Análisis e implementación del protocolo de seguridad ipsec (internet protocolo security) en redes de datos basadas en ipv6, estableciendo claves de cifrado, en la empresa bypas comunicaciones, ubicada en la ciudad de Quito, Provincia De Pichincha

Nowadays communications have gone through a rapid advance and proof of this one’s that the worldwide is interconnected; protocols play an important role in communication and especially in the receipt of information sent. Pv6 is sixth version of the Internet Protocol, it’s responsible for directing a...

詳細記述

保存先:
書誌詳細
第一著者: Barahona Jami, Elvia Lucia (author)
フォーマット: bachelorThesis
言語:spa
出版事項: 2014
主題:
オンライン・アクセス:http://repositorio.utc.edu.ec/handle/27000/4924
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
その他の書誌記述
要約:Nowadays communications have gone through a rapid advance and proof of this one’s that the worldwide is interconnected; protocols play an important role in communication and especially in the receipt of information sent. Pv6 is sixth version of the Internet Protocol, it’s responsible for directing and guiding packets in the network, it’s designed in the 70's with the goal of interconnect networks. This new version of the Internet Protocol is intended to replace the IPv4 standard, at the same time it has an access limit network address, which prevents network increasing worldwide. IPsec protocols operate at the network space of the OSI model. Other Internet security protocols in widespread use, such as SSL, TLS and SSH operate in the transport layer (layer 4 of the OSI model) up. This makes IPsec more flexible, as it can be used to protect layer 4 protocols, including TCP and UDP protocols used transport layer. An important advantage of IPsec against SSL and other methods that operate at higher layers, is that an application can use IPsec shouldn’t make any changes, while for using SSL and other higher level protocols, applications have to be modified their code. The IP security architecture uses the concept of security association (SA) as the basis for building security functions into IP. A security association is simply the parcel of algorithms and parameters (such as keys) that is being used to encrypt and authenticate a particular flow in one direction. Thus, in normal traffic bidirectional flows are secured by a pair of SA. The final decision of the encryption and authentication algorithms (from a defined list) corresponds to the IPsec administrator.