SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRST173655 | Received : 01 August 2017 | Accepted : 06 August 2017 | July-August-2017 [(3) 6: 223-226]
© 2017 IJSRST | Volume 3 | Issue 6 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X
Themed Section: Science and Technology
223
Internet Protocol Security as the Network Cryptography System
Haryanto1
, Andysah Putera Utama Siahaan2
, Robbi Rahim3
, Mesran4
1
Faculty of Engineering, Universitas Pembanguan Panca Budi, Medan, Indonesia
2
Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
2
Department of Health Information,, Akademi Perekam Medik dan Infokes Imelda, Medan, Indonesia
4
Department of Computer Engineering, STMIK Budi Darma, Medan, Indonesia
2,3
Ph.D. Student of School of Computer and Communication Engineering, Universiti Malysia Perlis, Kangar, Malaysia
ABSTRACT
Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an
exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will
exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport
mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a
symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission
session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can
negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that
works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host,
network-to-network, and network-to-host as well.
Keywords : Network Security, IP Security, Cryptography
I. INTRODUCTION
The first computer network was created to exchange
data on internal connections only. Along with its
development, computer network developed to be able to
share information globally; then it is the creation of the
internet. At the time of exchanging information in
cyberspace, there are so many threats that occur; Data
theft is one of the most frequent threats by wild parties.
Currently, computer networks are used for various
activities. Network traffic is often used to conduct online
transactions so that security aspect becomes a problem
that should get a big attention [8]. To secure the network
traffic required a proper protocol. This protocol is
capable of filtering incoming packets and may refuse
instruction requests if suspected. In this study, the author
tries to use the ability of IP Security. It is a protocol to
secure TCP/IP transmissions. This protocol will be
implemented at the transport layer in the OSI Reference
Model to protect the IP by deploying security rules
[1][2]. This rule can be set according to user
requirements. Implementing this protocol is expected to
avoid the threats that occur during the exchange of
information on computer networks.
II. THEORIES
A protocol is a rule that defines functions contained in a
network, such as sending messages, data, or information.
It must be fulfilled by the sender and receiver so the
communication can take place properly and correctly
even though the system contained in the network is not
similar [7]. At the time of activity in cyberspace, even
the best network will always be unsafe. It requires
additional software to protect information in the event of
the exchange. This protocol provides source
authentication, integrity checking, and content
confidentiality. Data security is not a new thing applied.
There are many ways to provide that security. Some
applications ensure the safety services on the application
layer including Secure Socket Layer (SSL) or Transport
Layer Security (TLS). There are many conditions in the
implementation of this security. This protocol makes
calls to the underlying security provider to provide this
service. IP Security eliminates this requirement by
transferring security to the network layer. It provides the
ability to authenticate, and encrypt data passing on the
network. IP Security provides end-to-end encryption
between computers and networks [3][4].
International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 224
IP Security provides IP datagram security. It is end to
end encyption; only the sender and receiver know about
the security key. Devices between the two parties do not
have to worry about encryption, secret keys, and so on,
to forward the data together. The connection where the
data flows may not be safely traveled. It means that in
most cases, the underlying network infrastructure does
not need to be modified. The application is fairly
straightforward. Only hosts need to understand the
protocol. Intermediary devices such as routers do not
need IP Security aware [5].
However, it is important to note that firewalls and other
devices that block certain types of traffic require special
consideration and will be discussed later. The protocol
works by identifying the traffic that needs to be secured
and then applying a specified security level [6]. For
example, the organization may identify traffic that meets
certain criteria such as the source IP address or host
name, and select the appropriate level of security based
on that identification.
III. RESULT AND DISCUSSION
3.1 How IP Security Works
The security aspect is a significant concern in the
protocol. Any information connected to the internet will
be vulnerable to data theft. One way is to apply the
security aspects of the application layer. End-to-end
encryption can secure data security. Any attempt to
access or change data in the data transmission process is
preventable. It has a major effect that all built
applications must be added to the security aspect to
ensure the secure delivery of data.
IP Security can secure between certain hosts, network
routers, firewalls or between hosts and routers or
firewalls. The protocol uses some encryption algorithms.
Each service has its authentication. It provides an
approach to maintaining network traffic. There are two
protocols protect the IP datagram, Authentication
Header (AH) and Encapsulating Security Payload (ESP).
AH is used to ensure data integrity, provide antireplay
protection, and host authentication while ESP provides
data confidentiality. There are no actual cryptographic
algorithms in them.
The protocols, AH and ESP, work to provide
authentication, integrity, and confidentiality. It can be
configured to protect the entire IP payload or just the top
layer protocol of the IP payload. Using protocols
separately, or in combination, Banks can achieve simple
authentication and integrity checking, as well as data
encryption when sent over the wire. The AH header
authentication, as defined by RFC 2402, provides the
integrity of the data transmitted through typing hashing.
It is needed to ensure the data is original. Hashing is a
technology which is coded into several characters that
create a digital signature from data. It is to verify that the
message comes from the real source. Notice that the AH
hash of the IP header and the load, but does not include
any part of the allegedly changed datagram, such as hops.
Because both headers and payloads are encrypted.
3.2 IP Security Implementation
The packet data and headers to be sent are computed
using cryptographic checksum techniques and change
the IP packet header section using a secure hashing
function in tunnel mode. It adds a new header containing
the hash value so that the information provided in the
normal package is authenticated in the recipient. It
seems to create a special tunnel on a public network that
is only accessible to certain people. Figure 1 illustrated
the example of an IP Security usage diagram for
building the secure communications using public
networks.
The private network #1 and #2 use the local IP addresses,
192.168.10.1 and 192.168.20.1. Both gateways use
public IP, and it can be accessed from any computer as
long as they are connected to the internet. There are
several steps to ping from internal network #1 to #2.
Every packet sent to IP 192.168.20.1 must be wrapped
into another packet so that the IP header that appears is
public IP X.X.X.X Then it will be sent to public IP
Y.Y.Y.Y through a gateway with IP header stating as if
the packet came from IP X.X.X.X. The process is called
encapsulation. The gateway must know the path to
achieve IP 192.168.20.1. It must redirect the packet to IP
192.168.20.1. It creates a special tunnel between the two
networks. Once the connection has been established,
each network can communicate and ping. When the
packets arriving at IP Y.Y.Y.Y, it must be
International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 225
unencapsulated to obtain the actual packet and sent to IP
address 192.168.20.1.
Figure 1. IP Security Implementation
3.2 The Advantages and Disadvantages
There are several advantages and disadvantages of using
IP Security as a protocol of security protection on
computer networks.
The advantages of IP Security:
ď‚· IP Security can protect any protocol that runs over
IP and on any medium that IPs can use, so IPsec is a
common method that can provide secure
communications over a computer network.
ď‚· IP Security provides security in a transparent
manner, so from the application side, the user does
not need to be aware of its existence.
ď‚· IP Security is designed to meet the new IPv6
standard without forgetting which IPv4 is now in
use.
ď‚· The design of IP Security does not require the use of
certain encryption or hash algorithms so that if the
frequently used algorithm has now been solved, its
function can be replaced by other algorithms that are
harder to solve.
The disadvantages of IP Security:
ď‚· IP Security too complex, provision of some
additional features by adding unnecessary
complexity.
ď‚· Some of the documentation still contains some
errors, not explaining some essential and ambiguous
explanations.
ď‚· Some of the default algorithms used in IP Security is
now unsafe.
IV. CONCLUSION
IP Security is an important protocol for improving the
security of computer networks. This protocol is in the
network layer. It has some encryption features. If the
data is successfully intercepted by a third party, the data
is safe from theft. This protocol uses end-to-end
encryption where the keys used are not mutually
recognized by the recipient and the sender. The receiver
does not know the sender's key and the sender does not
know the recipient's key. IP Security protects
communications by authentication and encrypts every IP
packet from a communication session. Internet Protocol
Security is used in protecting data flows between a pair
of hosts, networks, or between security gateways and
hosts. IP Security consists of two main parts of the
protocol of adding headers to IP packets, AH and ESP.
Cryptography is an IPsec technique used in providing
security services Authentication, Data Integrity, and
Confidentiality. Authentication and Data Integrity are
provided by the AH and ESP protocols. The ESP
protocol ensures confidentiality by using a cryptographic
algorithm. IP Security is still considered the best
solution in providing security in communication over
computer networks, although it still has flaws.
V. REFERENCES
[1]. N. Ferguson and B. Schneier, "A Cryptographic
Evaluation of IPSec, Counterpane," Counterpane
Internet Security, Inc..
[2]. B. H. Kang and M. O. Balitanas, "Vulnerabilities
of VPN using IPSec and Defensive Measures,"
Private Network #1
192.168.10.1
Gateway / Modem
Public IP : X.X.X.X
Private Network #2
192.168.20.1
Gateway / Modem
Public IP : Y.Y.Y.Y
Internet
International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 226
International Journal of Advanced Science and
Technology, vol. 8, no. 7, pp. 9-18, 2009.
[3]. H. Alshamrani, "Internet Protocol Security (IPSec)
Mechanisms," International Journal of Scientific
& Engineering Research, vol. 5, no. 5, pp. 85-87,
2014.
[4]. P. K. Singh and P. P. Singh, "A Novel Approach
for the Analysis & Issues of IPsec VPN,"
International Journal of Science and Research,
vol. 2, no. 7, pp. 187-189, 2013.
[5]. A. Singh and M. Gahlawat, "Internet Protocol
Security (IPSec)," International Journal of
Computer Networks and Wireless
Communications, vol. 2, no. 6, pp. 717-721, 2012.
[6]. T. Sharma and S. Shiwani, "Statistical Results of
IPSec in IPv6 Networks," International Journal of
Computer Applications, vol. 79, no. 2, pp. 15-19,
2013.
[7]. R. Rahim and A. Ikhwan, "Study of Three Pass
Protocol on Data Security," International Journal
of Science and Research, vol. 5, no. 11, pp. 102-
104, 2016.
[8]. A. Lubis and A. P. U. S. , "NetworkForensic
Application in General Cases," IOSR Journal of
Computer Engineering, vol. 18, no. 6, pp. 41-44,
2016.

More Related Content

What's hot

SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMAM Publications
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system IJECEIAES
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networksAlexander Decker
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networksAlexander Decker
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Alexander Decker
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002Editor IJCATR
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security insAstha Parihar
 

What's hot (20)

SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 

Similar to Internet Protocol Security as the Network Cryptography System

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherBRNSSPublicationHubI
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Cns unit4
Cns unit4Cns unit4
Cns unit4PRADEEPJ30
 
Cns unit4
Cns unit4Cns unit4
Cns unit4PRADEEPJ30
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Web security
Web securityWeb security
Web securityLayla Tk
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarDr. Shivashankar
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Edureka!
 

Similar to Internet Protocol Security as the Network Cryptography System (20)

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Ip security
Ip security Ip security
Ip security
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Network security
Network securityNetwork security
Network security
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Ip sec
Ip secIp sec
Ip sec
 
Web security
Web securityWeb security
Web security
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Internet Protocol Security as the Network Cryptography System

  • 1. IJSRST173655 | Received : 01 August 2017 | Accepted : 06 August 2017 | July-August-2017 [(3) 6: 223-226] © 2017 IJSRST | Volume 3 | Issue 6 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X Themed Section: Science and Technology 223 Internet Protocol Security as the Network Cryptography System Haryanto1 , Andysah Putera Utama Siahaan2 , Robbi Rahim3 , Mesran4 1 Faculty of Engineering, Universitas Pembanguan Panca Budi, Medan, Indonesia 2 Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia 2 Department of Health Information,, Akademi Perekam Medik dan Infokes Imelda, Medan, Indonesia 4 Department of Computer Engineering, STMIK Budi Darma, Medan, Indonesia 2,3 Ph.D. Student of School of Computer and Communication Engineering, Universiti Malysia Perlis, Kangar, Malaysia ABSTRACT Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well. Keywords : Network Security, IP Security, Cryptography I. INTRODUCTION The first computer network was created to exchange data on internal connections only. Along with its development, computer network developed to be able to share information globally; then it is the creation of the internet. At the time of exchanging information in cyberspace, there are so many threats that occur; Data theft is one of the most frequent threats by wild parties. Currently, computer networks are used for various activities. Network traffic is often used to conduct online transactions so that security aspect becomes a problem that should get a big attention [8]. To secure the network traffic required a proper protocol. This protocol is capable of filtering incoming packets and may refuse instruction requests if suspected. In this study, the author tries to use the ability of IP Security. It is a protocol to secure TCP/IP transmissions. This protocol will be implemented at the transport layer in the OSI Reference Model to protect the IP by deploying security rules [1][2]. This rule can be set according to user requirements. Implementing this protocol is expected to avoid the threats that occur during the exchange of information on computer networks. II. THEORIES A protocol is a rule that defines functions contained in a network, such as sending messages, data, or information. It must be fulfilled by the sender and receiver so the communication can take place properly and correctly even though the system contained in the network is not similar [7]. At the time of activity in cyberspace, even the best network will always be unsafe. It requires additional software to protect information in the event of the exchange. This protocol provides source authentication, integrity checking, and content confidentiality. Data security is not a new thing applied. There are many ways to provide that security. Some applications ensure the safety services on the application layer including Secure Socket Layer (SSL) or Transport Layer Security (TLS). There are many conditions in the implementation of this security. This protocol makes calls to the underlying security provider to provide this service. IP Security eliminates this requirement by transferring security to the network layer. It provides the ability to authenticate, and encrypt data passing on the network. IP Security provides end-to-end encryption between computers and networks [3][4].
  • 2. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 224 IP Security provides IP datagram security. It is end to end encyption; only the sender and receiver know about the security key. Devices between the two parties do not have to worry about encryption, secret keys, and so on, to forward the data together. The connection where the data flows may not be safely traveled. It means that in most cases, the underlying network infrastructure does not need to be modified. The application is fairly straightforward. Only hosts need to understand the protocol. Intermediary devices such as routers do not need IP Security aware [5]. However, it is important to note that firewalls and other devices that block certain types of traffic require special consideration and will be discussed later. The protocol works by identifying the traffic that needs to be secured and then applying a specified security level [6]. For example, the organization may identify traffic that meets certain criteria such as the source IP address or host name, and select the appropriate level of security based on that identification. III. RESULT AND DISCUSSION 3.1 How IP Security Works The security aspect is a significant concern in the protocol. Any information connected to the internet will be vulnerable to data theft. One way is to apply the security aspects of the application layer. End-to-end encryption can secure data security. Any attempt to access or change data in the data transmission process is preventable. It has a major effect that all built applications must be added to the security aspect to ensure the secure delivery of data. IP Security can secure between certain hosts, network routers, firewalls or between hosts and routers or firewalls. The protocol uses some encryption algorithms. Each service has its authentication. It provides an approach to maintaining network traffic. There are two protocols protect the IP datagram, Authentication Header (AH) and Encapsulating Security Payload (ESP). AH is used to ensure data integrity, provide antireplay protection, and host authentication while ESP provides data confidentiality. There are no actual cryptographic algorithms in them. The protocols, AH and ESP, work to provide authentication, integrity, and confidentiality. It can be configured to protect the entire IP payload or just the top layer protocol of the IP payload. Using protocols separately, or in combination, Banks can achieve simple authentication and integrity checking, as well as data encryption when sent over the wire. The AH header authentication, as defined by RFC 2402, provides the integrity of the data transmitted through typing hashing. It is needed to ensure the data is original. Hashing is a technology which is coded into several characters that create a digital signature from data. It is to verify that the message comes from the real source. Notice that the AH hash of the IP header and the load, but does not include any part of the allegedly changed datagram, such as hops. Because both headers and payloads are encrypted. 3.2 IP Security Implementation The packet data and headers to be sent are computed using cryptographic checksum techniques and change the IP packet header section using a secure hashing function in tunnel mode. It adds a new header containing the hash value so that the information provided in the normal package is authenticated in the recipient. It seems to create a special tunnel on a public network that is only accessible to certain people. Figure 1 illustrated the example of an IP Security usage diagram for building the secure communications using public networks. The private network #1 and #2 use the local IP addresses, 192.168.10.1 and 192.168.20.1. Both gateways use public IP, and it can be accessed from any computer as long as they are connected to the internet. There are several steps to ping from internal network #1 to #2. Every packet sent to IP 192.168.20.1 must be wrapped into another packet so that the IP header that appears is public IP X.X.X.X Then it will be sent to public IP Y.Y.Y.Y through a gateway with IP header stating as if the packet came from IP X.X.X.X. The process is called encapsulation. The gateway must know the path to achieve IP 192.168.20.1. It must redirect the packet to IP 192.168.20.1. It creates a special tunnel between the two networks. Once the connection has been established, each network can communicate and ping. When the packets arriving at IP Y.Y.Y.Y, it must be
  • 3. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 225 unencapsulated to obtain the actual packet and sent to IP address 192.168.20.1. Figure 1. IP Security Implementation 3.2 The Advantages and Disadvantages There are several advantages and disadvantages of using IP Security as a protocol of security protection on computer networks. The advantages of IP Security: ď‚· IP Security can protect any protocol that runs over IP and on any medium that IPs can use, so IPsec is a common method that can provide secure communications over a computer network. ď‚· IP Security provides security in a transparent manner, so from the application side, the user does not need to be aware of its existence. ď‚· IP Security is designed to meet the new IPv6 standard without forgetting which IPv4 is now in use. ď‚· The design of IP Security does not require the use of certain encryption or hash algorithms so that if the frequently used algorithm has now been solved, its function can be replaced by other algorithms that are harder to solve. The disadvantages of IP Security: ď‚· IP Security too complex, provision of some additional features by adding unnecessary complexity. ď‚· Some of the documentation still contains some errors, not explaining some essential and ambiguous explanations. ď‚· Some of the default algorithms used in IP Security is now unsafe. IV. CONCLUSION IP Security is an important protocol for improving the security of computer networks. This protocol is in the network layer. It has some encryption features. If the data is successfully intercepted by a third party, the data is safe from theft. This protocol uses end-to-end encryption where the keys used are not mutually recognized by the recipient and the sender. The receiver does not know the sender's key and the sender does not know the recipient's key. IP Security protects communications by authentication and encrypts every IP packet from a communication session. Internet Protocol Security is used in protecting data flows between a pair of hosts, networks, or between security gateways and hosts. IP Security consists of two main parts of the protocol of adding headers to IP packets, AH and ESP. Cryptography is an IPsec technique used in providing security services Authentication, Data Integrity, and Confidentiality. Authentication and Data Integrity are provided by the AH and ESP protocols. The ESP protocol ensures confidentiality by using a cryptographic algorithm. IP Security is still considered the best solution in providing security in communication over computer networks, although it still has flaws. V. REFERENCES [1]. N. Ferguson and B. Schneier, "A Cryptographic Evaluation of IPSec, Counterpane," Counterpane Internet Security, Inc.. [2]. B. H. Kang and M. O. Balitanas, "Vulnerabilities of VPN using IPSec and Defensive Measures," Private Network #1 192.168.10.1 Gateway / Modem Public IP : X.X.X.X Private Network #2 192.168.20.1 Gateway / Modem Public IP : Y.Y.Y.Y Internet
  • 4. International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 226 International Journal of Advanced Science and Technology, vol. 8, no. 7, pp. 9-18, 2009. [3]. H. Alshamrani, "Internet Protocol Security (IPSec) Mechanisms," International Journal of Scientific & Engineering Research, vol. 5, no. 5, pp. 85-87, 2014. [4]. P. K. Singh and P. P. Singh, "A Novel Approach for the Analysis & Issues of IPsec VPN," International Journal of Science and Research, vol. 2, no. 7, pp. 187-189, 2013. [5]. A. Singh and M. Gahlawat, "Internet Protocol Security (IPSec)," International Journal of Computer Networks and Wireless Communications, vol. 2, no. 6, pp. 717-721, 2012. [6]. T. Sharma and S. Shiwani, "Statistical Results of IPSec in IPv6 Networks," International Journal of Computer Applications, vol. 79, no. 2, pp. 15-19, 2013. [7]. R. Rahim and A. Ikhwan, "Study of Three Pass Protocol on Data Security," International Journal of Science and Research, vol. 5, no. 11, pp. 102- 104, 2016. [8]. A. Lubis and A. P. U. S. , "NetworkForensic Application in General Cases," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 41-44, 2016.