z-logo
open-access-imgOpen Access
Virtual Private Network: Encryption Methodologies and Distinctive Categories
Author(s) -
Abhay Patil
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.37731
Subject(s) - encryption , private network , computer security , authentication (law) , computer science , shields , computer network , private information retrieval , engineering , electromagnetic shielding , electrical engineering
A VPN association camouflages your information traffic on the web and shields it from outside access. The decoded information can be seen by any individual who has network access and needs to see it. With a VPN, programmers and cyber criminals can't bypass this information. The proposed paper portrays the methodology of the working of Virtual Private Network-to-network associations along with its different types based on the deployments. The encryption is discussed which are essentially required during the creation of the safe passaging/tunnelling. Keywords: VPN, ISP, VPDN, Tunnelling, Authentication

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here