METHODS AND ALGORITHMS FOR BUILDING SECURE VIRTUAL PRIVATE NETWORKS

Authors

  • Muratov Murat Xamroyevich¹, Odinayev Jonibek Khoshim ugli² ¹Master’s student, 2nd year, “University of Management and Future Technologies,” Tashkent, ²Master’s student, 2nd year, “University of Management and Future Technologies,” Tashkent,

Keywords:

VPN, encryption, security, algorithms, OpenVPN, WireGuard, authentication.

Abstract

This article analyzes the fundamental concepts of Virtual Private Network (VPN) technology, its construction methods, and algorithms ensuring security. VPN technology is used to provide encrypted and protected connections over the Internet. The article discusses various VPN protocols such as PPTP, L2TP, OpenVPN, and WireGuard, as well as encryption algorithms including AES, Blowfish, and ChaCha20. The security and efficiency aspects of VPN technologies are analyzed, and modern solutions are recommended.

References

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson.

Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.

Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach. Pearson.

RFC 5246 - The Transport Layer Security (TLS) Protocol.

RFC 8410 - Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure.

OpenVPN Documentation - https://openvpn.net

WireGuard Documentation - https://www.wireguard.com

Downloads

Published

2025-11-11

How to Cite

Muratov Murat Xamroyevich¹, Odinayev Jonibek Khoshim ugli². (2025). METHODS AND ALGORITHMS FOR BUILDING SECURE VIRTUAL PRIVATE NETWORKS. Ethiopian International Journal of Multidisciplinary Research, 12(11), 207–211. Retrieved from https://eijmr.org/index.php/eijmr/article/view/3883