IPSec architecture

User Generated

gurtvsg8

Computer Science

Description

In this assignment, you will research and learn about the Internet protocol security (IPSec). You will then use what you have learned to answer some specific questions about the application of this architecture. Research the following using the library and/or the Internet.

  • IPSec architecture
  • Authentication header (AH) protocol
  • Encapsulating security payload (ESP) protocol

Provide a 1-2-page paper that responds to the following questions.

  • The IPSec architecture document states that when 2 transport mode security associations (SAs) are bundled to allow both AH and ESP protocols on the same end-to-end flow, only 1 ordering of security protocols seems appropriate: performing the ESP protocols before performing the AH protocol. Why is this approach recommended rather than authentication before encryption?
  • In the secure sockets layer (SSL) and transport layer security (TLS), why is there a separate change cipher spec protocol rather than including a change_cipher_spec message in the handshake protocol?

Be sure to document your references using APA format.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached. Let me know if you need edits.

Running head: IP SECURITY ARCHITECTURE

IP Security Architecture
Student’s Name
Name of Course
Instructor’s Name

1

IP SECURITY ARCHITECTURE

2
IP Security Architecture

The primary reason why the Encapsulating Security Payload (ESP) is performed before
the Authentication Header (AH) is because it allows parallel processing of data packets at the
receiving end. It also enhances rapid detection as well as the rejection of bogus data pa...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags