Encryption Coverage Implications of Store-and-Forward Communications
A drawback of application-layer encryption is that the number
of entities to consider increases dramatically. A network that supports hundreds
of hosts may support thousands of users and processes. Thus, many more secret
keys need to be generated and distributed.
An interesting way of viewing the alternatives is to note that
as we move up the communications hierarchy, less information is encrypted but it
is more secure. Figure 7.5 highlights
this point, using the TCP/IP architecture as an example. In the figure, an
application-level gateway refers to a store-and-forward device that operates at
the application level.[3]
With application-level encryption (Figure 7.5a), only the user data portion of
a TCP segment is encrypted. The TCP, IP, network-level, and link-level headers
and link-level trailer are in the clear. By contrast, if encryption is performed
at the TCP level (Figure 7.5b), then, on
a single end-to-end connection, the user data and the TCP header are encrypted.
The IP header remains in the clear because it is needed by routers to route the
IP datagram from source to destination. Note, however, that if a message passes
through a gateway, the TCP connection is terminated and a new transport
connection is opened for the next hop. Furthermore, the gateway is treated as a
destination by the underlying IP. Thus, the encrypted portions of the data unit
are decrypted at the gateway. If the next hop is over a TCP/IP network, then the
user data and TCP header are encrypted again before transmission. However, in
the gateway itself the data unit is buffered entirely in the clear. Finally, for
link-level encryption (Figure 7.5c), the
entire data unit except for the link header and trailer is encrypted on each
link, but the entire data unit is in the clear at each router and gateway.[4]
No comments:
Post a Comment