VPN NEWS | VPN GUIDES | WEB HOST INDUSTRY REVIEW
find vpn - virtual private network solutions  
Find VPN: BTInet | DataSide

FIND VPN for Tuesday, June 23, 2009  

What Is VPN Encryption?

To ensure that your VPN is secure, limiting user access is only one piece of the equation; once the user is authenticated, the data itself needs to be protected as well. Without a mechanism to provide data privacy, information flowing through the channel will be transmitted in clear text, which can easily be viewed or stolen with a packet sniffer. Most modern VPNs use some kind of cryptosystem, in order to scramble data into cipher text, which is then decrypted into readable text by the recipient.

The type of encryption available is highly varied. However, there are two basic cryptographic systems: symmetric and asymmetric. Symmetric cryptography tends to be much faster to deploy, and are commonly used to exchange large packets of data between two parties who know each other, and use the same private key to access the data.

Asymmetric systems are far more complex and require a pair of mathematically related keys - one public and one private - in order to be accessed. This method is often used for smaller, more sensitive packets of data, or during the authentication process.

As a general rule, longer encryption keys are the strongest. The bit length of the algorithm determines the amount of effort required to crack the system using a "brute force" attack, where computers are combined to calculate all the possible key permutations. Currently, some countries have governmental restrictions on encryption strength in a VPN, such as Japan, which may require multiple key lengths in an international tunneling solution.

In the United States, many different encryption schemes are available. The Data Encryption Standard (DES) is a 20-year old, thoroughly tested system that uses a complex symmetric algorithm, although it is considered less secure than recent systems. Triple DES and 3DES use multiple passes of the original version to increase the key length, thus strengthening security. Other methods, like Encapsulated Security Payload or Outer Cipher Block Chaining, can be used to further scramble the data, and maintain or verify its integrity. Although an unbreakable algorithm has yet to be developed, a sophisticated encryption system will greatly minimize the chance of any security gaps.

Most VPN devices, whether hardware- or software-based, use some sort of encryption scheme, and may vary in cost according to the strength of the system used. There are many different products for encrypting tunnels, from trusted companies like Check Point Software, Digital Equipment Corp., Morning Star Technologies, and PSINet, for example. It is important to keep in mind that adding strong third-party encryption to your VPN can slow down transmission speeds.

Some products also feature selective encryption, allowing administrators to decide whether or not to encrypt a subset of traffic, based on the data being accessed. In some cases, you may choose to apply a tougher algorithm to particularly important packets coming off the server. The combination of selective encryption and access control would allow the user to create a specific encrypted session to the VPN application of choice, ensuring the safety of the data as well as guaranteeing network security.

VPN News Headlines




FREE Whitepapers on Leading VPN solution: Fast & Secure - Download them here!

VPN GUIDES, VIRTUAL PRIVATE NETWORK

Get information on VPN, VPN encryption and network security. Our VPN guides provide the information you need about VPN.

Frequently Asked Questions About VPN's
Here are some of the more common questions we receive about VPNs.


What is a Virtual Private Network or VPN?
In a sense, VPNs are similar to wide area networks (WAN) or a securely encrypted tunnel, but that they are able to use public networks like the Internet rather than expensive, private leased lines.


How Do I Choose a VPN Solution
Deciding whether a VPN solution is right for your enterprise, and how you should go about implementing one.


How Does a VPN Actually Work?
The current generation of VPNs is an advanced combination of tunneling, encryption, authentication and access control technologies and services ...


Introduction to VoIP
Simply put, voice over IP (VoIP) technology, or IP telephony, as it is often called, is a system for transmitting telephone calls over data networks.


Benefits of a Virtual Private Network
There are a number of reasons to set up a VPN for remote access, but the biggest selling point by far is the potential cost savings.


Explaining VPN Security
The key word in "virtual private networks" is private. The last thing a business wants, is to have sensitive corporate information end up in the hands of the competition.


About VPN Encryption
Most modern VPNs use some kind of cryptosystem, in order to scramble data into cipher text, which is then decrypted into readable text by the recipient.


Introduction to FreeS/WAN
FreeS/WAN is a Linux implementation of the IPSec security protocol, the basis for VPN technology ...


Explaining Multi-protocol Label Switching (MPLS)
MPLS is not designed to replace IP. Rather, it is designed to add a set of rules to IP so that traffic can be classified, marked and policed ...


 
Privacy | About Us   Copyright 2007 Web Host Industry Review, Inc.