The virtual private networks protocols: features of creation and perspective of development
Autor: | Dmytro Marynin, Serhii Valovyi, Artem Zhylin |
---|---|
Rok vydání: | 2017 |
Předmět: |
Marketing
Pharmacology Organizational Behavior and Human Resource Management business.industry computer.internet_protocol Computer science Strategy and Management Hash function Pharmaceutical Science Cryptography Information security Encryption OSI model Digital signature IPsec Drug Discovery business computer Computer network Private network |
Zdroj: | Collection "Information technology and security". 5:33-42 |
ISSN: | 2518-1033 2411-1031 |
DOI: | 10.20535/2411-1031.2017.5.2.136947 |
Popis: | In this article, the analysis of the main protocols of the creation of the virtual private networks which are widely used in case of creation of the protected connections on networks of general purpose is carried out. Possible types of implementations of the virtual private networks are marked and examples of the modern telecommunication equipment which uses the virtual protected connections for information security which is transferred by open channels of communication are given. At the same time, it is certain that all leading telecommunication companies have the equipment for the creation of the protected virtual area networks. Characteristics of such main protocols as IPSec, by PPTP, L2TP and TLS are provided. Their structure is considered and analyzed, figures of the logical creation of each protocol and also their advantage and shortcomings are given. The list of cryptographic algorithms which are used in these protocols is provided. The analyzed protocols work at different levels of the open system interconnection model but have common features of creation and cryptographic algorithms which are used. Yes, each of the analyzed protocols has subprotocols which are responsible for tunneling, authentication, encryption, and support of the integrity of data. However, each of them contains the possible implementations of cryptographic algorithms. It is certain that perspective option of development the virtual private area networks technologies for information security which is the property of the state during its transfer over open channels of communication are used in an implementation of the virtual private area networks of cryptographic algorithms which are passed a State expertise. It can be an algorithm of block encryption of GSTU 7624: 2014, hashing algorithm GSTU 7564: 2014 and algorithm of the digital signature of GSTU 4145: 2002. |
Databáze: | OpenAIRE |
Externí odkaz: |