You are on page 1of 1

IP Security

Umber Saba (10-CP-32) Qurat-ul-Ain Ali(10-CP-31) Aysha(10-CP-71)


Engr .Romana Farhan
University Of Engineering and Technology Taxila

Overview:
IP Security is used to transfer
data securely over unprotected
networks like Internet.

Services:

Connectionless integrity
Data origin authentication
Confidentiality (Encryption)
Access control

IPSecurity Protocols:
Authentication Header (AH)
Encapsulating Security
Payload (ESP)

Processing Types:
Outbound IP Processing.
Inbound IP Processing

Modes:
Tunnel Mode

Transport Mode

Benefits:
Operates at the network
layer
An Internet standard
Extensible hash and
encryption algorithms

Limitations:
Complex Configuration
Performance / Processing
Overhead
NAT incompatibilities

Current areas of research:


Stronger encryption and authentication algorithms.
Better Public Key Infrastructure to make it simple, less
complex and easy to manage and more secure.
Security with non IP protocols like Fiber channel.

You might also like