merkow ppt 12-JRM

merkow ppt 12-JRM merkow ppt 12-JRM

sites.csn.edu
from sites.csn.edu More from this publisher
26.10.2012 Views

Virtual Private Networks (VPNs) cont. � IPsec � Performs both encryption and authentication to address the inherent lack of security on IP-based networks � Three characteristics � Sender authentication, message integrity, and data confidentiality � No modification to user applications � Two security mechanisms � Authentication Header (AH) � Encapsulating Security Protocol (ESP) © Pearson Education Information Security: Principles and Practices 36

Virtual Private Networks (VPNs) cont. � IPsec cont. � Authentication Header (AH) � Modifies IP datagrams by adding an additional field that enables receivers to check the authenticity of the data within the datagram � Encapsulating Security Protocol (ESP) � Operates under the principle of encapsulation: encrypted data is sandwiched between an ESP header and ESP trailer © Pearson Education Information Security: Principles and Practices 37

Virtual Private Networks (VPNs)<br />

cont.<br />

� IPsec cont.<br />

� Authentication Header (AH)<br />

� Modifies IP datagrams by adding an additional<br />

field that enables receivers to check the<br />

authenticity of the data within the datagram<br />

� Encapsulating Security Protocol (ESP)<br />

� Operates under the principle of encapsulation:<br />

encrypted data is sandwiched between an ESP<br />

header and ESP trailer<br />

© Pearson Education Information Security:<br />

Principles and Practices 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!