1. Field of the Invention
The present invention relates to systems and methods for enhancing the security of signal exchanges in network systems. More particularly, the present invention relates to systems and methods for encrypting such exchanges.
2. Description of the Prior Art
Interconnected computing systems form the basis of a network. A network permits communication or signal exchange among computing systems of a common group in some selectable way. The interconnection of those computing systems, as well as the devices that regulate and facilitate the exchange among the systems, represent a network. Further, networks may be interconnected together to establish internetworks. For purposes of the description of the present invention, the devices and functions that establish the interconnection represent the network infrastructure. The users, computing devices and the like that use that network infrastructure to communicate are referred to herein as attached functions and will be further defined. The combination of the attached functions and the network infrastructure will be referred to as a network system.
Presently, access to applications, files, databases, programs, and other capabilities associated with the entirety of a discrete network is restricted primarily based on the identity of the user and/or the network attached function. For the purpose of the description of the present invention, a “user” is a human being who interfaces via a computing device with the services associated with a network. For purposes of further clarity, a “network attached function” or an “attached function” may be a user connected to the network through a computing device and a network interface device, an attached device connected to the network, a function using the services of or providing services to the network, or an application associated with an attached device. Upon authentication or other form of confirmation of the offered attached function identity, the attached function may access network services at the level permitted for that identification. For purposes of the present description, “network services” include, but are not limited to, access, data transport service, Quality of Service (QoS) capabilities, bandwidth, priority, computer programs, applications, databases, files, and network and server control systems that attached functions may use, communicate across or with manipulate for the purpose of conducting the business of the enterprise employing the network as an asset.
A network session is the establishment of an association between an attached function and one or more network services through the network infrastructure. It is to be understood, however, that a network system may be embodied in the combination or interrelation between one or more attached functions and one or more network infrastructure devices. At the outset of a network session, often in relation to the authentication of the entity requesting the session, an association is created between the attached function and/or one or more network infrastructure devices and one or more network services, constrained by one or more policies enforced based on policy enforcement rules carried out by one or more devices of the network infrastructure.
The process by which the various computing systems of a network or internetwork communicate is regulated by agreed-upon signal exchange standards and protocols embodied in network devices, interface cards, circuitry and software. Such standards and protocols were borne out of the need and desire to provide interoperability among the array of computing systems available from a plurality of suppliers. Two organizations that have been substantially responsible for signal exchange standardization are the Institute of Electrical and Electronic Engineers (IEEE) and the Internet Engineering Task Force (IETF). In particular, the IEEE standards for internetwork operability have been established, or are in the process of being established, under the purview of the 802 committee on Local Area Networks (LANs) and Metropolitan Area Networks (MANs).
Among others, the IETF has established a protocol to secure signal transmissions at Layer 4 of the Open Systems Interconnection (OSI). The Transport Layer Security (TLS) protocol defined by the IETF is based upon the Secure Sockets Layer (SSL) protocol and involves the encryption of transport layer transmissions based on a public key-private key exchange. Specifically, an end user contacts a service provider to gain access to the Internet. The answering server sends a public key to the user's browser that in turn generates a random private key that is employed for the remainder of the secured Internet session. A break in the signal exchange between the server and the browser requires re-initialization of the TLS protocol.
In another example of a standardized technique to enhance network session security, IEEE standard 802.1X is designed to improve network security. It establishes a framework for network authentication of a user seeking to connect to a particular network and access programs associated with that network, and for distribution of encryption keys for use at Layer 2 of the OSI. When a user initiates connection to the network through a network system device, the device, such as a switch, a router, or a wireless access point, for example, initially only forwards user request information, including identity information pursuant to an authentication protocol, such as the Extensible Authentication Protocol (EAP), to network management. All other communication activities are blocked during the authentication process. An authentication server of the network then resolves the user's network access permissions, if any, and forwards an accept/reject message to the network access device. The network access device then either authorizes access or it blocks access for the requesting user. IEEE standard 802.1X is applicable to wired and wireless network connections.
IEEE standard 802.11 is directed to wireless LAN (WLAN) standards and Layer 2 of the OSI in particular. The standard establishes a framework for the bands of radio signal propagation to enable bit transmission rates substantially compatible with existing expectations of network signal exchange rates. Whereas 802.1X defines network access authentication regardless of signal transmission medium, 802.11 is specifically directed to transmission standards in a wireless environment. Neither specifically addresses the security of signal exchanges in a wired or wireless environment once network access has been established.
An IETF-based method for securing signal exchanges across otherwise unsecured public network systems—such as the internet—is the Virtual Private Network (VPN). A VPN is a network arrangement constructed from both public and private devices. Such interconnection are generally established by enterprises having separated offices or locations that must be interconnected across public infrastructures. A VPN permits the sharing of private information across the public infrastructure through the encryption of the signal exchanges. The encryption methodology is standardized to produce what is generally referred to as a tunnel. That is, the encryption creates a what is intended to be a hardened tunnel through which the VPN signal exchanges pass encased by the standardized signal exchange protocols associated with the public infrastructure.
Currently, there are four different protocols generally employed in the creation of these VPN tunnels. They are Point-to-Point Tunneling Protocol (PPTP), Layer-2 Forwarding (L2F), Layer-2 Tunneling Protocol (L2TP), and Internet Protocol Security Protocol (IPSec). IPSec tends to be directed to LAN-to-LAN exchanges while the other protocols tend to be employed for dial-up exchanges. IPSec employs encryption keys to secure data and/or packet headers. Public/private encryption keys are exchanged between communicating devices through the Internet Key Exchange (IKE) standard. At the start of a network session, the keys are exchanged to establish the tunnel. The same keys are used throughout the course of the session to encrypt the signals exchanged. Unfortunately, with sufficient time, signal exchange volume, applied computing power and/or because of flaws in the encryption algorithms or implementations, it has been determined that the encrypted signals can be compromised.
It is known that wireless communications may be more susceptible to interception than signal transmissions on wired or fiber media. Nevertheless, signal transmissions in wired or fiber environments may also be susceptible to interception. Intercepted signals may be used for unauthorized gathering of information as well as unauthorized access to the network. As a result of those concerns, wireless network communications, like VPN communications, are preferably encrypted. It is widely believed that the encryption of a wireless transmission equates to the security associated with a wired network for which physical security mechanisms are possible.
The Wired Equivalent Privacy (WEP) algorithm provides under IEEE 802.11 the standardized wireless encryption method. WEP involves the use of a secret or private key that is shared among one or more mobile computer systems and an access point that is wired to a network. The key, a string of bits, is combined with readable data in a defined mathematically determined manner to generate ciphered data. In particular, WEP uses the RC4 algorithm to generate a pseudo-random key stream that is combined with the data to generate encrypted data packets. The receiver, having the same key and algorithm, simply performs the inverse same mathematical function on the cipher stream to reproduce the readable data. In order to avoid duplicative ciphering, which aids crypto analysis, WEP further employs an initialization vector (IV), or public key, added to the secret key, prior to ciphering, to minimize re-use of the same effective cipher key. The IV is currently a 24-bit field that transmits in clear text. With sufficient traffic on the WLAN, the IV and corresponding private portion of the WEP key can be detected by crypto analysis, decrypted, and the network and its traffic exposed and subject to compromise.
Therefore, what is needed is an improved system and method for securing signal exchanges in wired and wireless network environments. Further, what is needed is such a system and method that increases the difficulty of compromising the encryption of signal exchanges throughout a network session.
It is an object of the present invention to enhance the security of a network session through the generation of one or more replacement encryption keys and using such one or more replacement encryption keys to replace one or more existing keys during the network session. It is also an object of the invention to enable the enhancement to be employed in a wired or a wireless exchange, provided the encryption complies with existing exchange protocols including, but not limited to, wired LAN, MAN and WAN and wireless standards. These and other objects are met by providing the improved security at the point where an attached function and a network infrastructure device exchange signals, where two or more network infrastructure devices exchange signals, or where two attached functions exchange signals. In particular, one or more replacement encryption keys are generated and, during the course of the network session, the one or more replacement keys are used to replace one or more of the existing keys used to encrypt the signal exchanges of the session.
The present invention includes a method for enhancing the security of a network including one or more network infrastructure devices capable of exchanging messages. The method includes the steps of generating a plurality of encryption keys, encrypting some or all of the messages between two or more of the network infrastructure devices, or within one or more of the network infrastructure devices capable of exchanging messages across functions within the device, with one or more of the plurality of encryption keys, and in the course of the message exchanges, replacing one or more of the one or more encryption keys with one or more replacement encryption keys. In one alternative embodiment of the invention, the steps performed include generating a plurality of encryption keys for use in encrypting message exchanges between the one or more attached functions and the network, using the plurality of encryption keys in the message exchanges between the one or more network access devices and the one or more attached functions, generating one or more replacement encryption keys, and during the session, replacing one or more of the plurality of encryption keys with the one or more replacement encryption keys at non-regular intervals. In another alternative embodiment of the invention, the method includes the steps of generating a plurality of encryption keys for use in encrypting messages between the one or more network access devices and one or more attached functions, encrypting some or all of the messages with one or more of the plurality of encryption keys, and in the course of exchanging messages with the one or more attached functions, without authenticating, transmitting to the one or more attached functions one or more replacement encryption keys to replace one or more of the one or more encryption keys. The plurality of encryption keys and the one or more replacement encryption keys may be randomly generated. Optionally, at least one of the one or more network access devices generates and transmits the plurality of encryption keys and the one or more replacement encryption keys.
In one form of the invention, at least two of the plurality of encryption keys is unique to each device or attached function including the encryption function. In another form of the invention, at least one of the plurality of encryption keys is shared among all encryption functions. The plurality of encryption keys may be replaced as a function of the number of encrypted messages, as a function of the amount of information exchanged during the session, or they may be replaced randomly. The method of the invention further includes the option of replacing one or more of the one or more replacement encryption keys during the session, and repeating that step as desired. The basis for generating and distributing replacement encryption keys may be different from one replacement cycle to another. In a form of the invention, a first one of the plurality of encryption keys is designated a transmit key and a second one of the plurality of encryption keys is designated a receive key.
In order to effect efficient replacement of one or more existing keys with one or more generated replacement keys, at least one of the plurality of encryption keys may be designated for multicast transmissions and/or broadcast transmissions. Further, one or more of the encryption keys may be associated with a transmission protocol or a set of transmission protocols. Optionally, at least one of the plurality of encryption keys may be retained rather than replaced when others of the plurality of encryption keys are replaced. The retained encryption key or keys may be replaced with a second set of replacement encryption keys, wherein at least one of the second set of replacement encryption keys is a second retained encryption key that is not replaced when the one or more replacement encryption keys is replaced. The network device used to generate and transmit one or more replacement keys, or to transmit one or more replacement keys generated by another network system device may be a wireless access point, a local area network router, a wide area network router, a VPN appliance, or a switch, but is not limited thereto. The transmission of the one or more replacement keys may take place over a wired, including optical cabling, a wireless transmission medium, or a combination of the two.
The present invention is effective in the context of existing standards-based networks in that it contemplates the initial security features associated with initial access to the network by an attached function. For example, preliminary network authentication communication security keys may first be used to authenticate the attached function to the network. Thereafter, the replacement key generation process enhances the security of the ongoing network session by replacing originally provided keys in a manner that may be random and that may be done as specified conditions are met. That is, key replacement may be programmed as a function of specified conditions including, for example, network perceived threat level, location of device or transmission apparatus and cabling or aggregation of signals, preferably ahead of any then-existing crypto analysis attack capabilities. It is anticipated that an event which might cause a more rapid timing of the changing on the keys would be the advancement or discovery of hacker techniques or capabilities to more quickly decipher the data stream. The invention also uses the changing of the keys to improve capabilities of systems with time, performance and cost tradeoffs which implement less robust encryption techniques. Its use is expected to improve security for VPN and tunneling implementations and configurations where the tunnel may provide a secure transport but users of the system may not be authenticated. Initial authentication of devices may also be done manually or in some administration or trusted user defined method.
The details of one or more examples related to the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from any appended claims.
The present invention is a system and related method to enhance the security of a network system through the replacement of one or more encryption keys in the course of a network session. Referring to
The network infrastructure 101 may also include network transmission devices, shown in
A security enhancement system of the present invention includes a replacement encryption key generator 200 and a replacement key manager function 210. The replacement encryption key generator 200 generates replacement encryption keys by instruction from the replacement key manager function 210 and forwards the generated replacement encryption keys to network system devices, including attached functions. Each replacement encryption key generator 200 is preferably a random or pseudo-random number generator of the type known to those skilled in the art; however, in the process of generating replacement encryption keys, it preferably avoids repeating sequences and to avoid any known weak keys with respect to existing encryption algorithms.
The replacement key manager function 210 implements replacement key generation by the generator 200 by instruction to the generator 200 based on information. The key manager function 210 includes at least an analysis function to analyze network information to determine whether that information includes one or more conditions, events, occurrences, etc. (“triggers”) for the purpose of implementing one or more encryption key replacements. The replacement key manager function 210 further includes an implementation function to signal to specific replacement encryption key generators 200 to proceed with generation and key forwarding.
Continuing with reference to
One or more central forwarding devices, represented by central switching device 106, enable the interconnection of a plurality of network entry devices, such as devices 105a-b and 160, as well as access to network services, such as administration server 103 or an application server 107. It is to be understood that a central forwarding device, or an entry forwarding device, is not limited only to switches as that term is traditionally understood. Instead, the forwarding device may be any device capable of forwarding signals through the network infrastructure pursuant to forwarding protocols. The central switching device 106 enables the interconnection of the network infrastructure 101 to attached functions that include VPNs (represented by VPN gateway device 120) and WANs (represented by internet cloud 130) as well as Internet Protocol (IP) telephones (represented by telephone 140). It is to be understood that the IP telephone 140 may also perform as a network entry device for the purpose of connecting an attached function, such as a laptop computer, to the network infrastructure 101.
One or more devices of the network infrastructure 101 include the replacement encryption key generators 200 of the security enhancement system of the present invention. The replacement encryption key generator 200 may be established in hardware and/or software (e.g., a function embodied in an application executing on one or more devices of the network infrastructure 101) to implement replacement encryption key generation. The particular network device on which the replacement encryption key generator 200 resides may vary from manufacturer to manufacturer. A network device may also be a port or set of ports, an interface or a set of interfaces.
As illustrated in
A network device including the replacement encryption key generator 200 preferably also includes storage means 201, such as a database or a caching function, for storing replacement encryption key information and information regarding one or more attached functions associated with the particular network device to which such keys are distributed. The storage means 201 may be updated periodically or as a result of an event occurring anywhere in the network infrastructure 101. The storage means 201 may be a single database comprised of one or more updateable tables of information. A network device having forwarding functionality and with the replacement encryption key generator 200 includes a forwarding engine 202, a processor 203, an ingress port interface 204, an egress port interface 205, and a communication function 206.
As shown in
The database 213 of the key manager function 210 preferably includes network information of use in determining whether, where, and/or when to implement replacement encryption key generation. The information may be any type deemed by the network administrator suitable for triggering the generation of encryption key replacement at one or more network system devices including, but not limited to, the number of encrypted messages, path of data flow, endpoint locations, volume of information exchanged, protocol changes, history based information and other defined triggering events in the network. The information may be generated by the administration server 103, some other sort of centralized network infrastructure device, or from a peer, and stored in the database 213. The information is preferably stored or cached in the database 213 in advance and is not solely supplied in reaction to a triggering condition or event that may be occurring on that particular network system device. The database 213 may further include, for example, means for finding replacement encryption key generators 200, historical information, key-to-implementation device mapping, and the like. The information of storage means 201 may also be stored in database 213 of key manager function 210. Database 213 may contain the information of other key manager functions and/or for network system devices not directly commanded by a particular replacement encryption key generator 200.
With continuing reference to
As noted, the generated replacement encryption key or keys may be distributed by unicast, multicast, or broadcast distribution including, for example a Layer 2 or Layer 3 multicast protocol distribution. In general, in a forwarding situation, the processor 203 provisions the forwarding engine 202 with the generated replacement encryption keys. Replacement keys may be generated and distributed one at a time or in sets. One or more original encryption keys may be replaced while others are retained. One or more replacement keys may themselves be replaced while others are retained. The generated replacement encryption keys may be associated with signal type, one or more transmission protocols, or one or more sets of protocols. There may be transmit encryption keys and receive encryption keys. The one or more replacement encryption keys may encrypt a portion or all of a particular message or protocol. The replacement encryption key generator 200 may generate replacement encryption keys only or it may generate replacement encryption keys and original encryption keys. The basis for distributing replacement keys may be incremental, random, pseudo-random, or as a product of a mathematical method. Further, the basis for replacing replacement encryption keys may be the same as the basis for distributing the first set of replacement encryption keys. Alternatively, the second and subsequent sets of one or more replacement encryption keys may be distributed for a reason different than the first reason or basis for replacing. In this alternative form, unauthorized data recovery would likely be more difficult as patterning is less likely to occur.
Referring back to
Entry to the network system 100, and the infrastructure 101 primarily, may be initially regulated using authentication systems such as Network Operating Systems (NOSs), Remote Authentication Dial-In User Service (RADIUS), described in IETF RFC 2865 and IEEE 802.1X standard, which provides for port-based network entry control based on a MAC identifier. In the case of NOS and RADIUS, an authentication server provides the mechanism for establishing such authentication. RADIUS may also provide authorization and, optionally, accounting capability related to network usage. In the case of IEEE 802.1X, the network entry devices may be configured with such authentication capability, as described more fully in that standard. IEEE 802.1Q standard provides another means for controlling usage of a network. That standard is directed to the establishment and operation of VLANs. The IEEE 802.1Q standard defines the configuration of network devices to permit packet reception at a configured port entry module. Firewalls also provide a technique for network entry regulation based on their packet analysis functionality previously described. The present invention also contemplates signal exchange protection using the replacement encryption key generator 200 for exchanges that have already been authenticated, or that are not required to be authenticated.
The following is a list of a few possible devices (but not limited to only those devices) that can contain the replacement encryption key generator 200, the key manager function 210, and/or any one or more of the corresponding functions described herein: network switches, data switches, routers, WAN devices, MAN devices, optical switches, firewalls, gateways including VPN gateways and other transmission devices, computing devices such as network file servers or dedicated usage servers, management stations, Private Exchange Branch (PBX) devices, telecommunication devices, cellular phones, network connected voice over IP/voice over data systems such as hybrid PBXs and VoIP call managers, network layer address configuration/system configuration servers such as enhanced DHCP servers, enhanced Bootstrap Protocol (bootp) servers, IPv6 address auto-discovery enabled routers, and network based authentication servers providing services such as RADIUS, Extensible Authentication Protocol/IEEE 802.1X or others. It is to be noted that the present invention is applicable to telephone as well data communication network systems.
One means to provide the network information to the storage means 201 and database 213 is the Simple Network Management Protocol (SNMP). A network administrator provisions the information through the terminus of a network cable associated with the attached function. The forwarding engine 202 or other enforcement function reads the terminus information via the SNMP. In another example, SNMP MIB parameters may be established or used to obtain and configure the storage means 201 and database 213 with the desired information. MIBs may also be employed to populate one or more tables of the network system device operating as generation and/or distribution devices with historical information for storage and/or caching.
A first embodiment of the security enhancement method of the present invention for a session involving either or both of one or more attached functions and one or more network devices for which authentication may or may not be required, is shown in
With continuing reference to
For any particular attached function, a received encryption key set is preferably stored in a register and accessed as required to encrypt or decrypt a message. In the event a plurality of key sets is already registered, the least recently used or oldest set may be overwritten when a replacement encryption key set is generated and received. In a shared key set environment, the network entry device confirms that all attached functions return a message using the most recent key set, which may include one or more replacement encryption keys. Alternatively, the network entry device may use a fixed number of duplicate key messages, i.e., retries, in the absence of positive acknowledgement from any one or more attached functions that the key messages have been received and processed. Once all relevant attached functions clients are on the correct key set, signal exchanges are continued.
An important aspect of the present invention is that the key sets, whether randomly generated or not, are changed over the course of any signal exchange session. Current crypto analysis attacks indicate that static keys can often be recovered. For that reason, the present invention includes the replacement of an existing key set with a replacement key set, preferably based on information that ensures the replacement occurs faster than an analysis attack is able to discover the key set in use.
A second embodiment of the security enhancement method of the present invention for a network session involving an attached function requiring authentication, is shown in
With continuing reference to
For any particular attached function, a received encryption key set is preferably stored in a register and accessed as required to encrypt or decrypt a message. In the event a plurality of key sets is already registered, the least recently used or oldest set may be overwritten when a replacement encryption key set is generated and received. In a shared key set environment, the network entry device confirms that all attached functions return a message using the most recent key set, which may include one or more replacement encryption keys. Alternatively, the network entry device may use a fixed number of duplicate key messages, i.e., retries, in the absence of positive acknowledgement from any one or more attached functions that the key messages have been received and processed. Once all relevant attached functions clients are on the correct key set, signal exchanges are continued.
An important aspect of the present invention is that the key sets, whether randomly generated or not, are changed over the course of any signal exchange session. Current crypto analysis attacks indicate that static keys can sometimes be detected. For that reason, the present invention includes the replacement of an existing key set with a replacement key set, preferably based on information that ensures the replacement occurs faster than an analysis attack is able to discover the key set in use.
It is to be understood that the functions described herein may be implemented in hardware and/or software. For example, particular software, firmware, or microcode functions executing on the network infrastructure devices can provide the implementation function. Alternatively, or in addition, hardware modules, such as programmable arrays, can be used in the devices to provide some or all of those capabilities.
Other variations of the above examples may be implemented. One example variation is that the illustrated processes may include additional steps. Further, the order of the steps illustrated as part of the process is not limited to the order illustrated in
The processes, steps thereof and various examples and variations of these processes and steps, individually or in combination, may be implemented as a computer program product tangibly as computer-readable signals on a computer-readable medium, for example, a non-volatile recording medium, an integrated circuit memory element, or a combination thereof. Such computer program product may include computer-readable signals tangibly embodied on the computer-readable medium, where such signals define instructions, for example, as part of one or more programs that, as a result of being executed by a computer, instruct the computer to perform one or more processes or acts described herein, and/or various examples, variations and combinations thereof. Such instructions may be written in any of a plurality of programming languages, for example, Java, Visual Basic, C, or C++, Fortran, Pascal, Eiffel, Basic, COBOL, and the like, or any of a variety of combinations thereof. The computer-readable medium on which such instructions are stored may reside on one or more of the components of system 100 described above and may be distributed across one or more such components.
A number of examples to help illustrate the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention. Accordingly, other embodiments are within the scope of the claims appended hereto.
This application is a continuation-in-part of co-pending U.S. patent application Ser. No. 10/116,447, filed Apr. 4, 2002, entitled UA SYSTEM AND METHOD TO PROVIDE ENHANCED SECURITY IN A WIRELESS LOCAL AREA NETWORK SYSTEM owned by a common assignee. The content of that application is incorporated herein by reference and priority is claimed therein.
Number | Date | Country | |
---|---|---|---|
Parent | 10116447 | Apr 2002 | US |
Child | 10971905 | Oct 2004 | US |