Title :
Implementation of IPSec Protocol
Author :
Dhall, Hitesh ; Dhall, Dolly ; Batra, Sonia ; Rani, Pooja
Author_Institution :
MCA Deptt, SPGOI, Rohtak, India
Abstract :
The aim of this paper is to present the implementation of IPSec Protocol. IPSec protocol provides an end user to end user traffic with ensuring authenticity and confidentiality of data packet. IP sec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network System project of the National Security Administration (NSA). IPSec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comments addressing various components and extensions, including the official capitalization style of the term. IPSec defines encryption, authentication and key management routines for ensuring the privacy, integrity and authenticity of data in a VPN as the information traverses public IP networks. Because IPSec requires each end of the tunnel to have a unique address, special care must be taken when implementing IPSec VPNs in environments using private IP addressing based on network address translation. Fortunately, several vendors offer solutions to this problem. However, they add more management complexity.
Keywords :
IP networks; Internet; authorisation; computer network management; computer network security; cryptographic protocols; data integrity; data privacy; telecommunication traffic; virtual private networks; IETF; IPSec protocol; ISO standard network layer security protocol; Internet engineering task force; Internet protocol security; NLSP; National Security Administration; SP3 protocol; VPN; data integrity; data packet authenticity; data packet confidentiality; data privacy; encryption; end user traffic; key management routines; management complexity; network address translation; private IP addressing; public IP networks; secure data network system project; Ad hoc networks; Authentication; IP networks; Internet; Protocols; Transforms; IPSec; ISO; Internet Engineering Task Force (IETF); National Security Administration (NSA); Network Layer Security Protocol (NLSP); VPN;
Conference_Titel :
Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on
Conference_Location :
Rohtak, Haryana
Print_ISBN :
978-1-4673-0471-9
DOI :
10.1109/ACCT.2012.64