IP Security
IP Security
IP Security
IPSec is a security protocol which is used to provide security at the network layer of the networking
system. IPSec authenticates and encrypts the data packets over an IP network.
Features of IPSec
It guards the overall data packet produced at the IP layer inclusive of the higher layer
headers.
IPSec works in between two different networks, therefore, adoption of security features is
easier to implement without making any changes in the running applications.
The most frequent task of IPSec is to secure VPN network (a virtual private network)
between two different network entities.
IPSec Architecture
IPSec (IP Security) architecture uses two protocols to secure the traffic or data flow. These protocols
are ESP (Encapsulation Security Payload) and AH (Authentication Header). IPSec Architecture include
protocols, algorithms, DOI, and Key Management. All these components are very important in order
to provide the three main services:
Confidentiality
Authentication
Integirity
IP Security Architecture:
1. Architecture:
Architecture or IP Security Architecture covers the general concepts, definitions, protocols,
algorithms and security requirements of IP Security technology.
2. ESP Protocol:
ESP(Encapsulation Security Payload) provide the confidentiality service. Encapsulation Security
Payload is implemented in either two ways:
Packet Format:
Sequence Number:
Unique Sequence number are allotted to every packet so that at the receiver side packets
can be arranged properly.
Payload Data:
Payload data means the actual data or the actual message. The Payload data is in encrypted
format to achieve confidentiality.
Padding:
Extra bits or space added to the original message in order to ensure confidentiality. Padding
length is the size of the added bits or space in the original message
Next Header:
Next header means the next payload or next actual data.
Authentication Data
This field is optional in ESP protocol packet format.
3. Encryption algorithm:
Encryption algorithm is the document that describes various encryption algorithm used for
Encapsulation Security Payload.
4. AH Protocol:
AH (Authentication Header) Protocol provides both Authentication and Integrity service.
Authentication Header is implemented in one way only: Authentication along with Integrity.
Authentication Header covers the packet format and general issue related to the use of AH for
packet authentication and integrity.
5. Authentication Algorithm:
Authentication Algorithm contains the set of the documents that describe authentication algorithm
used for AH and for the authentication option of ESP.
7. Key Management:
Key Management contains the document that describes how the keys are exchanged between
sender and receiver.