VPNS and IPSEC

VPNS and IPSEC

Manuel Mogollon (University of Dallas, USA)
Copyright: © 2008 |Pages: 34
DOI: 10.4018/978-1-59904-837-6.ch011
OnDemand PDF Download:
$37.50

Abstract

Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks, such as the public Internet or private IP backbones. When VPNs are used, the Internet offers the appearance, functionality, and usefulness of a dedicated private network. One of the problems in using the Internet as a WAN is that the Internet is a public network and has relatively little security. IPsec provides the following security services to VPNs: data origin authentication, access control, confidentiality (encryption), connectionless integrity, rejection of replayed packets (a form of partial sequence integrity), and limited traffic flow confidentiality.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
John H. Nugent
Acknowledgment
Manuel Mogollon
Chapter 1
Classic Cryptography  (pages 1-14)
Manuel Mogollon
Chapters 1 and 2 cover information on classic cryptography and the aspects of information security related to security services and mechanisms. The... Sample PDF
Classic Cryptography
$37.50
Chapter 2
Information Assurance  (pages 15-32)
Manuel Mogollon
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in... Sample PDF
Information Assurance
$37.50
Chapter 3
Manuel Mogollon
Mathematics plays an important role in encryption, public-key, authentication, and digital signatures. Knowing certain basic math concepts such as... Sample PDF
Number Theory and Finite Fields
$37.50
Chapter 4
Manuel Mogollon
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement... Sample PDF
Confidentiality: Symmetric Encryption
$37.50
Chapter 5
Manuel Mogollon
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically... Sample PDF
Confidentiality: Asymmertic Encrypton
$37.50
Chapter 6
Manuel Mogollon
In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash... Sample PDF
Integrity and Authentication
$37.50
Chapter 7
Access Authentication  (pages 152-188)
Manuel Mogollon
Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication... Sample PDF
Access Authentication
$37.50
Chapter 8
Manuel Mogollon
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key... Sample PDF
Elliptic Curve Cryptograpy
$37.50
Chapter 9
Manuel Mogollon
In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its... Sample PDF
Certificates and Public Key Infrastructure
$37.50
Chapter 10
Electronic Mail Security  (pages 246-265)
Manuel Mogollon
In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto... Sample PDF
Electronic Mail Security
$37.50
Chapter 11
VPNS and IPSEC  (pages 266-299)
Manuel Mogollon
Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks... Sample PDF
VPNS and IPSEC
$37.50
Chapter 12
TLS, SSL, and SET  (pages 300-333)
Manuel Mogollon
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted... Sample PDF
TLS, SSL, and SET
$37.50
Chapter 13
Web Services Security  (pages 334-408)
Manuel Mogollon
A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running... Sample PDF
Web Services Security
$37.50
Chapter 14
Wireless Security  (pages 409-446)
Manuel Mogollon
The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the... Sample PDF
Wireless Security
$37.50
Glossary of Terms
About the Author