured network addresses based on connection authentication
US20040030931A1 (en) * 2002-08-12 2004-02-12 Chamandy Alexander G. System and method for providing enhanced network security
SE523790C2 (en) * 2002-09-06 2004-05-18 Marratech Ab Procedure, system and computer software product for sending media flow of data between client terminals
US7716725B2 (en) 2002-09-20 2010-05-11 Fortinet, Inc. Firewall interface configuration and processes to enable bi-directional VoIP traversal communications
JP3801559B2 (en) * 2002-12-26 2006-07-26 ソニー株式会社 COMMUNICATION DEVICE AND METHOD, RECORDING MEDIUM, AND PROGRAM
US20050193056A1 (en) * 2002-12-26 2005-09-01 Schaefer Diane E. Message transfer using multiplexed connections in an open system interconnection transaction processing environment
DE10301100A1 (en) * 2003-01-08 2004-07-22 Deutsche Telekom Ag Telecommunications-based timestamp
KR20040068499A (en) * 2003-01-24 2004-07-31 마쯔시다덴기산교 가부시키가이샤 Common key exchanging method and communication device
US20040236939A1 (en) * 2003-02-20 2004-11-25 Docomo Communications Laboratories Usa, Inc. Wireless network handoff key
ATE368337T1 (en) * 2003-06-25 2007-08-15 Alcatel Lucent METHOD AND DEVICE FOR ETHERNET-MAC ADDRESS CONVERSION IN ETHERNET ACCESS NETWORKS
US20040268123A1 (en) * 2003-06-27 2004-12-30 Nokia Corporation Security for protocol traversal
KR100568178B1 (en) * 2003-07-18 2006-04-05 삼성전자주식회사 Gateway unit and control method thereof
WO2005024567A2 (en) * 2003-08-18 2005-03-17 Spearman Anthony C Network communication security system, monitoring system and methods
US7711948B2 (en) * 2003-09-30 2010-05-04 Cisco Technology, Inc. Method and apparatus of communicating security/encryption information to a physical layer transceiver
US7844731B1 (en) * 2003-11-14 2010-11-30 Symantec Corporation Systems and methods for address spacing in a firewall cluster
EP1723766A1 (en) * 2004-03-02 2006-11-22 Novo Nordisk A/S Transmission data packet construction for better header authentication
US20050198498A1 (en) * 2004-03-02 2005-09-08 International Business Machines Corporation System and method for performing cryptographic operations on network data
US7711963B2 (en) * 2004-03-23 2010-05-04 Harris Corporation Modular cryptographic device providing enhanced interface protocol features and related methods
US7644289B2 (en) * 2004-03-23 2010-01-05 Harris Corporation Modular cryptographic device providing enhanced communication control features and related methods
US20050213762A1 (en) * 2004-03-23 2005-09-29 Harris Corporation Modular cryptographic device and coupling therefor and related methods
US7657755B2 (en) * 2004-03-23 2010-02-02 Harris Corporation Modular cryptographic device providing status determining features and related methods
US7877595B2 (en) * 2004-03-23 2011-01-25 Harris Corporation Modular cryptographic device and related methods
US20050235363A1 (en) * 2004-04-06 2005-10-20 Fortress Technologies, Inc. Network, device, and/or user authentication in a secure communication network
FR2869175B1 (en) * 2004-04-16 2008-04-18 Audiosmartcard Internat Sa Sa METHOD FOR SECURING OPERATIONS ON A NETWORK AND ASSOCIATED DEVICES
US7502925B2 (en) * 2004-04-19 2009-03-10 Nvidia Corporation Method and apparatus for reducing TCP frame transmit latency
US8234686B2 (en) * 2004-08-25 2012-07-31 Harris Corporation System and method for creating a security application for programmable cryptography module
US20060250966A1 (en) * 2005-05-03 2006-11-09 Yuan-Chi Su Method for local area network security
US7724693B2 (en) * 2005-07-28 2010-05-25 Qnx Software Systems (Wavemakers), Inc. Network dependent signal processing
US8326614B2 (en) 2005-09-02 2012-12-04 Qnx Software Systems Limited Speech enhancement system
FR2897736B1 (en) * 2006-02-22 2008-04-11 Viaccess Sa METHOD FOR ESTABLISHING A CRYPTOGRAPHIC KEY, NET HEAD AND RECEIVER FOR THIS METHOD, AND METHOD FOR TRANSMITTING SIGNALS
JP4816161B2 (en) * 2006-03-10 2011-11-16 日本電気株式会社 Wireless communication apparatus, MAC address management system, wireless communication method, and wireless communication program
US8189586B2 (en) * 2006-04-12 2012-05-29 Telefonaktiebolaget Lm Ericsson (Publ) Plural telecommunications functions having sharing transaction(s)
US20070242703A1 (en) * 2006-04-12 2007-10-18 Telefonaktiebolaget Lm Ericsson (Publ) Binding/combining of plural telecommunications functions
US7613915B2 (en) * 2006-11-09 2009-11-03 BroadOn Communications Corp Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed
US8316427B2 (en) * 2007-03-09 2012-11-20 International Business Machines Corporation Enhanced personal firewall for dynamic computing environments
RU2339077C1 (en) * 2007-03-13 2008-11-20 Олег Вениаминович Сахаров Method of operating conditional access system for application in computer networks and system for its realisation
US8923811B2 (en) * 2008-03-14 2014-12-30 Alcatel Lucent Methods and apparatuses for dynamic management of security associations in a wireless network
EP2134029A1 (en) * 2008-06-09 2009-12-16 THOMSON Licensing Network device and method for obtaining terminal multicast status
US8799630B2 (en) 2008-06-26 2014-08-05 Microsoft Corporation Advanced security negotiation protocol
US8689343B2 (en) * 2008-10-24 2014-04-01 Manufacturing Resources International, Inc. System and method for securely transmitting video data
US9812047B2 (en) 2010-02-25 2017-11-07 Manufacturing Resources International, Inc. System and method for remotely monitoring the operating life of electronic displays
US9704159B2 (en) 2009-05-15 2017-07-11 Entit Software Llc Purchase transaction system with encrypted transaction information
US8571995B2 (en) * 2009-06-02 2013-10-29 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
WO2011072274A1 (en) 2009-12-11 2011-06-16 Juniper Networks, Inc. Media access control address translation in virtualized environments
US8406233B2 (en) * 2010-09-07 2013-03-26 Check Point Software Technologies Ltd. Predictive synchronization for clustered devices
US10318932B2 (en) 2011-06-07 2019-06-11 Entit Software Llc Payment card processing system with structure preserving encryption
US9456340B2 (en) * 2011-06-29 2016-09-27 Hewlett Packard Enterprise Development Lp Unsolicited broadcast packet transmission through close-by communication protocol
KR20130091936A (en) * 2012-02-09 2013-08-20 한국전자통신연구원 Disaster prevention system based on wireless loca area network and method for the same
US9326144B2 (en) 2013-02-21 2016-04-26 Fortinet, Inc. Restricting broadcast and multicast traffic in a wireless network to a VLAN
US9923719B2 (en) * 2014-12-09 2018-03-20 Cryptography Research, Inc. Location aware cryptography
WO2016191906A1 (en) * 2015-05-29 2016-12-08 华为技术有限公司 Internet protocol address allocation method and router
JP6639653B2 (en) 2015-09-10 2020-02-05 マニュファクチャリング・リソーシズ・インターナショナル・インコーポレーテッド System and method for system detection of display errors
WO2017090789A1 (en) * 2015-11-24 2017-06-01 이광원 Communication security system and method using non-address network equipment
WO2019010421A1 (en) * 2017-07-07 2019-01-10 Ligatti Jay Systems and methods for generating symmetric cryptographic keys
US11563567B2 (en) * 2017-09-27 2023-01-24 Visa International Service Association Secure shared key establishment for peer to peer communications
US10908863B2 (en) 2018-07-12 2021-02-02 Manufacturing Resources International, Inc. System and method for providing access to co-located operations data for an electronic display
KR101979157B1 (en) * 2018-09-27 2019-05-15 이광원 Non-address network equipment and communication security system using it
WO2020176416A1 (en) 2019-02-25 2020-09-03 Manufacturing Resources International, Inc. Monitoring the status of a touchscreen
US11402940B2 (en) 2019-02-25 2022-08-02 Manufacturing Resources International, Inc. Monitoring the status of a touchscreen
US11122054B2 (en) 2019-08-27 2021-09-14 Bank Of America Corporation Security tool
US10958539B1 (en) * 2019-12-02 2021-03-23 Cisco Technology, Inc. Network function virtualization compute element image upgrade
US11921010B2 (en) 2021-07-28 2024-03-05 Manufacturing Resources International, Inc. Display assemblies with differential pressure sensors
US11770410B1 (en) * 2022-03-22 2023-09-26 Uab 360 It Enhancing network security

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5351295A (en) * 1993-07-01 1994-09-27 Digital Equipment Corporation Secure method of neighbor discovery over a multiaccess medium
US5371868A (en) * 1990-08-20 1994-12-06 Digital Equipment Corporation Method and apparatus for deriving addresses from stored address information for use in identifying devices during communication
US5386471A (en) * 1994-01-25 1995-01-31 Hughes Aircraft Company Method and apparatus for securely conveying network control data across a cryptographic boundary
US5432850A (en) * 1992-07-02 1995-07-11 Lannet Data Communications Ltd. Method and apparatus for secure data transmission
US5550984A (en) * 1994-12-07 1996-08-27 Matsushita Electric Corporation Of America Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information
US5757924A (en) * 1995-09-18 1998-05-26 Digital Secured Networks Techolognies, Inc. Network security device which performs MAC address translation without affecting the IP address

Family Cites Families (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4182933A (en) 1969-02-14 1980-01-08 The United States Of America As Represented By The Secretary Of The Army Secure communication system with remote key setting
US3816666A (en) 1972-10-02 1974-06-11 Communications Satellite Corp System for changing the burst format in a tdma communication system
US4122213A (en) 1975-03-03 1978-10-24 Tokyo Shibaura Electric Company, Limited Method for metallizing a phosphor screen for a cathode ray tube
US4185166A (en) 1975-04-14 1980-01-22 Datotek, Inc. Multi-mode digital enciphering system
US4160120A (en) 1977-11-17 1979-07-03 Burroughs Corporation Link encryption device
US4159468A (en) 1977-11-17 1979-06-26 Burroughs Corporation Communications line authentication device
US4227253A (en) 1977-12-05 1980-10-07 International Business Machines Corporation Cryptographic communication security for multiple domain networks
US4238854A (en) 1977-12-05 1980-12-09 International Business Machines Corporation Cryptographic file security for single domain networks
US4203166A (en) 1977-12-05 1980-05-13 International Business Machines Corporation Cryptographic file security for multiple domain networks
US4249180A (en) 1978-09-20 1981-02-03 Northern Telecom Limited Past dependent microcomputer cipher apparatus
GB2140656A (en) 1983-05-13 1984-11-28 Philips Electronic Associated Television transmission system
US4633391A (en) 1983-10-21 1986-12-30 Storage Technology Partners Ii Extended index for digital information storage and retrieval device
US4621321A (en) 1984-02-16 1986-11-04 Honeywell Inc. Secure data processing system architecture
US4829569A (en) 1984-09-21 1989-05-09 Scientific-Atlanta, Inc. Communication of individual messages to subscribers in a subscription television system
US4757536A (en) 1984-10-17 1988-07-12 General Electric Company Method and apparatus for transceiving cryptographically encoded digital data
US4799153A (en) 1984-12-14 1989-01-17 Telenet Communications Corporation Method and apparatus for enhancing security of communications in a packet-switched data communications system
US4713753A (en) 1985-02-21 1987-12-15 Honeywell Inc. Secure data processing system architecture with format control
US4802220A (en) 1985-03-20 1989-01-31 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for multi-channel communication security
US4901348A (en) 1985-12-24 1990-02-13 American Telephone And Telegraph Company Data transmission security arrangement for a plurality of data stations sharing access to a communication network
US4837822A (en) 1986-04-08 1989-06-06 Schlage Lock Company Cryptographic based electronic lock system and method of operation
US4731841A (en) 1986-06-16 1988-03-15 Applied Information Technologies Research Center Field initialized authentication system for protective security of electronic information networks
US4829560A (en) 1987-01-30 1989-05-09 Spectradyne Communications system for use in a hotel/motel
GB8704883D0 (en) 1987-03-03 1987-04-08 Hewlett Packard Co Secure information storage
EP0287720B1 (en) 1987-04-22 1992-01-08 International Business Machines Corporation Management of cryptographic keys
US4916704A (en) 1987-09-04 1990-04-10 Digital Equipment Corporation Interface of non-fault tolerant components to fault tolerant system
US4924513A (en) 1987-09-25 1990-05-08 Digital Equipment Corporation Apparatus and method for secure transmission of data over an unsecure transmission channel
JPH0732373B2 (en) 1988-03-26 1995-04-10 株式会社ケンウッド One-way address transmission method for PCM music broadcasting
US5001755A (en) 1988-04-19 1991-03-19 Vindicator Corporation Security system network
US4980913A (en) 1988-04-19 1990-12-25 Vindicator Corporation Security system network
US4910777A (en) 1988-09-20 1990-03-20 At&T Bell Laboratories Packet switching architecture providing encryption across packets
US4965804A (en) 1989-02-03 1990-10-23 Racal Data Communications Inc. Key management for encrypted packet based networks
US4933971A (en) 1989-03-14 1990-06-12 Tandem Computers Incorporated Method for encrypting transmitted data using a unique key
US4956863A (en) 1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication
GB8927623D0 (en) 1989-12-06 1990-02-07 Bicc Plc Repeaters for secure local area networks
US5056140A (en) 1990-02-22 1991-10-08 Blanton Kimbell Communication security accessing system and process
US5204961A (en) * 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5161193A (en) 1990-06-29 1992-11-03 Digital Equipment Corporation Pipelined cryptography processor and method for its use in communication networks
US5086469A (en) 1990-06-29 1992-02-04 Digital Equipment Corporation Encryption with selective disclosure of protocol identifiers
US5309437A (en) * 1990-06-29 1994-05-03 Digital Equipment Corporation Bridge-like internet protocol router
US5070528A (en) 1990-06-29 1991-12-03 Digital Equipment Corporation Generic encryption technique for communication networks
GB9015799D0 (en) * 1990-07-18 1991-06-12 Plessey Telecomm A data communication system
US5182554A (en) 1990-12-18 1993-01-26 International Business Machines Corporation Third party evavesdropping for bus control
US5272754A (en) * 1991-03-28 1993-12-21 Secure Computing Corporation Secure computer interface
US5222137A (en) * 1991-04-03 1993-06-22 Motorola, Inc. Dynamic encryption key selection for encrypted radio transmissions
US5179554A (en) 1991-04-08 1993-01-12 Digital Equipment Corporation Automatic association of local area network station addresses with a repeater port
JP2862030B2 (en) * 1991-06-13 1999-02-24 三菱電機株式会社 Encryption method
US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5177788A (en) 1991-10-15 1993-01-05 Ungermann-Bass, Inc. Network message security method and apparatus
US5222140A (en) * 1991-11-08 1993-06-22 Bell Communications Research, Inc. Cryptographic method for key agreement and user authentication
FR2686755A1 (en) 1992-01-28 1993-07-30 Electricite De France METHOD FOR ENCRYPTING MESSAGES TRANSMITTED BETWEEN INTERCONNECTED NETWORKS, ENCRYPTION APPARATUS AND DEVICE FOR COMMUNICATING ENCRYPTED DATA USING SUCH A METHOD.
US5537099A (en) 1992-04-16 1996-07-16 Bay Networks, Inc. Receiving port security in a network concentrator
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5311593A (en) * 1992-05-13 1994-05-10 Chipcom Corporation Security system for a network concentrator
US5596718A (en) 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
US5268962A (en) * 1992-07-21 1993-12-07 Digital Equipment Corporation Computer network with modified host-to-host encryption keys
US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US5245656A (en) * 1992-09-09 1993-09-14 Bell Communications Research, Inc. Security method for private information delivery and filtering in public networks
IL103467A (en) 1992-10-18 1996-03-31 Lannet Data Communications Ltd Network with a security capability
US5414694A (en) 1993-02-19 1995-05-09 Advanced Micro Devices, Inc. Address tracking over repeater based networks
US5299263A (en) * 1993-03-04 1994-03-29 Bell Communications Research, Inc. Two-way public key authentication and key agreement for low-cost terminals
US5442708A (en) 1993-03-09 1995-08-15 Uunet Technologies, Inc. Computer network encryption/decryption device
US5444782A (en) 1993-03-09 1995-08-22 Uunet Technologies, Inc. Computer network encryption/decryption device
US5353283A (en) * 1993-05-28 1994-10-04 Bell Communications Research, Inc. General internet method for routing packets in a communications network
US5394402A (en) 1993-06-17 1995-02-28 Ascom Timeplex Trading Ag Hub for segmented virtual local area network with shared media access
US5331637A (en) * 1993-07-30 1994-07-19 Bell Communications Research, Inc. Multicast routing using core based trees
JP3263878B2 (en) 1993-10-06 2002-03-11 日本電信電話株式会社 Cryptographic communication system
US5394469A (en) 1994-02-18 1995-02-28 Infosafe Systems, Inc. Method and apparatus for retrieving secure information from mass storage media
US5588060A (en) 1994-06-10 1996-12-24 Sun Microsystems, Inc. Method and apparatus for a key-management scheme for internet protocols
US5416842A (en) 1994-06-10 1995-05-16 Sun Microsystems, Inc. Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5557346A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for key escrow encryption
US5557765A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5548646A (en) 1994-09-15 1996-08-20 Sun Microsystems, Inc. System for signatureless transmission and reception of data packets between computer networks
US5590201A (en) 1994-11-10 1996-12-31 Advanced Micro Devices Inc. Programmable source address locking mechanism for secure networks
US5623601A (en) 1994-11-18 1997-04-22 Milkway Networks Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
US5588059A (en) * 1995-03-02 1996-12-24 Motorola, Inc. Computer system and method for secure remote communication sessions
US5548649A (en) 1995-03-28 1996-08-20 Iowa State University Research Foundation Network security bridge and associated method
US5699513A (en) 1995-03-31 1997-12-16 Motorola, Inc. Method for secure network access via message intercept
US5737638A (en) * 1995-07-14 1998-04-07 International Business Machines Corporation System for determining plurality of data transformations to be performed upon single set of data during single transfer by examining communication data structure
US5781550A (en) 1996-02-02 1998-07-14 Digital Equipment Corporation Transparent and secure network gateway
US5922049A (en) 1996-12-09 1999-07-13 Sun Microsystems, Inc. Method for using DHCP and marking to override learned IP addesseses in a network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5371868A (en) * 1990-08-20 1994-12-06 Digital Equipment Corporation Method and apparatus for deriving addresses from stored address information for use in identifying devices during communication
US5432850A (en) * 1992-07-02 1995-07-11 Lannet Data Communications Ltd. Method and apparatus for secure data transmission
US5351295A (en) * 1993-07-01 1994-09-27 Digital Equipment Corporation Secure method of neighbor discovery over a multiaccess medium
US5386471A (en) * 1994-01-25 1995-01-31 Hughes Aircraft Company Method and apparatus for securely conveying network control data across a cryptographic boundary
US5550984A (en) * 1994-12-07 1996-08-27 Matsushita Electric Corporation Of America Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information
US5757924A (en) * 1995-09-18 1998-05-26 Digital Secured Networks Techolognies, Inc. Network security device which performs MAC address translation without affecting the IP address

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000035163A1 (en) * 1998-12-08 2000-06-15 Nokia Mobile Phones Ltd. A method for optimizing of data transmission
US8914872B2 (en) 1999-06-15 2014-12-16 Ssh Communications Security Oyj Revealing occurrence of network address translations
WO2000078008A1 (en) * 1999-06-15 2000-12-21 Ssh Communications Security Ltd A method and arrangement for providing security through network address translations using tunneling and compensations
US9667594B2 (en) 1999-06-15 2017-05-30 Ssh Communications Security Oyj Maintaining network address translations
US9071578B2 (en) 1999-06-15 2015-06-30 Ssh Communications Security Oyj Maintaining network address translations
US8973126B2 (en) 1999-06-15 2015-03-03 Ssh Communications Security Oyj Determining occurrence of a network address translation
US8245288B2 (en) 1999-06-15 2012-08-14 Tectia Oyj Method and arrangement for providing security through network address translations using tunneling and compensations
US8973127B2 (en) 1999-06-15 2015-03-03 Ssh Communications Security Oyj Communications across a network address translator
US8365273B2 (en) 1999-06-15 2013-01-29 Tectia Oyj Method and arrangement for providing security through network address translations using tunneling and compensations
US6957346B1 (en) 1999-06-15 2005-10-18 Ssh Communications Security Ltd. Method and arrangement for providing security through network address translations using tunneling and compensations
US8918858B2 (en) 1999-06-15 2014-12-23 Ssh Communications Security Oyj Communications across a network address translator
US8127348B2 (en) 1999-06-15 2012-02-28 Tectia Oyj Method and arrangement for providing security through network address translations using tunneling and compensations
US8914873B2 (en) 1999-06-15 2014-12-16 Ssh Communications Security Oyj Revealing address information in systems where network address translations occur
US8544079B2 (en) 1999-06-15 2013-09-24 Tectia Oyj Method and arrangement for providing security through network address translations using tunneling and compensations
KR20010027146A (en) * 1999-09-10 2001-04-06 서평원 Apparatus For Encryption And Decryption Of Packet Data
US8929470B2 (en) 1999-11-09 2015-01-06 Tq Delta, Llc System and method for scrambling the phase of the carriers in a multicarrier communications system
WO2001035591A2 (en) * 1999-11-09 2001-05-17 Aware, Inc. Par reduction by carriers phase randomization in multicarrier communications
US8073041B1 (en) 1999-11-09 2011-12-06 Aware, Inc. System and method for descrambling the phase of the carriers in a multicarrier communications system
US8090008B2 (en) 1999-11-09 2012-01-03 Aware, Inc. System and method for scrambling the phase of the carriers in a multicarrier communications system
US10187240B2 (en) 1999-11-09 2019-01-22 Tq Delta, Llc System and method for scrambling the phase of the carriers in a multicarrier communications system
US7769104B2 (en) 1999-11-09 2010-08-03 Aware, Inc. System and method for scrambling the phase of the carriers in a multicarrier communications system
US9755876B2 (en) 1999-11-09 2017-09-05 Tq Delta, Llc System and method for scrambling the phase of the carriers in a multicarrier communications system
US6961369B1 (en) 1999-11-09 2005-11-01 Aware, Inc. System and method for scrambling the phase of the carriers in a multicarrier communications system
US9014243B2 (en) 1999-11-09 2015-04-21 Tq Delta, Llc System and method for scrambling using a bit scrambler and a phase scrambler
US8355427B2 (en) 1999-11-09 2013-01-15 Tq Delta, Llc System and method for descrambling the phase of carriers in a multicarrier communications system
US7471721B2 (en) 1999-11-09 2008-12-30 Aware, Inc. System and method for scrambling the phase of the carriers in a multicarrier communications system
WO2001035591A3 (en) * 1999-11-09 2002-01-17 Aware Inc Par reduction by carriers phase randomization in multicarrier communications
US8718158B2 (en) 1999-11-09 2014-05-06 Tq Delta, Llc System and method for scrambling the phase of the carriers in a multicarrier communications system
US8218610B2 (en) 1999-11-09 2012-07-10 Aware, Inc. System and method for descrambling the phase of carriers in a multicarrier communications system
US7292627B2 (en) 1999-11-09 2007-11-06 Aware, Inc. System and method for scrambling the phase of the carriers in a multicarrier communications system
US6775769B1 (en) 1999-11-26 2004-08-10 Mitsubishi Denki Kabushiki Kaisha Cryptographic apparatus, encryptor, and decryptor
GB2357019B (en) * 1999-11-26 2002-03-20 Mitsubishi Electric Corp Cryptographic apparatus encryptor and decryptor
GB2357019A (en) * 1999-11-26 2001-06-06 Mitsubishi Electric Corp Apparatus which encrypts data received from a plaintext side of its local IP subnet and transmits it on a ciphertext side of the same subnet
EP1355504A1 (en) * 2002-04-19 2003-10-22 Anritsu Corporation Ciphering tester for mobile terminal with W-CDMA scheme
US7287269B2 (en) 2002-07-29 2007-10-23 International Buiness Machines Corporation System and method for authenticating and configuring computing devices
US7945944B2 (en) 2002-07-29 2011-05-17 International Business Machines Corporation System and method for authenticating and configuring computing devices
US9003199B2 (en) 2004-03-23 2015-04-07 Harris Corporation Modular cryptographic device providing multi-mode wireless LAN operation features and related methods
US8098819B2 (en) 2004-07-01 2012-01-17 Tecnostore Ag Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys
EP1941651A4 (en) * 2005-10-28 2014-07-02 Cisco Tech Inc Approaches for automatically switching message authentication keys
EP1941651A2 (en) * 2005-10-28 2008-07-09 Cisco Technology, Inc. Approaches for automatically switching message authentication keys
US9628454B2 (en) 2007-02-12 2017-04-18 Telefonaktiebolaget Lm Ericsson (Publ) Signalling delegation in a moving network
US8166561B2 (en) 2008-02-13 2012-04-24 Infineon Technologies Ag Security device, secure memory system and method using a security device

Also Published As

Publication number Publication date
EP0951767A2 (en) 1999-10-27
WO1998032065A3 (en) 1998-10-22
US20020019933A1 (en) 2002-02-14
IL130774A0 (en) 2001-01-28
US6240513B1 (en) 2001-05-29
AU5811598A (en) 1998-08-07
AU743258B2 (en) 2002-01-24
JP2001508627A (en) 2001-06-26

Similar Documents

Publication Publication Date Title
US6240513B1 (en) Network security device
US6151679A (en) System and method for preventing a first node from being emulated by another node
US11283772B2 (en) Method and system for sending a message through a secure connection
US5633933A (en) Method and apparatus for a key-management scheme for internet protocols
US5416842A (en) Method and apparatus for key-management scheme for use with internet protocols at site firewalls
EP0876027B1 (en) Method and apparatus for achieving perfect forward secrecy in closed user groups
US6026167A (en) Method and apparatus for sending secure datagram multicasts
US7353380B2 (en) Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
US7043633B1 (en) Method and apparatus for providing adaptive self-synchronized dynamic address translation
EP0693836A1 (en) Method and apparatus for a key-management scheme for internet protocols.
Goldberg et al. Freedom network 1.0 architecture and protocols
Brown Cebolla: Pragmatic ip anonymity
Aalto A Unix Streams Implementation of the Internet Protocol Security
Bridgelall Introduction to Digital Networks and Security
Yener Internet Security

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AU BA BB BG BR CA CN CU CZ EE GE HU IL IS JP KP KR LC LK LR LT LV MG MK MN MX NO NZ PL RO SG SI SK SL TR TT UA UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AL AU BA BB BG BR CA CN CU CZ EE GE HU IL IS JP KP KR LC LK LR LT LV MG MK MN MX NO NZ PL RO SG SI SK SL TR TT UA UZ VN GH

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI

121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref country code: JP

Ref document number: 1998 534399

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1997954307

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 58115/98

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 1997954307

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1997954307

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 58115/98

Country of ref document: AU