Microgaming Web Products and Internet Protocol Security

Microgaming Web Products and Internet Protocol Security

ipsec for Microgaming

Being a company, which provides various web products (for online gambling market), Microgaming can’t ignore security issues. It works with different types of gamblers’ sensitive data and that’s why this enterprise provides all necessary protective measures, including, of course, Internet Protocols Security.
Each of its web products is well-prepared to process the communication logs, which are required by the standards of various monitoring authorities.
Therefore, Microgaming projects are considered reliable and completely safe for playing.

Internet Protocol Security in Microgaming

This kind of protection is implemented for creating the secure networks for a trusty communication. It includes two types of tools:
– AH (Authentication Header) that verifies the info;
– ESP or Encapsulating Security Payload that serves for verifying the sender of the files and encoding received data.
The essential info needed for these utilities is embedded in the packet’s header. Usually, some key protocols are chosen (e.g. ISAKMP/Oakley).

IPsec Protocols

This term can be defined as a communication log for the network that provides authentication and ciphering of the data. Web documents of this kind also include statements that allow a verified communication between two parties and regulate the key exchange. So, it secures host-to-host, network-network, and network-host info torrents.
For maintaining a reliable protection, Microgaming IPsec contains various cryptographic services and other methods like some levels of authentication, DI (data integrity), ciphering, and etc.
The main advantage of it is being the only option of automatic protecting the app traffic going through IP net.

Encapsulating Security Payloads (ESP)

It is a part of IPsec that is responsible for the following matters:
– Defining the origin of the receiving requests;
– Info consistency;
– Keeping packets confidential.
Different modes of ESP work in various manners. Thus, comparing to AH, it can not provide the complete packet’s verification and its integrity in the transport status. However, during the Tunnel mode, it maintains the internal protection for the whole IP file, leaving behind only an outer header without safeguarding.

Payload Data

PD refers to content (from the initial IP packet), which is secured with Initialization Vector (as an encryption key chain). Next Header serves as an indication of this kind of data.

Pad Length

It can be described as the range of padding (measured in bytes).

Security Parameters Index

SPI has a role of some value that is assigned (combined with the IP address of the endpoint) to secAssociation of the receiver.

Padding

This element is used for enlarging the length of PD to the extent fitting the size of the ciphering block.

Sequence Number

SN works as a tool that adds 1 figure for every sent packet to oppose the replay hacking.

Integrity Check Value

This value may vary depending on what it is applied to. So it has a particular padding to adjust the field to 8-byte limit for IPv6 (4-byte for IPv4).

Next Header

NH value can be found in the directory of the IP protocol numbers.

Authentication Headers (AH)

AH are another part of IPsec. They are for ensuring that the permanent IP packets consistency and the spotting data origins are maintained. In addition, they might be capable of protecting from replay aggression.

Payload Len

The size of it is formalized as 4-byte units – 2. However, for IPv6, the length should be a multiple of 8 bytes.

Next Header

It indicates which of the top-layer protocols is under protection.

Sequence Number

Those numbers can’t be reused multiple times, as they ought to be regenerated each time after the replay attack.

Other

Integrity Check Value and Security Parameters Index – the same as for ESP.

Security Associations (SA)

Microgaming and ipsec

The structure of IP security has a conception of an SA. It plays a role of a foundation for encrusting safety duties into IP. This is a bunch of sequences and key chains, used for encoding and verifying the particular traffic. Usually, a couple of secAssociations are used for securing flows.

Tunnel and Transp

In Tunnel mode the whole IP file is encoded and authenticated. Then the process of encapsulating starts with a new IP header and packet. This procedure is used for such connections as routers to websites, a distant user access, and a private chatting.

In Transp mode just payload is to be ciphered. The current data flows perfectly, as there is no modification allowed concerning IP addresses. In this case, all layers are guarded by a hash.

Algorithms

Microgaming uses different algorithms for creating a perfect encryption system that enhances the level of safety. In IPsec the next ones are commonly used: HMAC-SHA1/SHA2 (integ/authent processes), Triple DES-CBC (for maintaining secrecy), AES-GCM (it has advantages combined with the mentioned algorithms).