Your SlideShare is downloading. ×
Ip security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ip security

982
views

Published on

Published in: Technology, Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
982
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • does not protect IP header (difference from AH)
  • transparent to upper layers
  • Transcript

    • 1. IP Security
      Jernej Virag
      21. 6. 2010
      1
      Jernej Virag
    • 2. IP Security
      21. 6. 2010
      Jernej Virag
      2
    • 3. IPsec modes
      Transport mode
      injects IPSec headers into existing packets
      Tunnel mode
      all old headers and data is in payload after IPSec headers, new IP header is created
      IPSec provides authentication and/or encryption in both modes
      21. 6. 2010
      Jernej Virag
      3
    • 4. Authentication
      21. 6. 2010
      Jernej Virag
      4
    • 5. Authentication header
      21. 6. 2010
      Jernej Virag
      5
    • 6. Authentication
      Algorithms
      HMAC-MD5-96
      HMAC-SHA1-96
      ensures integrity
      allows data origin authentication
      prevents replay attacks
      21. 6. 2010
      Jernej Virag
      6
    • 7. Encryption
      21. 6. 2010
      Jernej Virag
      7
    • 8. Encryption header
      21. 6. 2010
      Jernej Virag
      8
    • 9. Encryption
      Algorithms
      3DES
      RC5
      IDEA, 3IDEA
      CAST
      Blowfish
      confidentiality
      authentication
      integrity
      replay attack protection
      21. 6. 2010
      Jernej Virag
      9
    • 10. Usage
      21. 6. 2010
      Jernej Virag
      10
    • 11. IPSec usage
      secure connectivity for dislocated network segments
      secure access to internet
      secure communication with parters
      creation of secure VPNs
      21. 6. 2010
      Jernej Virag
      11
    • 12. ?
      21. 6. 2010
      Jernej Virag
      12