Rollover of encryption keys in a packet-compatible network
11637699 · 2023-04-25
Assignee
Inventors
Cpc classification
H04L2463/061
ELECTRICITY
H04L9/0841
ELECTRICITY
International classification
G06F21/00
PHYSICS
Abstract
There is provided a technique of establishing encryption keys for communication between 1.sup.st peer and 2.sup.nd peer via a data path. The technique comprises: by each peer, using input keying material to independently generate equivalent pairs of peer encryption keys (PEKs), verifying equivalence of the generated PEK pairs, and using by 1.sup.st peer and 2.sup.nd peer the verified PEK pairs to become in possession of equivalent pairs of session encryption keys (SEKs). Verifying comprises: generating by 1.sup.st peer a first handshake (HS) message encrypted by PEK Tx1 and sending the first HS message to the 2.sup.nd peer via the data path; decrypting by the 2.sup.nd peer the first HS message using the PEK Rx2, generating a second HS message encrypted by PEK Tx2, and sending the second HS message to the 1.sup.st peer via the data path; and decrypting the second HS message by the 1.sup.st peer using PEK Rx1.
Claims
1. A method of establishing encryption keys for communicating between a first peering computer (1.sup.st peer) and a second peering computer (2.sup.nd peer) via a data path, the method comprising: a. by each peer, using input keying material to generate a pair of peer encryption keys (PEKs), a PEK pair generated by the 1.sup.st peer comprises a transmission PEK Tx1 and a reception PEK Rx1 and a PEK pair independently generated by the 2.sup.nd peer comprises a transmission PEK Tx2 and a reception PEK Rx2, wherein each peer receives a respective input keying material and generates a respective PEK pair independently from another peer; b. running a handshake (HS) process to verify that both peers are in possession of equivalent PEK pairs generated prior and independently of HS process, the HS process comprising: i. by the 1.sup.st peer, generating a first handshake (HS) message encrypted by the transmission PEK Tx1 and sending the first HS message to the 2.sup.nd peer via the data path, thereby initiating the HS process; ii. by the 2nd peer, decrypting the first HS message using the reception PEK Rx2, upon successful decryption generating a second HS message encrypted by the transmission PEK Tx2, and sending the second HS message to the 1.sup.st peer, wherein the 2.sup.nd peer sends the second HS message via the data path; iii. by the 1.sup.st peer, decrypting the second HS message using the reception PEK Rx1, wherein a successful decryption of the second HS message confirms the successful completion of the HS process; and c. upon successful completion of the HS process, using by the 1.sup.st peer and the 2.sup.nd peer said PEK pairs to become in possession of equivalent pairs of session encryption keys (SEKs).
2. The method of claim 1, wherein the input keying material comprises at least one of: keys generated by Diffie-Hellman method, keys generated by post-quantum key exchange method, and keys generated by quantum key distribution method.
3. The method of claim 1, wherein the input keying material is hybrid and comprises two or more keying materials received, independently by each peer, from two or more sources of keying material (SKMs).
4. The method of claim 3, wherein at least two keying materials comprised in the hybrid input material are received with different frequencies defined by a rollover policy.
5. The method of claim 1, wherein each peer generates the respective PEK pair responsive to receiving an update of the input keying material.
6. The method of claim 1, wherein each HS message comprises an encrypted payload and data informative of encapsulation overhead corresponding to a communication protocol implemented for communicating data packets via the data path.
7. The method of claim 1, wherein each HS messages bears a special mark making the HS message distinguishable within a traffic flow via the data path.
8. The method of claim 1, wherein generating a HS message comprises: generating, by a respective peer, a random content; encrypting the generated random content; and inserting the encrypted random content into a payload of the HS message.
9. The method of claim 1, wherein the keys' values in the SEK pairs are equal to respective keys' values in the PEK pairs.
10. The method of claim 1, wherein the values of keys in PEK pairs are used as keying material for further deriving, by the peers, values of respective keys in SEK pairs with the help of a preconfigured key derivation function.
11. The method of claim 10, wherein generating a HS message comprises generating, by a respective peer, a random content, the method further comprising using the generated random content as a salt input when deriving the values of SEK keys.
12. The method of claim 11, wherein, in each PEK pair, a value of transmission key is equal to a value of reception key, and wherein the generated random content is used to derive different values of SEK keys in SEK pairs.
13. A computing system comprising a first peering computer (1.sup.st peer) and a second peering computer (2.sup.nd peer) configured to communicate via a data path, wherein each peer is configured to use input keying material to generate a pairs of peer encryption keys (PEKs), a PEK pair generated by the 1.sup.st peer comprises a transmission PEK Tx1 and a reception PEK Rx1 and a PEK pair generated by the 2.sup.nd peer comprises a transmission PEK Tx2 and a reception PEK Rx2, wherein each peer receives a respective input keying material and generates a respective PEK pair independently from another peer; wherein in order to verify that both peers are in possession of equivalent PEK pairs generated by the 1.sup.st peer and the 2.sup.nd peer: the 1.sup.st peer is configured to generate a first handshake (HS) message encrypted by the transmission PEK Tx1 and to send the first HS message to the 2.sup.nd peer via the data path, thereby initiating a handshake (HS) process; the 2.sup.nd peer is configured to decrypt the first HS message using the reception PEK Rx2, upon successful decryption to generate a second HS message encrypted by the transmission PEK Tx2, and to send the second HS message to the 1.sup.st peer via the data path; and the 1.sup.st peer is further configured to decrypt the second HS message using the reception PEK Rx1, wherein a successful decryption of the second HS message confirms the successful completion of the HS process; and wherein the 1.sup.st peer and the 2.sup.nd peer are further configured to generate the PEK pairs prior and independently of the HS process and to use said PEK pairs to become, upon successful completion of the HS process, in possession of equivalent pairs of session encryption keys (SEKs).
14. The computing system of claim 13, wherein the input keying material is hybrid and comprises two or more keying materials received, independently by each peer, from two or more sources of keying material (SKMs).
15. The computing system of claim 14, wherein at least two keying materials comprised in the hybrid input material are received with different frequencies defined by a rollover policy.
16. The computing system of claim 13, wherein each peer is configured to generate the respective PEK pair responsive to receiving an update of the input keying material.
17. The computing system of claim 13, wherein each HS message comprises an encrypted payload and data informative of encapsulation overhead corresponding to a communication protocol implemented for communicating data packets via the data path.
18. The computing system of claim 13, wherein each HS messages bears a special mark making the HS message distinguishable within a traffic flow via the data path.
19. The computing system of claim 13, wherein the values of keys in PEK pairs are used as keying material for further deriving, by the peers, values of respective keys in SEK pairs with the help of a preconfigured key derivation function.
20. A non-transitory computer readable medium comprising instructions that, when executed by a computing system comprising a first peering computer (1.sup.st peer) and a second peering computer (2.sup.nd peer) configured to communicate via a data path, cause the computing system to perform a method of establishing encryption keys for communicating between the 1.sup.st peer and the 2.sup.nd peer, the method comprising: a. by each peer, using input keying material to generate a pairs of peer encryption keys (PEKs), a PEK pair generated by the 1.sup.st peer comprises a transmission PEK Tx1 and a reception PEK Rx1 and a PEK pair generated by the 2.sup.nd peer comprises a transmission PEK Tx2 and a reception PEK Rx2, wherein each peer receives a respective input keying material and generates a respective PEK pair independently from another peer; b. running a handshake (HS) process to verify that both peers are in possession of equivalent verifying equivalence of the PEK pairs generated prior and independently of the HS process, the HS process comprising: i. by the 1.sup.st peer, generating a first handshake (HS) message encrypted by the transmission PEK Tx1 and sending the first HS message to the 2.sup.nd peer via the data path, thereby initiating the handshake process; ii. by the 2.sup.nd peer, decrypting the first HS message using the reception PEK Rx2, upon successful decryption generating a second HS message encrypted by the transmission PEK Tx2, and sending the second HS message to the 1.sup.st peer, wherein the 2.sup.nd peer sends the second HS message via the data path; iii. by the 1.sup.st peer, decrypting the second HS message using the reception PEK Rx1, wherein a successful decryption of the second HS message confirms the successful completion of the HS process; and c. upon successful completion of the HS process, using by the 1.sup.st peer and the 2.sup.nd peer said PEK pairs to become in possession of equivalent pairs of session encryption keys (SEKs).
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) In order to understand the invention and to see how it can be carried out in practice, embodiments will be described, by way of non-limiting examples, with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
DETAILED DESCRIPTION
(7) In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the presently disclosed subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the presently disclosed subject matter.
(8) Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing”, “sending”, “receiving”, “encrypting”, “generating”, “using” or the like, refer to the action(s) and/or process(es) of a computer that manipulate and/or transform data into other data, said data represented as physical, such as electronic, quantities and/or said data representing the physical objects. The term “computer” should be expansively construed to cover any kind of hardware-based electronic device with data processing capabilities.
(9) The terms “non-transitory memory” and “non-transitory storage medium” used herein should be expansively construed to cover any volatile or non-volatile computer memory suitable to the presently disclosed subject matter.
(10) The operations in accordance with the teachings herein may be performed by a computer specially constructed for the desired purposes or by a general-purpose computer specially configured for the desired purpose by a computer program stored in a computer readable storage medium.
(11) Embodiments of the presently disclosed subject matter are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the presently disclosed subject matter as described herein.
(12) Bearing this in mind, attention is drawn to
(13) Initiator 101 comprises a processing and memory circuitry (PMC) 111 comprising a processor (not shown for simplicity of illustration) operatively connected to a memory (not shown for simplicity of illustration). PMC 111 can be configured to execute several functional blocks in accordance with computer-readable instructions implemented on a non-transitory computer-readable storage medium. Such functional blocks are referred to hereinafter as comprised in the PMC. As will be further detailed with reference to
(14) Likewise, responder 102 comprises a processing and memory circuitry (PMC) 121 with operatively connected key generating block 122, HS block 122 and endpoint 126.
(15) Each of key generators 112 and 122 is configured to obtain input keying material, and use it to independently generate a pair of transmission (Tx) and reception (Rx) peer encryption keys (PEKs). In accordance with certain embodiments of the presently disclosed subject matter, the generated pairs of PEKs are equivalent, i.e. have equal values of corresponding PEKs. It is noted that, optionally, the key generators 112 and 122 can be configured to generate PEK pairs with each pair having Rx PEK equal to Tx PEK. Thus such a single value PEK pair can comprise only a single value representing, both, PEK usable for transmitting, and PEK usable for receiving.
(16) Unless specifically stated otherwise, it is appreciated that throughout the specification a key pair {Tx1; Rx1} belonging to a 1.sup.st peer and a key pair {Tx2; Rx2} belonging to a 2.sup.nd peer are referred to as equivalent key pairs when Tx1 has the same value as Rx2 and Rx1 has the same value as Tx2.
(17) Each of key generators 112 and 121 comprises a respective KDF (Key Derivation Function) block (113, 123) operatively connected to in-band and/or out-band source(s) (SKM) (103, 113, 123) of keying material.
(18) The term “keying material” should be expansively construed to cover any kind of data (e.g. keys, secret initialization vectors and/or parts thereof, other secret parameters, etc.) usable for establishing and maintaining cryptographic keying relationships.
(19) Each KDF block (113, 123) is configured to receive keying material from a single or multiple SKMs thereby obtaining an input keying material. Each KDF block (113, 123) is further configured to use the input keying material to derive a pair of PEKs with the help of a special set of mathematical operations referred to hereinafter as key derivation function (KDF). Unless specifically stated otherwise, it is appreciated that throughout the specification the term “input keying material” relates to keying material usable for deriving respective encryption keys and comprising the most updated data received by a peer from the respective one or more SKMs.
(20) Non-limiting examples of SKMs and different keying material are illustrated in
(21) KDF block 113 receives the same input keying material, and implements the same key derivation function (KDF) as KDF block 123.
(22) KDF blocks can be configured to receive keying material in push and/or pull mode and to generate the PEK pairs responsive to events defined by a policy of key rollover. By way of non-limiting example, KDF blocks can be configured to generate PEK pairs responsive to any received update of input keying material.
(23) It is noted that keying materials from different SKMs can be received at different points-in-time. Furthermore, optionally, a keying material received from a single source also can comprise multiple secrets optionally received at different point-in-time. By way of non-limiting example, a policy of key rollover can be configured to update DH (Diffie-Hellman) keys every few minutes, while updating quantum keys (QK) only once a day.
(24) Referring to
(25) TABLE-US-00001 TABLE 1 Exemplified updated keying material used for PEK generation Most updated Most updated Most updated Hybrid input DH keying PQC keying QK keying keying Point- material material material material in- received received received used for PEK time by the peer by the peer by the peer generation t1 1 21 31 {1, 21, 31} t2 2 21 31 {2, 21, 31} . . . . . . . . . . . . . . . t5 5 22 31 {5, 22, 31} t6 6 22 31 {6, 22, 31} t7 6 22 32 {6, 22, 32} t8 7 22 32 {7, 22, 32} . . . . . . . . . . . . . . . t10 9 23 32 {8, 23, 32} . . . . . . . . . . . . . . .
(26) By way of non-limiting example, KDF block can generate PEK pairs with the help of HKDF (HMAC-based Extract-and-Expand Key Derivation Function) capable of handling hybrid input keying material (e.g. as disclosed in NIST document SP 800-56C, “Recommendation for Key-Derivation Methods in Key-Establishment Schemes”, Mar. 20, 2020).
(27) Referring back to
(28) Upon successful completion of the HS process, each HS block (114, 124) informs respective end point (116, 126) with regard to establishing a pair of Tx/Rx session encryption keys (referred to hereinafter also as “session keys” and/or SEKs). End points (116, 126) are further configured to use the established session keys for encrypting/decrypting the payload of traffic packets and to enable secured communication via data channel 104 therebetween. It is noted that end points (116, 126) can be configured to enable encapsulation of HS messages and traffic data packets as required by an implemented security protocol (e.g. MACsec, IPsec, WireGuard, etc.).
(29) MACsec is a Layer-2 security solution that is standardized in IEEE 802.1AE. A MACsec packet is constructed by adding SecTAG (Security Tag) and ICV (Integrity Check Value) to an Ethernet frame. SecTAG contains information that identifies the protocol, the cipher suites, as well as a packet number for replay protection. ICV is calculated by GMAC (Galois Message Authentication Code) to ensure the integrity of the MAC destination address, the MAC source address, SecTAG, and the encrypted payload. A payload can be encrypted by AES (Advance Encryption Standard) cipher suite, either a 128-bit or a 256-bit key, depending on the configuration.
(30) Most commonly in the prior art, cryptographic keys for MACsec operation are established and updated with the help of MKA protocol. MKA (MACsec Key Agreement) is a standard protocol defined in IEEE 802.1X-2010 and operating as a control plane for MACsec. MKA is based on a hierarchical key derivation structure enabling deriving SAK (Secure Association Key) from a master key. Master key is distributed during the authentication process provided in accordance with IEEE 802.1x protocol. SAK is a session key that is used in MKA to encrypt an Ethernet payload by a symmetric-key encryption algorithm of MACsec. The process of MKA-based cryptographic key establishment is further detailed, for example, in the article “Post-quantum MACsec Key Agreement for Ethernet Networks” by Joo Yeon Cho and Andrew Sergeev, 15th International Conference on Availability, Reliability and Security (ARES 2020), August 25-28, 2020, Virtual Event, https://doi.org/10.1145/3407023.3409220.
(31) IPsec (Internet Protocol Security), a set of protocols defined by the Internet Engineering Task force, provides a security mechanism at the IP layer. IPsec processing involves encapsulation of outgoing packets and de-encapsulation of inbound packets. The so-called “Encapsulating Security Payload” (ESP) (e.g. defined in IETF, RFC 4303) protocol provides confidentiality, data integrity, and data source authentication of IP packets. This requires the insertion of an ESP header after the IP header of an IP packet but in front of the data to be protected. An ESP trailer is appended after the data to be protected. An ESP packet is identified by the protocol field in the IP header. In order to allow IPsec packets to be properly encapsulated and de-encapsulated, it is necessary to associate security services and a key between the traffic being transmitted and the remote node that is the intended recipient of the traffic.
(32) IKE (Internet Key Exchange) is the key negotiation and management protocol (e.g. defined in IETF, RFC 5996) that is most commonly used in the prior art to provide dynamically negotiated and updated cryptographic keys for IPsec. IKE serves as a control plane for IPsec and enables VPN peers to independently produce the same symmetrical key pairs. These key pairs then encrypt and decrypt the regular IP packets used in the bulk transfer of data between VPN peers. IKE builds the VPN tunnel by authenticating both sides and reaching an agreement on methods of encryption and integrity. The outcome of an IKE negotiation is a Security Association (SA). A SA is a relationship between two or more nodes that describes how the nodes will use security services to communicate securely.
(33) It is noted that the teachings of the presently disclosed subject matter are not bound by embodiments described with reference to
(34) Referring to
(35) Upon generating the 1.sup.st PEK pair, the 1.sup.st peer (HS initiator 101) generates (202) a handshake (HS) message encrypted by Tx key from the generated 1.sup.st PEK pair. Initiator 101 sends (203) the encrypted HS message, via data path as a part of the data flow, to a 2.sup.nd peer (HS responder 102), thereby initiating a HS process.
(36) It is noted that throughout the specification the terms “1.sup.st PEK pair”, “2.sup.nd PEK pair”, “1st SEK pair”, 2.sup.nd SEK pair and the terms derived therefrom are indicative of belonging the keys to the respective 1.sup.st and 2.sup.nd peers and are not indicative of a sequential relationship between the PEK pairs, SEK pairs and/or keys therein.
(37) The 2.sup.nd peer (HS responder 102) receives the encrypted initiating HS message and decrypts (204) it using Rx key from the 2.sup.nd PEK pair which it has generated. Upon successful decryption of the initiating HS message, the responder sends (205) to the initiator a HS acknowledgement (Ack) message encrypted by Tx key from the 2.sup.nd PEK pair, the message sent via the data path as a part of a traffic flow.
(38) As the HS messages are sent within the traffic flow, in accordance with certain embodiments of the presently disclosed subject matter and as will be further detailed with reference to
(39) Initiator 101 receives the encrypted acknowledgement HS message and decrypts (206) it using Rx key from the 1.sup.st PEK pair. Successful decryption of Ack HS message by initiator 101 proves the correspondence of PEK keys in the 1.sup.st PEK pair and the 2.sup.nd PEK pair, thereby completing the handshake process. As a result, initiator 101 and responder 102 can use the verified equivalence of PEK pairs to become in possession of equivalent pairs of session encryption keys (SEK pair).
(40) By way of non-limiting example, the values of session encryption keys (SEKs) in the equivalent SEK pair can be equal to the PEKs values in the equivalent 1.sup.st and 2.sup.nd PEK pairs. Namely:
(41) Tx SEC of 1.sup.st peer=Rx SEC of 2.sup.nd peer=Tx PEK of 1.sup.st PEK pair=Rx PEK of 2.sup.nd PEK pair; and
(42) Rx SEC of 1.sup.st peer=Tx SEC of 2.sup.nd peer=Rx PEK of 1.sup.st PEK pair=Tx PEK of 2.sup.nd PEK pair.
(43) It is noted that, optionally, Rx SEK can be equal to Tx SEK (e.g. when PEK pairs are generated with Rx PEK equal to Tx PEK).
(44) By way of another non-limiting example, initiator 101 and responder 102 can derive the values of session encryption keys for the equivalent SEK pairs from the PEK values in the equivalent 1.sup.st and 2.sup.nd PEK pairs with the help of a preconfigured key derivation function.
(45) Furthermore, completing the handshake process not only proves the correspondence of PEK keys in the 1.sup.st PEK pair and the 2.sup.nd PEK pair (i.e. pairs' equivalence), but also provides the 1.sup.st peer and the 2.sup.nd peer with the knowledge of trusted content comprised in the HS messages. This trusted content (e.g. random numbers respectively generated by initiator 101 and responder 102) can be used as an additional input (salt input) when generating the SEKs. By way of non-limiting example, such salt input can be usable to generate Tx SEK different from Rx SEK in a case of single value PEK pairs.
(46) Being in possession of the equivalent SEK pairs, initiator 101 and responder 102 can use (207) the respective SEK values for 1.sup.st peer-to-2.sup.nd peer encrypted communication via the data channel 104.
(47) Thus, the embodiments detailed with reference to
(48) Referring to
(49) SKM 301 sends (310, 313) the same new keying material to HS responder 303 and HS initiator 302. Preferably, SKM 301 sends, firstly, the new keying material to responder 303 and then to initiator 302, thereby providing responder 303 with additional time for generating the 2.sup.nd PEK pair prior to receiving an HS message from initiator 302 (thereby reducing unnecessary re-transmissions during the HS process).
(50) For purpose of illustration only, the following description is provided for a case of receiving the new secrets for the input keying material from a single SKM and generating PEK pairs responsive to receiving such an update. Those skilled in the art will readily appreciate that the teachings of the presently disclosed subject matter are, likewise, applicable to hybrid input keying material and for another policy of keys' rollover (by way of non-limiting example, as detailed above with reference to
(51) In response to receiving the new keying material, responder 303 (e.g. key generator 122) uses the updated input keying material to generate (311) a new 2.sup.nd PEK pair comprising new 2.sup.nd Tx PEK and 2.sup.nd Rx PEK, and configures (312) the state of FSM 125 as “HS waiting”.
(52) In response to receiving the new keying material, initiator 302 uses the updated input keying material to generate (314) a new 1.sup.st PEK pair comprising new 1.sup.st Tx PEK and 1.sup.st Rx PEK, and configures (315) the state of FSM 115 as “HS start”. Further, initiator 302 generates (316) and stores a new record (referred to hereinafter as “security association” or SA record), informative of the new 1.sup.st pair of PEKs. The SA record is associated with a new security parameter index (new_SPI) to be shared between the initiator 302 and responder 303 during the initiated HS process. It is noted that, optionally, instead of a common message for the new pair of PEKs, initiator 302 can generate separate SA records for the new Tx PEK and the new Rx PEK, each record associated with the same new_SPI.
(53) Initiator 302 also generates (317) a random content for the HS message to be sent to responder 303 (preferably, the size of the generated random content exceeds the size of PEKs).
(54) Initiator 302 encrypts the generated content with the new 1.sup.st Tx PEK and sends (318) the HS message to responder 303 to initiate the HS process. The header of the initiating HS message is configured to be informative of new_SPI and to be indicative that the respective encrypted packet shall be handled as an HS message. By way of non-limiting example, the header can bear information that the sequence number (seq #) of the data packet transmitted from the 1.sup.st peer is equal to zero (or other suitable pre-configured number).
(55) The internal structure of HS messages is further detailed with reference to
(56) Responder 303 uses the new 2.sup.nd Rx PEK to decrypt (319) the received initiating HS message, generates (320) and stores a new SA record informative of the new 2.sup.st pair of PEKs and the shared new security parameter index (new_SPI), and changes (321) the state of FSM 125 to “HS established”.
(57) It is noted that the teachings of the presently disclosed subject matter are not bound by initiator-driven index allocation as detailed above. Alternatively, responder's SPI can be generated by responder itself. In such a case, responder 303 can learn initiator's SPI upon receiving the initiating HS message and initiator 302 can learn responder's SPI from the acknowledgement HS message.
(58) Responder 303 further generates (322) a random content for HS message to be sent to initiator 302, encrypts the generated content with the new 2.sup.nd Tx PEK and sends (323) the generated HS message to responder 303 to acknowledge successful decryption of the initiating message. The header of the acknowledgement HS message is configured to be informative of new_SPI and to be indicative that the respective encrypted packet shall be handled as an HS message (e.g. the sequence number of the data packet transmitted from the 2.sup.nd peer is equal to zero or other suitable pre-configured number).
(59) Initiator 302 uses the new 1.sup.st Rx PEK to decrypt (324) the received acknowledgement HS message and changes (325) the state of FSM 115 to “HS established”.
(60) Thus, the above process verifies that the both peers are in possession of equivalent PEK pairs, these pairs are usable for obtaining equivalent SEK pairs for encrypted communication between the 1.sup.st and the 2.sup.nd peers.
(61) Referring to
(62) In accordance with certain embodiments of the presently disclosed subject matter, the structure of HS message 410 illustrated in
(63) TABLE-US-00002 Field Size Description ET (411) 16 bit MACsec EtherType value for MACsec packet TCI (412) 6 bit Tag control information indicative of how frame is protected AN (413) 2 bit Association number SL (414) 8 bit Short length of MAC service data unit (MSDU) PN (415) 32 bit Packet sequence number SCI (416) 64 bit Secure channel identifier (optional)
(64) In accordance with certain embodiments, AN 413 field of HS message can be informative of new_SPI corresponding to the respective HS message. Field PN 415 of all HS messages can be configured to be equal to zero (thereby distinguishing HS messages from regular traffic packets). By way of an alternative example, instead of using the PN field, HS messages can be distinctively indicated using one or more reserved bits in TCI or SCI fields.
(65) The structure of HS message 420 illustrated in
(66) The structure of HS message 440 illustrated in
(67) The random content 400 of HS message is encrypted by applying ChaCha-20 encryption algorithm 441 using the respective Tx PEK 401. Payload 445 of the generated HS message comprises the resulted encrypted content. The header of HS message comprises Ethernet Header 441, IP Header 442, UDP Header 443 and WireGuard Header 444. The generated HS message further comprises Authentication Tag 446. Authentication Tag 446 is usable for verifying the data integrity and the authenticity of a message and is calculated by applying cryptographic message authentication code Poly1305 over WG Headers and encrypted payload. WG Header 444 comprises the following fields: Message Type 448, Reserved Field 449, Key Index 450 and Counter 451. Key Index Field 450 is configured to bear information of new_SPI.
(68) Most commonly in the prior art, WireGuard is implemented with the following type of messages: cryptographic key establishing messages (MESSAGE_HANDSHAKE_INITIATION, message type=1; MESSAGE_HANDSHAKE_RESPONSE, message type=2; MESSAGE_HANDSHAKE_COOKIE, message type=3) and traffic data packets (MESSAGE_DATA, message type=4). In accordance with certain embodiments of the presently disclosed subject matter, HS message 440 can be transmitted within the traffic flow with MSG Type Field 448 indicative of message type=4. In such a case, HS message 440 can be distinguished from regular traffic packets by configuring Packet Sequence Number in Counter 451 to be equal to zero. By way of an alternative example, instead of using Counter 451, HS messages can be distinctively indicated using one or more reserved bits in Reserved Field 449.
(69) It is noted that, further to the encrypted random content 400 and depending on the engineering solution, encrypted payload (404, 425 or 445) can comprise padding or other data.
(70) It is further noted that the teachings of the presently disclosed subject matter are not bound by embodiments described with reference to
(71) It is to be understood that the invention is not limited in its application to the details set forth in the description contained herein or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Hence, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting. As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for designing other structures, methods, and systems for carrying out the several purposes of the presently disclosed subject matter.
(72) It will also be understood that the system according to the invention may be, at least partly, implemented on a suitably programmed computer. Likewise, the invention contemplates a computer program being readable by a computer for executing the method of the invention. The invention further contemplates a non-transitory computer-readable memory tangibly embodying a program of instructions executable by the computer for executing the method of the invention.
(73) Those skilled in the art will readily appreciate that various modifications and changes can be applied to the embodiments of the invention as hereinbefore described without departing from its scope, defined in and by the appended claims.
(74) It is to be understood that the invention is not limited in its application to the details set forth in the description contained herein or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Hence, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting. As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for designing other structures, methods, and systems for carrying out the several purposes of the presently disclosed subject matter.
(75) It will also be understood that the system according to the invention may be, at least partly, implemented on a suitably programmed computer. Likewise, the invention contemplates a computer program being readable by a computer for executing the method of the invention. The invention further contemplates a non-transitory computer-readable memory tangibly embodying a program of instructions executable by the computer for executing the method of the invention.
(76) Those skilled in the art will readily appreciate that various modifications and changes can be applied to the embodiments of the invention as hereinbefore described without departing from its scope, defined in and by the appended claims.