559556
44
Zoom out
Zoom in
Previous page
1/75
Next page
Asymmetrical Encryption Techniques
44 NetWAYS/ISDN – 3 Remote Access with NetWAYS/ISDN
IKE Phase 2
The goal of IKE Phase 2 is to negotiate the SAs for the encryp-
tion of actual user data. This negotiation is itself encrypted
based on the SA that was negotiated in Phase 1. The follow-
ing parameters are negotiated:
the IPsec transport protocol (AH and/or ESP)
the encryption algorithm for user data transmitted over
the VPN connection (DES, AES, or 3DES, for example)
the hash algorithm used to ensure the integrity of the
user data
the IPsec operating mode (Tunnel or Transport Mode)
the lifetime of the SA
the random key material for the encryption and authen-
tication algorithms
Once IKE negotiation has been completed, secure IPsec com-
munication begins.
Asymmetrical Encryption Techniques
Asymmetric encryption methods use a key pair rather than a
single key. A key pair consists of one public and one private
key. Data encrypted with one of these keys can only be de-
crypted with the other. The advantage over symmetrical
encryption methods is that no secret key needs to be ex-
changed between the communicating parties.
A popular application using asymmetric encryption is PGP
(Pretty Good Privacy), which is frequently used for e-mail en-
cryption. The recipient's public key is accessible to anyone,
and so can be used by the sender to encrypt an e-mail mes-
sage. The result is an encrypted message that can only be
decrypted using the recipient's secret key.
It is also possible to use the secret key for encryption, so
that only the corresponding public key can be used for de-
cryption. This is the method used to create digital signa-
tures. A hash digest of the original message is encrypted by
the author using the secret key, and attached to the mes-
sage. The signature can then be decrypted by anyone using
netways-e.book Seite 44 Freitag, 28. November 2003 3:51 15
44


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for AVM NetWAYS-ISDN at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of AVM NetWAYS-ISDN in the language / languages: English as an attachment in your email.

The manual is 1,35 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

Others manual(s) of AVM NetWAYS-ISDN

AVM NetWAYS-ISDN User Manual - German - 81 pages


The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info