Unit 3
Unit 3
IPsec
IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or
packet processing layer of network communication.
IPsec is said to be especially useful for implementing virtual private networks and for remote user access
through dial-up connection to private networks.
A big advantage of IPsec is that security arrangements can be handled without requiring changes to
individual user computers.
IPsec provides two choices of security service: Authentication Header (AH), which essentially allows
authentication of the sender of data, and Encapsulating Security Payload (ESP), which supports both
authentication of the sender and encryption of data as well.
The specific information associated with each of these services is inserted into the packet in a header that
follows the IP packet header.
Transport mode
In transport mode, only the payload (the data you transfer) of the IP packet is encrypted and/or
authenticated.
Tunnel mode
In tunnel mode, the entire IP packet (data and IP header) is encrypted and/or authenticated.
Security parameter index. The 32-bit security parameter index (SPI) field plays
the role of a virtual-circuit identifier and is the same for all packets sent during a
connection called a security association.
Sequence number. A 32-bit sequence number provides ordering information for
a sequence of datagrams.
Authentication data. Finally, the authentication data field is the result of applying
a hash function to the entire IP datagram except for the fields that are changed during
transit (e.g., time-to-live).
The AH Protocol provides source authentication and data integrity, but not privacy.
Key management
It is the process of administering or managing cryptographic keys for a cryptosystem. It involves the
generation, creation, protection, storage, exchange, replacement and use of said keys and with another
type of security system built into large cryptosystems, enables selective restriction for certain keys.
key management is also one of the most challenging aspects of cryptography because it deals with many
types of security liabilities beyond encryption, such as people and flawed policies.
A popular example of a key management systems is public key infrastructure (PKI), which is used in
Secure Sockets Layer (SSL) and Transport Layer Security (TLS).