Network Security Unit 3
Network Security Unit 3
Architecture
Unit : 3
IPsec Architecture Overview
Key Management
What is IPsec (Internet
Protocol Security)?
IPsec
Architectur Goals of IPsec
e Overview
Benefits of using IPsec
• IPsec, or Internet Protocol Security,
is a suite of protocols that provide
cryptographic security for
IPsec communication across an IP
network.
Architecture • It essentially acts as a shield for
Overview your data, protecting it from
unauthorized access and
modification as it travels between
two endpoints.
1. Confidentiality: Ensures only authorized parties
can access the content of your data. IPsec achieves
this through encryption, scrambling the data into an
unreadable format.
2. Integrity: Guarantees that data hasn't been
tampered with during transmission. IPsec uses
cryptographic hashing to create a fingerprint of the
Types of SAs
Components of an SA
Lifetime: Each SA has a predefined duration during which it remains valid. This helps maintain security by
periodically refreshing the keys.
Traffic direction (inbound/outbound): An SA is directional, meaning it applies to data flowing in one specific
direction (incoming or outgoing) between the two devices. For bi-directional secure communication, typically two
SAs are established - one for inbound traffic and another for outbound traffic.
Authentication
Header (AH)
Purpose of AH
Benefits of using AH
• Purpose of ESP
• How ESP works
• Encrypting packet payload and header
• Benefits of using ESP
• Comparison of ESP vs AH
Introduction:
Encapsulating Security Payload (ESP) is another core protocol within IPsec.
Unlike AH, which focuses on data integrity and authentication, ESP offers a more comprehensive
security solution that includes confidentiality, integrity, and authentication.
It acts like a secure envelope, protecting the contents and verifying the sender and recipient.
ESP is a core IPsec protocol that provides comprehensive security, including confidentiality,
integrity, and authentication.
Purpose of ESP
Confidentiality: ESP encrypts the entire data payload of the packet, scrambling
the content and making it unreadable to anyone who doesn't possess the
decryption key.
Data Integrity: Similar to AH, ESP uses a cryptographic hash to ensure data
hasn't been tampered with during transmission.
Feature AH ESP