IPsec : transmission of Initialization Vector The Next CEO of Stack OverflowWhy is the IV passed in the clear when it can be easily encrypted?Encryption with “constant” initialization vector considered harmfulWhy should I use an Initialization Vector (IV) when I have unique keys?Is it bad practice to use the message digest of the plaintext as the initialization vector?Is IPsec IND-CCA secure provided the used block cipher is a pseudorandom function?Two or more initialization vectors with the same keyAES CBC Initialization vector - Security issuesESP in tunnel modeCipher Block Chain continued Initialization Vectorwhy IPSec transport mode is restricted for host-to-host communication , or host-to-gateway where gateway acts as a host only?How does OpenVPN work?

Vector calculus integration identity problem

Which one is the true statement?

Yu-Gi-Oh cards in Python 3

Help! I cannot understand this game’s notations!

Is fine stranded wire ok for main supply line?

free fall ellipse or parabola?

Can Sneak Attack be used when hitting with an improvised weapon?

What are the unusually-enlarged wing sections on this P-38 Lightning?

Man transported from Alternate World into ours by a Neutrino Detector

Do scriptures give a method to recognize a truly self-realized person/jivanmukta?

What connection does MS Office have to Netscape Navigator?

How to Implement Deterministic Encryption Safely in .NET

IC has pull-down resistors on SMBus lines?

Aggressive Under-Indexing and no data for missing index

Is French Guiana a (hard) EU border?

Is there an equivalent of cd - for cp or mv

What CSS properties can the br tag have?

how one can write a nice vector parser, something that does pgfvecparseA=B-C; D=E x F;

Small nick on power cord from an electric alarm clock, and copper wiring exposed but intact

Expressing the idea of having a very busy time

Why do we say 'Un seul M' and not 'Une seule M' even though M is a "consonne"

What would be the main consequences for a country leaving the WTO?

Raspberry pi 3 B with Ubuntu 18.04 server arm64: what chip

Purpose of level-shifter with same in and out voltages



IPsec : transmission of Initialization Vector



The Next CEO of Stack OverflowWhy is the IV passed in the clear when it can be easily encrypted?Encryption with “constant” initialization vector considered harmfulWhy should I use an Initialization Vector (IV) when I have unique keys?Is it bad practice to use the message digest of the plaintext as the initialization vector?Is IPsec IND-CCA secure provided the used block cipher is a pseudorandom function?Two or more initialization vectors with the same keyAES CBC Initialization vector - Security issuesESP in tunnel modeCipher Block Chain continued Initialization Vectorwhy IPSec transport mode is restricted for host-to-host communication , or host-to-gateway where gateway acts as a host only?How does OpenVPN work?










2












$begingroup$


I am currently carrying scholar research about IPsec protocol, and I have a question regarding the IP Encapsulating Security Payload (ESP). Is the initialization vector of operation mode transmitted in clear in the message ESP Payload ? If it is transmitted in clear, why is it not a security issue ?










share|improve this question











$endgroup$







  • 1




    $begingroup$
    Related: crypto.stackexchange.com/questions/2280/…
    $endgroup$
    – Ilmari Karonen
    2 days ago















2












$begingroup$


I am currently carrying scholar research about IPsec protocol, and I have a question regarding the IP Encapsulating Security Payload (ESP). Is the initialization vector of operation mode transmitted in clear in the message ESP Payload ? If it is transmitted in clear, why is it not a security issue ?










share|improve this question











$endgroup$







  • 1




    $begingroup$
    Related: crypto.stackexchange.com/questions/2280/…
    $endgroup$
    – Ilmari Karonen
    2 days ago













2












2








2





$begingroup$


I am currently carrying scholar research about IPsec protocol, and I have a question regarding the IP Encapsulating Security Payload (ESP). Is the initialization vector of operation mode transmitted in clear in the message ESP Payload ? If it is transmitted in clear, why is it not a security issue ?










share|improve this question











$endgroup$




I am currently carrying scholar research about IPsec protocol, and I have a question regarding the IP Encapsulating Security Payload (ESP). Is the initialization vector of operation mode transmitted in clear in the message ESP Payload ? If it is transmitted in clear, why is it not a security issue ?







initialization-vector ipsec






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 2 days ago









Ella Rose

16.7k44482




16.7k44482










asked 2 days ago









CedricCedric

283




283







  • 1




    $begingroup$
    Related: crypto.stackexchange.com/questions/2280/…
    $endgroup$
    – Ilmari Karonen
    2 days ago












  • 1




    $begingroup$
    Related: crypto.stackexchange.com/questions/2280/…
    $endgroup$
    – Ilmari Karonen
    2 days ago







1




1




$begingroup$
Related: crypto.stackexchange.com/questions/2280/…
$endgroup$
– Ilmari Karonen
2 days ago




$begingroup$
Related: crypto.stackexchange.com/questions/2280/…
$endgroup$
– Ilmari Karonen
2 days ago










1 Answer
1






active

oldest

votes


















4












$begingroup$

Yes, the initialization vector is transmitted in the clear as first part of the ESP payload data (see RFC 4303, section 2, and the RFCs that define the use of specific algorithm with ESP, e.g. RFC 3602, section 3 for AES-CBC, or RFC 4106, section 3 for AES-GCM).



The security of the encryption and integrity protection does not depend on the IV being kept secret. Its primary use is that of a nonce to ensure encrypting the same data with the same key does not result in the same ciphertext.



Some algorithms require that the IV is random/unpredictable (e.g. AES-CBC) but in many modern combined mode algorithms (e.g. AES-GCM or ChaCha20/Poly1305) it just must not repeat and can simply be a counter.



Under certain conditions it might not even be necessary to transmit the IV, for instance, because it can be derived from other information, like the sequence number in ESP. Therefore, there is currently an internet draft under discussion that proposes to omit the IV for certain algorithms (e.g. AES-GCM) and instead just use the (extended) sequence number, which is what's generally already used anyway, it's just transmitted twice in each message.






share|improve this answer








New contributor




ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






$endgroup$













    Your Answer





    StackExchange.ifUsing("editor", function ()
    return StackExchange.using("mathjaxEditing", function ()
    StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
    StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
    );
    );
    , "mathjax-editing");

    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "281"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: false,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    noCode: true, onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68389%2fipsec-transmission-of-initialization-vector%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    4












    $begingroup$

    Yes, the initialization vector is transmitted in the clear as first part of the ESP payload data (see RFC 4303, section 2, and the RFCs that define the use of specific algorithm with ESP, e.g. RFC 3602, section 3 for AES-CBC, or RFC 4106, section 3 for AES-GCM).



    The security of the encryption and integrity protection does not depend on the IV being kept secret. Its primary use is that of a nonce to ensure encrypting the same data with the same key does not result in the same ciphertext.



    Some algorithms require that the IV is random/unpredictable (e.g. AES-CBC) but in many modern combined mode algorithms (e.g. AES-GCM or ChaCha20/Poly1305) it just must not repeat and can simply be a counter.



    Under certain conditions it might not even be necessary to transmit the IV, for instance, because it can be derived from other information, like the sequence number in ESP. Therefore, there is currently an internet draft under discussion that proposes to omit the IV for certain algorithms (e.g. AES-GCM) and instead just use the (extended) sequence number, which is what's generally already used anyway, it's just transmitted twice in each message.






    share|improve this answer








    New contributor




    ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.






    $endgroup$

















      4












      $begingroup$

      Yes, the initialization vector is transmitted in the clear as first part of the ESP payload data (see RFC 4303, section 2, and the RFCs that define the use of specific algorithm with ESP, e.g. RFC 3602, section 3 for AES-CBC, or RFC 4106, section 3 for AES-GCM).



      The security of the encryption and integrity protection does not depend on the IV being kept secret. Its primary use is that of a nonce to ensure encrypting the same data with the same key does not result in the same ciphertext.



      Some algorithms require that the IV is random/unpredictable (e.g. AES-CBC) but in many modern combined mode algorithms (e.g. AES-GCM or ChaCha20/Poly1305) it just must not repeat and can simply be a counter.



      Under certain conditions it might not even be necessary to transmit the IV, for instance, because it can be derived from other information, like the sequence number in ESP. Therefore, there is currently an internet draft under discussion that proposes to omit the IV for certain algorithms (e.g. AES-GCM) and instead just use the (extended) sequence number, which is what's generally already used anyway, it's just transmitted twice in each message.






      share|improve this answer








      New contributor




      ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      $endgroup$















        4












        4








        4





        $begingroup$

        Yes, the initialization vector is transmitted in the clear as first part of the ESP payload data (see RFC 4303, section 2, and the RFCs that define the use of specific algorithm with ESP, e.g. RFC 3602, section 3 for AES-CBC, or RFC 4106, section 3 for AES-GCM).



        The security of the encryption and integrity protection does not depend on the IV being kept secret. Its primary use is that of a nonce to ensure encrypting the same data with the same key does not result in the same ciphertext.



        Some algorithms require that the IV is random/unpredictable (e.g. AES-CBC) but in many modern combined mode algorithms (e.g. AES-GCM or ChaCha20/Poly1305) it just must not repeat and can simply be a counter.



        Under certain conditions it might not even be necessary to transmit the IV, for instance, because it can be derived from other information, like the sequence number in ESP. Therefore, there is currently an internet draft under discussion that proposes to omit the IV for certain algorithms (e.g. AES-GCM) and instead just use the (extended) sequence number, which is what's generally already used anyway, it's just transmitted twice in each message.






        share|improve this answer








        New contributor




        ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.






        $endgroup$



        Yes, the initialization vector is transmitted in the clear as first part of the ESP payload data (see RFC 4303, section 2, and the RFCs that define the use of specific algorithm with ESP, e.g. RFC 3602, section 3 for AES-CBC, or RFC 4106, section 3 for AES-GCM).



        The security of the encryption and integrity protection does not depend on the IV being kept secret. Its primary use is that of a nonce to ensure encrypting the same data with the same key does not result in the same ciphertext.



        Some algorithms require that the IV is random/unpredictable (e.g. AES-CBC) but in many modern combined mode algorithms (e.g. AES-GCM or ChaCha20/Poly1305) it just must not repeat and can simply be a counter.



        Under certain conditions it might not even be necessary to transmit the IV, for instance, because it can be derived from other information, like the sequence number in ESP. Therefore, there is currently an internet draft under discussion that proposes to omit the IV for certain algorithms (e.g. AES-GCM) and instead just use the (extended) sequence number, which is what's generally already used anyway, it's just transmitted twice in each message.







        share|improve this answer








        New contributor




        ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        share|improve this answer



        share|improve this answer






        New contributor




        ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        answered 2 days ago









        ecdsaecdsa

        1562




        1562




        New contributor




        ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





        New contributor





        ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.






        ecdsa is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.



























            draft saved

            draft discarded
















































            Thanks for contributing an answer to Cryptography Stack Exchange!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            Use MathJax to format equations. MathJax reference.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68389%2fipsec-transmission-of-initialization-vector%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Sum ergo cogito? 1 nng

            419 nièngy_Soadمي 19bal1.5o_g

            Queiggey Chernihivv 9NnOo i Zw X QqKk LpB