Secure Connection in VPN using AES

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 04 | Apr -2017

p-ISSN: 2395-0072

www.irjet.net

Secure Connection in VPN using AES Mrs. Swapna1, G .Sri Naga Sri2, G. Nikila Santha Kumari3, N. Sravani Devi4 1Asst.

Professor, Dept. of CSE & IT engineering, GPCEW, A.P, India 2Student, Dept. of IT engineering, GPCEW, A.P, India 3Student, Dept. of IT engineering, GPCEW, A.P, India 4Student, Dept. of IT engineering, GPCEW, A.P, India

-----------------------------------------------------------------***--------------------------------------------------------------Abstract - Virtual Private network (VPN) provides one

Site-to-Site Intranet-based VPN: The connection established in or between a LAN Networks. It links headquarters, remote offices, and branch offices to an internal network over a shared infrastructure using dedicated connections. PPTP (Point-to-Point Tunnelling Protocol) – It is one of the protocols VPN uses for establishing tunnelling. It allows you to implement your own VPN very quickly, and is compatible with most mobile devices. This protocol encrypts data and puts it into packets by creating a tunnel that provides secured communication over LAN or WAN. Because of the encapsulation of that data, encryption and required authentication, it is safe to transmit that data even over public networks like internet. PPTP is based on authentication, encryption and PPP negotiation It supports 40-bit and 128-bit encryption and will use any authentication scheme supported by PPP. This protocol encrypts data and puts it into packets by creating a tunnel that provides secured communication over LAN or WAN. Because of the encapsulation of that data, encryption and required authentication, it is safe to transmit that data even over public networks like internet The intended use of this protocol is to provide security levels and remote access levels comparable with typical VPN products The PPTP tunnel is instantiated by communication to the peer on TCP port

of the most promising services for network providers.Using a VPN when connected to the internet will hide your personal IP address and assign you one based on the server you are connected to. Once you connect to a VPN, you are essentially creating a tunnel between your device and the VPN server you have chosen, encrypting any data sent or received. Virtual private networks (VPNs) use advanced encryption techniques like AES(advanced encryption standard) and tunneling to permit organizations to establish secure, end-to-end, private network connections over thirdparty networks such as the Internet rather than using separate Leased lines. The advantage with the VPN technology is, using existing Internet connection we can communicate between two remote systems using builtin Windows VPN. Keywords - tunneling, cipher text, plain text, hash function, encryption, authentication.

1. INTRODUCTION Generally VPN is very expensive to use, it requires a VPN provider to establish that network through using leased lines or to our routers. However we don’t need such requirement always if connection is between two individuals or more. We can build more easily by using built in VPN provided in Android, Windows etc through internet. Virtual Private Network which has proved itself to be lot reliable in transferring data between remote places via a secured network thus paving way for data security. The ideas of implementing a VPN connection featuring the setting up a server and client on individual system who want to communicate. The data will be transferred using AES encryption mechanism with HMAC (Hash based Message Authentication Code) which checks same message received on receiver end.

The data transmitted between VPN network systems implements AES for encryption and decryption, HMAC for authentication. By using ‘Java Crypto Package’, code is implemented for AES and HMAC.

2.1 AES (Advanced algorithm:

VPN is established using built in vpn of windows between communicated systems.VPN has two types, siteto-site and remote access. We are setting up site-to-site vpn using PPTP.

|

Impact Factor value: 5.181

Standard)

AES algorithm is called as Rijndael algorithm. This algorithm is a block cipher intended to replace DES for commercial application It has 10 rounds for 128-bit keys,12 rounds for 192-bit keys, and 14 rounds for 256-bit keys.

2. IMPLEMENTATION

© 2017, IRJET

Encryption

|

ISO 9001:2008 Certified Journal

| Page 949


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.