Analysis Of IPsec

Analysis Of IPsec

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Topic: Analysis of IPsec.

1) IPSec protocol is used for creating means for secure exchange of information between systems and networks on the Internet. IPsec protocol helps users to create ?private groups? based on common interest, independently from specifications of the networks they are using.
2) IPSec protocol includes two protocols: Authentication Header (AH) and Encapsulating Secure Payload (ESP). AH creates an envelope that ensures authentication of the source of the information, the completeness and protection from double messaging.

u This way AH offers layers of ways to protect from malicious users. With help of AH every packet is authenticated, which makes ineffective programs that are trying to capture the administration of the session.
Besides this AH protocol tries to ensure the authentication of the headers of IP-packets, not depending on the location of the IP-headers outside of the envelope it is creating. AH Authentication prevents IP-header line manipulation during the transfer of the packet. Because of this reason protocol cannot be used in the environment where NAT (Network Address Translation ? is a mechanism used for transferring network addresses) is being used. This is because NAT requires IP-header manipulation, which AH Authentication will not allow.

u ESP protocol ensures confidentiality of

ipsec, protocol, ah, vpn, protocols, keys, encryption, authentication, network, user, security, it?s, mode, key, information, systems, equipment, attacks, algorithms, algorithm, using, secure, secret, possibility, networks, esp, envelope, because, two, transport, system, know, implemented, header, exchange

Leave a Reply

Your email address will not be published. Required fields are marked *