SlideShare a Scribd company logo
IPSec
By Shobhit Sharma
What is IPSec?
• IPSec
– stands for IP Security
– it is used for the security of general IP traffic.
• The power of IPSec lies in its ability to
– support multiple protocols and algorithms.
• It also incorporates new advancements in
– encryption and hashing protocols.
Objective of IPSec
The main objective of IPSec is
• to provide CIA
– (confidentiality, integrity, and authentication) for
virtual networks used in current networking
environments.
Objective of IPSec
• Confidentiality.
– IPSec uses encryption protocols namely AES, DES, and
3DES for providing confidentiality.
• Integrity.
– IPSec uses hashing protocols (MD5 and SHA) for providing
integrity. Hashed Message Authentication (HMAC) can
also be used for checking the data integrity.
• Authentication algorithms.
– RSA digital signatures and pre-shared keys (PSK) are two
methods used for authentication purposes.
Use of IPSec
• To encrypt application layer data.
• To provide security for routers sending
routing data across the public internet.
• To provide authentication without
encryption, like to authenticate that the
data originates from a known sender.
Use of IPSec
• To protect network data by setting up
circuits using IPsec tunneling in which
all data is being sent between the two
endpoints is encrypted, as with a Virtual
Private Network(VPN) connection.
Architecture of IPSec
IPSec
Policy
AH Protocol ESP Protocol
Authentication
Algorithm
Encryption
Algorithm
IPSec Domain of
Interpretation
Key Management
Architecture of IPSec
• IP Security Architecture
– covers the general concepts, definitions,
protocols, algorithms and security
requirements of IP Security technology.
Architecture of IPSec : ESP
Protocol
• Encapsulation Security Payload
– provide the confidentiality service.
• Encapsulation Security Payload is
implemented in either two ways:
– ESP with optional Authentication.
– ESP with Authentication.
Architecture of IPSec : ESP
Protocol
• Packet Format
Encrypted
Format
Security Parameter Index (SPI)
Sequence Number
Payload Data
Padding
Padding
Length
Next
Header
Authentication Data (Optional)
Architecture of IPSec : ESP
Protocol
• Packet Format
– SPI
• used to give an unique number to the connection
build between Client and Server.
– Sequence Number
• alloted to every packet so that at the receiver side
packets can be arranged properly.
– Payload Data
• the actual data or the message. It is in encrypted
format to achieve confidentiality.
Architecture of IPSec : ESP
Protocol
• Packet Format
– Padding
• extra bits or space added to the original message
in order to ensure confidentiality.
• it’s length is the size of added bits or space in the
original message.
– Next Header
• it means the next payload or actual data.
– Authentication Data
• optional field in ESP protocol packet format.
Architecture of IPSec
• Encryption Algorithm
– document that describes various encryption
algorithm used for Encapsulation Security
Payload.
Architecture of IPSec : AH
Protocol
• Authentication Header
– provides both Authentication and Integrity
service.
• Authentication Header is implemented in
one way only:
– Authentication along with Integrity.
Architecture of IPSec : AH
Protocol
• Packet Format
Security Parameter Index (SPI)
Sequence Number
Reserved
Payload
Length
Next
Header
Authentication Data (Integrity Checksum)
Architecture of IPSec
• Authentication Algorithm
– contains the set of the documents that
describe authentication algorithm used for
AH and for the authentication option of ESP.
Architecture of IPSec
• Domain of Interpretation
– the identifier which support both AH and ESP
protocols.
– It contains values needed for documentation
related to each other.
Architecture of IPSec
• Key Management
– contains the document that describes how
the keys are exchanged between sender and
receiver.
Ad

More Related Content

What's hot (20)

DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
Avadhesh Agrawal
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
Prateek Singh Bapna
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
Kirti Ahirrao
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
Syed Bahadur Shah
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
Kirti Ahirrao
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 

Similar to IPSec (Internet Protocol Security) - PART 1 (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
PriyadharshiniVS
 
IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
MamoonKhan40
 
Unit 6
Unit 6Unit 6
Unit 6
KRAMANJANEYULU1
 
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
namrataparopate
 
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
namrataparopate
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
Hossein Yavari
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
AlaaElhaddad3
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
Chinmay Patel
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.ppt
DEEPAK948083
 
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgdipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
zmulani8
 
ahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptxahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptx
FutureTechnologies3
 
IP Security
IP SecurityIP Security
IP Security
Dr.Florence Dayana
 
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATIONchAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PragyanshuParadkar1
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
Gopal Karthik
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
anoean
 
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdfUnit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
KanchanPatil34
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
ShineStar21
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
PriyadharshiniVS
 
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
namrataparopate
 
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
Chapter_4_InternetSecurity.pptChapter_4_InternetSecurity.pptChapter_4_Interne...
namrataparopate
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.ppt
DEEPAK948083
 
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgdipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
ipsec.pdfgvdgvdgdgdgddgdgdgdgdgdgdgdgdgd
zmulani8
 
ahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptxahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptx
FutureTechnologies3
 
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATIONchAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PragyanshuParadkar1
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
anoean
 
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdfUnit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
KanchanPatil34
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
Ad

Recently uploaded (20)

Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
HusseinMalikMammadli
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
UXPA Boston
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
SOFTTECHHUB
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
accessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electricaccessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electric
UXPA Boston
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
Multi-Agent AI Systems: Architectures & Communication (MCP and A2A)
HusseinMalikMammadli
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
Longitudinal Benchmark: A Real-World UX Case Study in Onboarding by Linda Bor...
UXPA Boston
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptxIn-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
In-App Guidance_ Save Enterprises Millions in Training & IT Costs.pptx
aptyai
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdfICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
ICDCC 2025: Securing Agentic AI - Eryk Budi Pratama.pdf
Eryk Budi Pratama
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
SOFTTECHHUB
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
accessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electricaccessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electric
UXPA Boston
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Ad

IPSec (Internet Protocol Security) - PART 1

  • 2. What is IPSec? • IPSec – stands for IP Security – it is used for the security of general IP traffic. • The power of IPSec lies in its ability to – support multiple protocols and algorithms. • It also incorporates new advancements in – encryption and hashing protocols.
  • 3. Objective of IPSec The main objective of IPSec is • to provide CIA – (confidentiality, integrity, and authentication) for virtual networks used in current networking environments.
  • 4. Objective of IPSec • Confidentiality. – IPSec uses encryption protocols namely AES, DES, and 3DES for providing confidentiality. • Integrity. – IPSec uses hashing protocols (MD5 and SHA) for providing integrity. Hashed Message Authentication (HMAC) can also be used for checking the data integrity. • Authentication algorithms. – RSA digital signatures and pre-shared keys (PSK) are two methods used for authentication purposes.
  • 5. Use of IPSec • To encrypt application layer data. • To provide security for routers sending routing data across the public internet. • To provide authentication without encryption, like to authenticate that the data originates from a known sender.
  • 6. Use of IPSec • To protect network data by setting up circuits using IPsec tunneling in which all data is being sent between the two endpoints is encrypted, as with a Virtual Private Network(VPN) connection.
  • 7. Architecture of IPSec IPSec Policy AH Protocol ESP Protocol Authentication Algorithm Encryption Algorithm IPSec Domain of Interpretation Key Management
  • 8. Architecture of IPSec • IP Security Architecture – covers the general concepts, definitions, protocols, algorithms and security requirements of IP Security technology.
  • 9. Architecture of IPSec : ESP Protocol • Encapsulation Security Payload – provide the confidentiality service. • Encapsulation Security Payload is implemented in either two ways: – ESP with optional Authentication. – ESP with Authentication.
  • 10. Architecture of IPSec : ESP Protocol • Packet Format Encrypted Format Security Parameter Index (SPI) Sequence Number Payload Data Padding Padding Length Next Header Authentication Data (Optional)
  • 11. Architecture of IPSec : ESP Protocol • Packet Format – SPI • used to give an unique number to the connection build between Client and Server. – Sequence Number • alloted to every packet so that at the receiver side packets can be arranged properly. – Payload Data • the actual data or the message. It is in encrypted format to achieve confidentiality.
  • 12. Architecture of IPSec : ESP Protocol • Packet Format – Padding • extra bits or space added to the original message in order to ensure confidentiality. • it’s length is the size of added bits or space in the original message. – Next Header • it means the next payload or actual data. – Authentication Data • optional field in ESP protocol packet format.
  • 13. Architecture of IPSec • Encryption Algorithm – document that describes various encryption algorithm used for Encapsulation Security Payload.
  • 14. Architecture of IPSec : AH Protocol • Authentication Header – provides both Authentication and Integrity service. • Authentication Header is implemented in one way only: – Authentication along with Integrity.
  • 15. Architecture of IPSec : AH Protocol • Packet Format Security Parameter Index (SPI) Sequence Number Reserved Payload Length Next Header Authentication Data (Integrity Checksum)
  • 16. Architecture of IPSec • Authentication Algorithm – contains the set of the documents that describe authentication algorithm used for AH and for the authentication option of ESP.
  • 17. Architecture of IPSec • Domain of Interpretation – the identifier which support both AH and ESP protocols. – It contains values needed for documentation related to each other.
  • 18. Architecture of IPSec • Key Management – contains the document that describes how the keys are exchanged between sender and receiver.
  翻译: