As mentioned before at our previous lectures, the main objective for any security model to achieve the three essential targets of confidentiality, data integrity & authentication.
So, Virtual private network “VPN” is considered as a security deployment framework.
What is a VPN?
VPN allows a logical connection between two devices over a wide-area network “WAN” connection using the Internet as a transport mechanism.
Types of VPNs :
There are two major categories into which VPNs could be placed :-
■ Remote-access VPNs: Some users might need to build a VPN connection from their individual computer to the corporate headquarters, Remote-access VPNs can use IPsec or Secure Shell (SSL) technologies for their VPN.
■ Site-to-site VPNs: The other main VPN implementation is by companies that may have two or more sites that they want to connect securely together, so that each site can communicate with the other site or sites. This implementation is called a site-to-site VPN. Site-to-site VPNs traditionally use a collection of VPN technologies called IPsec.
There are a two technology types to implement a VPN with its security features.
■ IPsec: Implements security of IP packets at Layer 3 of the OSI model, and can be used for site-to-site VPNs and remote-access VPNs.
■ SSL: Secure Sockets Layer implements security of TCP sessions over encrypted SSL tunnels of the OSI model, and it can be used for remote-access VPNs (as well as being used to securely visit a web server that supports it via HTTPS).
Cryptography Basic Components
We are about to have a look about the three essential targets for any security model “confidentiality, data integrity & authentication” before going to discuss the cryptography components.
it means that only the intended parties can understand the data that is sent, using encryption Algorithms to prevent the theft of data.
■ Data Integrity
It is about ensure that data is not tampered or altered while transmission, using a hashing algorithm to make sure the sent data is accurate from end to end.
It confirms the identity of the host sending data, using bother pre-shared keys or RSA Digital signatures to can authenticate the peer at the other end of the VPN tunnel.
All of us now know that confidentiality is a function of encryption, data integrity is a function of hashing, and authentication is the process of proving the identity of the other side of the tunnel. Now it is time to take a look at how those methods are implemented and the choices you have for each.
Encryption is the process of converting a plain-text message into cipher-text which can be decoded back into the original message, An encryption algorithm along with a key is used in the encryption and decryption of data.
The type and length of the keys depend upon the encryption algorithm and the amount of security needed. In the symmetric encryption a single key is used to encrypt the data and decrypt the data.
In the asymmetric encryption the encryption key and the decryption key are different. One is a public key by which the sender can encrypt the message and the other is a private key by which a recipient can decrypt the message.
Symmetric encryption Algorithms
Symmetric encryption algorithms can be divided into stream ciphers and block ciphers. Stream ciphers encrypt a single bit of plaintext at a time, whereas block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit.
Common examples of symmetric encryption algorithms include the following:
• Advanced Encryption Standard (AES) : It is also known as Rijndael, and it is a block cipher.
• Digital Encryption Standard (DES) : It is a block cipher with 64-bit block size that uses using a 56-bit key.
• Triple Digital Encryption Standard (3DES) : It uses a 64-bit key, the idea behind Triple DES is to improve the security of DES by applying DES encryption three times using three different keys.
• Blowfish : Blowfish has a 64-bit block size and a variable key length – from 32 bits to 448 bits.
• International Data Encryption Algorithm (IDEA) : it uses a 128 bit key. This key length makes it impossible to break by simply trying every key.
Asymmetric encryption Algorithms
Asymmetric algorithms (public key algorithms) use different keys for encryption and decryption, Instead of using the same key for encryption and decryption, we use two different keys that mathematically work together as a pair. Let’s call these keys the public key and private key.
Examples of asymmetrical algorithms include the following:
• RSA : Rivest-Shamir-Adleman is the most commonly used public key encryption algorithm, The key length may be from 512 to 2048, and a minimum size for good security is at least 1024.
• Diffie-Hellman (DH) : DH is an asymmetrical algorithm that allows two devices to negotiate and establish shared secret keying material (keys) over an untrusted network, The interesting thing about DH is that although the algorithm itself is asymmetrical, the keys generated by the exchange are symmetrical keys that can then be
used with symmetrical algorithms.
• Digital Signature Algorithm (DSA)
Finally, Asymmetrical algorithms require more CPU processing power than a symmetrical algorithm, while Asymmetrical algorithms are more secure than symmetrical ones.
We will continue at our next lecture the rest of Cryptography Basic Components, such as the Hashing Algorithm and the used techniques to achieve the authentication also.
By: Hatem Farag | CCIE#54446