Cryptographic Tunneling and the OSI Model Write a paper consisting of 500-1,000
ID: 3701925 • Letter: C
Question
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lesson).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
Explanation / Answer
Answer)
The security effects of Cryptographic tunneling in OSI Model are as follows:
A security networking such as Open System Interconnect (OSI) is much needed for a secure accessibility to the company’s data. The OSI Model Layers accessibility to the network and its resources needs authentication, authorization and accounting protocol services.
Every layer has the above mentioned protocol services implemented in it.
By the use of encapsulation protocols or cryptographic tunneling we get a secure authentication while sending any messages or information. This technique would help protect the data’s and proprietary information by “Signing” strategy which would allow sending information only for the signing party which would make the data encrypted which is achieved by using virtual private network (VPN).
And again sending a message would require a key to help safeguard the key to make sure of the safety and security of any information from the intruder.
Decrypting an encrypted data also would require a key to prevent unauthorized access to the data’s during information exchange.
The cryptographic tunneling protocols encapsulates the data packets in the IP Packets and assigns a particular signature to the data that is sent and provides authentication before accessibility to the message sent through data packets.
The protocols used are Protocol Security (IPSec), Point-to-Point Tunneling protocol (PPTP), Secure sockets layer (SSL) and Layer2 Tunneling protocol.
IPSec is the open standard that has a secure protocol to the IP Connection. This takes the charge to authenticate the data of all data packets within the IP Traffic This protocol helps in encryption and authentication for non-IP Traffic which concurrently operates with L2TP. This operates at the network Layer and can be implemented on devices communicating over the internet protocol.
SSL Protocol is the encryption protocol that is done at the presentation layer. The SSL protocol acts as a cryptographic solution for the protection of data during transit. This is needed to protect the data that is being transferred between a web browser and a server. The client and web server pass the data back and forth using TCP. SSL is mostly used in E-commerce as it allows the entities to communicate securely and without any congestion.
L2TP protocol is responsible for the data encryption in conjunction with other relevant protocols and encryption mechanisms like PPP. It provides the data tunneling when PPP connects to the public IP. This protocol also allows non-IP protocols to get in through the VPN tunnel’s for a safe and secure transfer of data. This protocol works mostly in data link layer and helps to encrypting the data from associated machines and systems such as ATM and frame relay.
Hope this answer helps. :) Always happy to help. :)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.