Shiva's Blog

Internet Protocol Security

Internet Protocol Security

IPSec is a collection of communication rules or protocols used to establish secure network connections. IPSec enhances the protocol security by introducing encryption and authentication. The encryption happens at the source and then decryption happens at the destination.

There are two core protocols in IPSec, depending on the policy:

IPSec can be used in two modes:

Internet key Exchange:

Internet keys are the methods of validating the devices, data or services with in a network, in an organization keys are used in order to verify communications between two devices, or even to initiate the connections. Whereas IKE is the protocol used to establish the communication and provide to exchange key between two devices over any network. The key Exchange can be done in to ways:

  1. Manual Key Exchange: Manual key exchange is a process which is conducted manually by the system administrator. This can be possible in a small organization.
  2. Automated key exchange: Unlike manual automated key exchange is an automated process, where the keys will be created or generated based on demand or requirement. This is mostly used in a larger organization

There are two phases of Internet Key Exchange (IKE):

IKE Phase - 1: In Phase 1 there will be two devices sender and receiver, at this phase the sender device initiate the communication with the security services such as encryption algorithm, authentication algorithm, hash function, etcs. Then the sender and receiver will form an association with each other and create a ISAKMP tunnel.

IKE Phase - 2: After the ISAKMP tunnel has been established in phase 1, the devices move to phase two. Which is very prompt and the devices exchange and negotiate the security associations and services between the devices. The devices will choose which protocol (AH and /or ESP) and which algorithm to use.