2. Ipsec is a suite of protocols designed
to protect data.
Ipsec works by encrypting
information through encapsulation.
Ipsec works at the network layer of
the open system interconnection
(OSI) model.
3. Authentication- verifies that the packet
received is actually from the claimed
sender.
Integrity- ensures that the contents of
the packet did not change in transit.
Confidentiality-conceals the message
content through encapsulation.
4. Data Tempering-The malicious
modification of data stored on web
sites or in databases or being passed
between two computers on a network.
Network Traffic Sniffing- The capture
of network traffic by attackers looking
for important data files and to obtain
passwords.
5. Ipsec Security method : Encapsulating
Security Payload(ESP) and
Authentication Header(AH).
ESP-Ensures data confidentiality
through encryption , data integrity , and
authentication.
AH-Provides data authentication and
integrity only . Does not support
encapsulation.
6. Transport mode-The default mode .
It encrypts the ip payload.
Tunnel mode-The more secure mode
. It encrypts the ip header and ip
payload.
7.
8. Next Header – Next Header is the protocol identifies
the type of header immediately following the current
header.
Payload Length – the no of lines in the header is the
scenerio represents the payload length.
Reserved – it is reserved for future use.
9. Security Parameter Index(SPI) – the no that identifies the
established communication between two system.
Sequence No – it represents the no of message sent from the
sender to the receiver . The initial value of the counter is 1.It
is the sequence number of the packet.
Authentication Data - The Authentication Data field contains
the result of the Integrity Check Value calculation, that can
be used by the receiver to check the authentication and
integrity of the packet.
10.
11. Padding – used to expand the encrypted field if
required or to conceal the actual length of the
payload.
Pad Length – indicates the padding size.
12. The Internet was not created with security .
Communications can be altered, examined and
exploited.
There is a growing need to protect private
information crossing the public networks that
make up the Internet infrastructure.
IPSec is a set of protocols and methodologies to
create secure IP connections.
13. IRACST – International Journal of Computer
Networks and Wireless Communications
(IJCNWC), ISSN: 2250-3501 Vol.2, No6,
December 2012
International Journal of Scientific &
Engineering Research, Volume 5, Issue ś, Š¢-
2014 ISSN 2229-5518
JOURNAL OF ADVANCES IN
INFORMATION TECHNOLOGY, VOL. 2, NO.
2, MAY 2011