Encryption authentication - point to point , Computer Networking

Assignment Help:

Encryption Authentication

One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet Engineering  Task Force) to provide  security for a packet carried by the internet. instead it provides a framework and  a mechanism it leaves the selection of the  encryption authentication method  to the user.

IP sec  uses an authentication heard. The  authentication header  is an extra header  added to the data packet at the transport layer before  the IP  header is added.

When  an IP datagram carries an authentication header the protocols  field sin the IP header changes to a value of 51 show that the  datagram carries an AH A  field inside  the AH defines  the original  value  of eh protocols fields.

IP sec  uses  a mechanism  called encapsulation security  payload. ESP first  the  data  packet at the  transport layer  then  adds one extra header and one  extra trailer.

The ESP  header  define the algorism used for encryption. The ESP  trailer aligns the  packet  to the length required by some  encryption  algorithms. The ESP  trailer aligns tains  the authentication data  for the  whole packet excluding the IP  header. The value  of the  protocols  fields is 50 in the IP header  to indicate the use  of ESP.


Related Discussions:- Encryption authentication - point to point

Managing and securing the web utility of the router, Managing and Securing ...

Managing and Securing the Web Utility of the Router Step 1: Configure web access. Navigate to the Administration section. Change the router password to cisco. For Web Uti

Explain about domain name system, Q. Explain about Domain Name System? ...

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

What is network architecture, What is Network Architecture? When two o...

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Define the microcells- routing and switching, Microcells As cells becom...

Microcells As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of small buildings or the sides of large buildings, and finally to lamp

Merits of shared memory and drawbacks, Merits of Shared Memory Programming ...

Merits of Shared Memory Programming Global address space gives a user-friendly programming perspective to memory. Data sharing among processes is both fast and uniform

What is border gateway protocol, What is BGP (Border Gateway Protocol)? ...

What is BGP (Border Gateway Protocol)? It is a protocol used to promote the set of networks that can be reached within an autonomous system. BGP enable this information to be c

Controlling and monitoring access to the intranet, Controlling and monitori...

Controlling and monitoring access to the Intranet Digital certificates provide excellent means of controlling and monitoring access to the Intranets. The certificate itself act

Use of two-layer switch, Q. Use of Two-Layer Switch? - Performs at the ...

Q. Use of Two-Layer Switch? - Performs at the physical as well as data link layer - A bridge with many ports designed for faster performance - Allocates unique port to ea

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd