[55941] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: VoIP over IPsec

daemon@ATHENA.MIT.EDU (Stephen Sprunk)
Tue Feb 18 14:13:19 2003

From: "Stephen Sprunk" <stephen@sprunk.org>
To: "Vadim Antonov" <avg@kotovnik.com>,
	"David Luyer" <david@luyer.net>
Cc: <nanog@merit.edu>
Date: Tue, 18 Feb 2003 13:11:31 -0600
Errors-To: owner-nanog-outgoing@merit.edu


Thus spake "Vadim Antonov" <avg@kotovnik.com>
> In fact, a method to encrypt small parcels of data efficiently is
> well-known for decades.  It is called "stream cypher" (surprise).
> Besides LFSR-based and other stream cyphers, any block cypher
> can be used in this mode. Its application to RTP is trivial and
> straight-forward.  Just leave sequence number in clear text, so that
> position in the stream is recoverable in case of packet loss.

Most stream modes are chained in some way to intentionally disrupt
decryption if part of the ciphertext is missing; that is why IPsec resets
the stream for each packet (currently).

When NIST was standardizing AES, they added CTR mode specifically to address
IPsec implementations.  I think there's already been a draft out of the IRTF
on how to modify IPsec for this, but it's not something I've followed
closely.

> It also allows precomputation of the key stream, adding nearly zero
> latency/jitter to the actual packet processing.

You fail to note that this requires precomputing and storing a keystream for
every SA on the encrypting device, which often number in the thousands.
This isn't feasible in a software implementation, and it's unnecessary in
hardware.

S

Stephen Sprunk         "God does not play dice."  --Albert Einstein
CCIE #3723         "God is an inveterate gambler, and He throws the
K5SSS        dice at every possible opportunity." --Stephen Hawking


home help back first fref pref prev next nref lref last post