Internet Protocol Security as the Network Cryptography System

Authors

  • Haryanto  Faculty of Engineering, Universitas Pembanguan Panca Budi, Medan, Indonesia
  • Andysah Putera Utama Siahaan  Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia Department of Health Information,, Akademi Perekam Medik dan Infokes Imelda, Medan, Indonesia
  • Robbi Rahim  Ph.D. Student of School of Computer and Communication Engineering, Universiti Malysia Perlis, Kangar, Malaysia
  • Mesran  Department of Computer Engineering, STMIK Budi Darma, Medan, Indonesia

Keywords:

Network Security, IP Security, Cryptography

Abstract

Internet Protocol Security (IP Security) is a security protocol that serves to secure information in the event of an exchange on the internet. It happens if there is a connection between private IP and public IP. This protocol will exchange packets on the IP layer safely. It provides two types of encryption options, transport, and tunnel. Transport mode will encrypt the data section without changing the packet header. The algorithm used to encrypt data is a symmetric cryptography algorithm. This protocol authenticates and encrypts every packet from a data transmission session. Also, it can generate keys between the sender and the recipient at the first time it is activated and can negotiate the cryptographic keys that will be used during the session. IP Security is an end-to-end cryptosystem that works at the internet layer of the Internet Protocol Suite. The protocol serves to protect the data flow in host-to-host, network-to-network, and network-to-host as well.

References

  1. N. Ferguson and B. Schneier, "A Cryptographic Evaluation of IPSec, Counterpane," Counterpane Internet Security, Inc..
  2. B. H. Kang and M. O. Balitanas, "Vulnerabilities of VPN using IPSec and Defensive Measures," International Journal of Advanced Science and Technology, vol. 8, no. 7, pp. 9-18, 2009.
  3. H. Alshamrani, "Internet Protocol Security (IPSec) Mechanisms," International Journal of Scientific & Engineering Research, vol. 5, no. 5, pp. 85-87, 2014.
  4. P. K. Singh and P. P. Singh, "A Novel Approach for the Analysis & Issues of IPsec VPN," International Journal of Science and Research, vol. 2, no. 7, pp. 187-189, 2013.
  5. A. Singh and M. Gahlawat, "Internet Protocol Security (IPSec)," International Journal of Computer Networks and Wireless Communications, vol. 2, no. 6, pp. 717-721, 2012.
  6. T. Sharma and S. Shiwani, "Statistical Results of IPSec in IPv6 Networks," International Journal of Computer Applications, vol. 79, no. 2, pp. 15-19, 2013.
  7. R. Rahim and A. Ikhwan, "Study of Three Pass Protocol on Data Security," International Journal of Science and Research, vol. 5, no. 11, pp. 102-104, 2016.
  8. A. Lubis and A. P. U. S. , "NetworkForensic Application in General Cases," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 41-44, 2016.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Haryanto, Andysah Putera Utama Siahaan, Robbi Rahim, Mesran, " Internet Protocol Security as the Network Cryptography System, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.223-226, July-August-2017.