From the course: Learning Cryptography and Network Security
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Dissecting the Authentication Header
From the course: Learning Cryptography and Network Security
Dissecting the Authentication Header
An IPsec Authentication Header provides support for data integrity and authentication of IP packets. In this segment, we'll explain the role of the Authentication Header and how it protects data. When using IPsec, the Authentication Header provides connectionless support for data integrity and authentication of packets along with protection against replay attacks. The Authentication Header authenticates as much of the IP header as possible as well as any upper-level protocols. However, any fields that change during transit, such as the time to live value or hop count, cannot be authenticated. The Authentication Header can be used alone or with an Encapsulating Security Payload protocol and may be used in either transport or tunnel mode. This is an illustration of the Authentication Header format. When devices communicate with one another, they use the information found within the header. Let's talk about a few elements. Within this header, we see the security parameter index which is…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.