The virtual private networks protocols: features of creation and perspective of development

Authors

  • Artem Zhylin Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,, Ukraine
  • Serhii Valovyi Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,, Ukraine
  • Dmytro Marynin Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,, Ukraine

DOI:

https://doi.org/10.20535/2411-1031.2017.5.2.136947

Keywords:

Virtual private networks, the crypto protocol, IPSec, PPTP, L2TP, TLS, tunneling, authentication, encryption.

Abstract

In this article, the analysis of the main protocols of the creation of the virtual private networks which are widely used in case of creation of the protected connections on networks of general purpose is carried out. Possible types of implementations of the virtual private networks are marked and examples of the modern telecommunication equipment which uses the virtual protected connections for information security which is transferred by open channels of communication are given. At the same time, it is certain that all leading telecommunication companies have the equipment for the creation of the protected virtual area networks. Characteristics of such main protocols as IPSec, by PPTP, L2TP and TLS are provided. Their structure is considered and analyzed, figures of the logical creation of each protocol and also their advantage and shortcomings are given. The list of cryptographic algorithms which are used in these protocols is provided. The analyzed protocols work at different levels of the open system interconnection model but have common features of creation and cryptographic algorithms which are used. Yes, each of the analyzed protocols has subprotocols which are responsible for tunneling, authentication, encryption, and support of the integrity of data. However, each of them contains the possible implementations of cryptographic algorithms. It is certain that perspective option of development the virtual private area networks technologies for information security which is the property of the state during its transfer over open channels of communication are used in an implementation of the virtual private area networks of cryptographic algorithms which are passed a State expertise. It can be an algorithm of block encryption of GSTU 7624: 2014, hashing algorithm GSTU 7564: 2014 and algorithm of the digital signature of GSTU 4145: 2002.

Author Biographies

Artem Zhylin, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

candidate of technical sciences,
associate professor of state
information resources security
academic department

Serhii Valovyi, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

cadet

Dmytro Marynin, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

cadet

References

RFC Editor. [Online]. Available: www.rfc-editor.org. Accessed on: Sept.14, 2017.

V.V. Maiorov, “Modern VPN-networks”. Scientific works КSТU, № 13, pp. 121-128, 2016.

І.І. Pаrhоmеnко, О.О. Кvаchuк, А.О. Vоsкоbоjnікоv, and G.V. Pоpоv, ”Tunneling as a way to protect corporate information”, Ukrainian Information Security Research Journal, Vol. 14, № 1, pp. 36-39, 2012.

doi: 10.18372/2410-7840.14.2059.

M.M. Braіlovskyy, T.V. Pogrebna, and O.V. Ptashok, “VPN networks and problems of their defence”, Telecommunications and Information Technologies, № 1, pp. 76-80, 2014.

Cisco. [Online]. Available: www.cisco.com. Accessed on: Sept.10, 2017.

Hewlett Packard Enterprise. [Online]. Available: https://www.hpe.com. Accessed on: Sept.10, 2017.

D-Link. [Online]. Available: http://www.dlink.ua. Accessed on: Sept.10, 2017.

K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn, “RFC 2637 Point-to-Point Tunneling Protocol (PPTP)”. [Online]. Available: https://tools.ietf.org/html/rfc2637. Accessed on: Sept.10, 2017.

G. Pall, and G. Zorn, “RFC 3078 Microsoft Point-To-Point Encryption (MPPE) Protocol”. March 2001. [Online]. Available: https://tools.ietf.org/html/rfc3078. Accessed on: Sept.10, 2017.

S. Kent, and K. Seo, “RFC 4301 Security Architecture for the Internet Protocol”. [Online]. Available: https://tools.ietf.org/html/rfc4301. Accessed on: Sept.10, 2017.

B. Patel, B. Aboba, W. Dixon, G. Zorn, and S. Booth, “RFC 3193 Securing L2TP using IPsec”. [Online]. Available: https://tools.ietf.org/html/rfc3193. Accessed on: Sept.10, 2017.

W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter. “RFC 2661 Layer Two Tunneling Protocol ”L2TP”. [Online]. Available: https://tools.ietf.org/html/rfc2661. Accessed on: Sept.10, 2017.

T. Dierks, and E. Rescorla. “RFC 5246 The Transport Layer Security (TLS) Protocol Version 1.2”. [Online]. Available: https://tools.ietf.org/html/rfc5246. Accessed on: Sept.10, 2017.

Published

2017-12-31

How to Cite

Zhylin, A., Valovyi, S., & Marynin, D. (2017). The virtual private networks protocols: features of creation and perspective of development. Collection "Information Technology and Security", 5(2), 33–42. https://doi.org/10.20535/2411-1031.2017.5.2.136947

Issue

Section

NETWORK AND APPLICATION SECURITY