Copyright

VPN Encryption: Types & Protocols

Instructor: David Whitsett

David has taught computer applications, computer fundamentals, computer networking, and marketing at the college level. He has a MBA in marketing.

VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.

What is VPN Encryption?

In order for basic communications to happen, there have to be some ground rules. When two people have a conversation, they typically begin with a greeting. During the discussion, one person talks and the other person listens. If they don't want an eavesdropper understanding what they're saying, they can speak using code words. If they're really concerned about privacy, they can go somewhere private.

A Virtual Private Network (VPN) allows for a private connection through a public network like the Internet. The network devices on either end of the connection build a shielded tunnel which limits access to the communications session and they also encrypt (think scramble) the data, so only the two parties involved in the conversation can understand what's being said.

Types of VPNs and Functionality

Here's a real world example: you're a business person, sitting in the airport after a long week on the road. You use the airport wireless Internet connection (which may not be very secure) to file your weekly report with your company. You have VPN client software on your laptop so when you log into your company network via the airport wireless connection, your data is transmitted safely and securely. This type of VPN setup is known as a remote access VPN. Another type of VPN configuration is a site-to-site VPN, used to allow two remote company sites to securely communicate with each other via the Internet.

Back to our conversation example, when two people talk, they will often begin with a greeting and in VPN terminology, that's known as authentication. Within VPN authentication, the identities of the two parties in the session are verified so that the secure conversation can begin. The other main element of a VPN is encryption, which is translating plain text into a secret code which can only be understood using the proper key. Authentication and encryption are used together in VPNs because encryption without authentication is unsecure (imagine handing your secured package to the wrong person because you didn't check their ID). To sum up - we make sure we know who we're talking to, we set up a private channel for our conversation, and in case somebody is listening in, we speak in code.

Eavesdropping the old school way
Old time eavesdropping

To unlock this lesson you must be a Study.com Member.
Create your account

Register for a free trial

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Free 5-day trial

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it free for 5 days!
Create an account
Support