I need some assistance with these assignment. ipsec and cryptography Thank you in advance for the help! This is because. the security offered by the IPsec can be made transparent to final users. IPsec is very vital since it offers numerous solutions to virtual private networking (VPN), by giving communication security against untrusted network like the internet. Cryptography refers to the change of plaintext information into a coded form. . The aim of cryptography is to offer the necessary security and frontier access to private information.
There are numerous functions that the IPsec performs. First, the IPsec is used for data confidentiality. The function is achieved by the IP sec sender encrypting the data packets prior to sending them to another network. The second function is data integrity. This requires the IPsec receiver to authenticate the data packets received from the IPsec sender in order to guarantee the safety of the received data packets. The third function of IPsec is data authentication. This enables the IP sec receiver to confirm the origin of the sent IPsec packets, although the success of this function relies on the data service. The replay function is the fourth function played by the IPSec (Pachghare, 2009).
In the execution of this function the IP sec receiver is capable of sensing and eliminating the repeated packets. The above services are offered at the IP layer, thus they can be employed at any upper-layer protocol. Such as TCP, UDP, and ICMP, just to mention a few. The IP DOI is also responsible for the provision of the IP compression. this is achieved through the encryption that is done in the IPsec. This hinders sufficient compression by the lower protocol layers (Elkelany, 2002).
At the IP layer, the IPsec offers the necessary security that allows the system to choose the suitable security protocols, establish the algorithms to be employed for the task and reorganize the cryptographic keys needed to offer the application. IPsec is capable of providing sufficient security to more than one path between a protection gateway and host (Pachghare, 2009). .  .
IP sec can establish areas that are susceptible to attacks, thus providing the necessary security. This is achieved by configuring admission lists that are further interfaced in the crypto map sets (Pachghare, 2009).  .