Ike; Encryption Algorithms; Cryptographic Hash Function - Hitron CGNV2 User Manual

Table of Contents

Advertisement

98
8.1.1.2
The Internet Key Exchange (IKE) is an IPsec standard protocol used to ensure
security for VPN negotiation and remote host or network access.
8.1.1.3
DES
Data Encryption Standard (DES) is used to encrypt and decrypt packet data.
3DES
Triple DES (3DES) applies the Data Encryption Standard (DES) cipher algorithm
three times to each data block.
AES
The Advanced Encryption Standard (AES) is a specification for the encryption of
electronic data.
TWOFISH
Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up
to 256 bits. Twofish is related to the earlier block cipher Blowfish.
BLOWFISH
Blowfish is a symmetric key block cipher that can be used as a drop-in replacement
for DES. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for
both domestic and exportable use.
8.1.1.4
A cryptographic hash function is a hash function that takes an arbitrary block of data
and returns a fixed-size bit string, the cryptographic hash value, such that any
(accidental or intentional) change to the data will (with very high probability) change
the hash value. The data to be encoded are often called the message, and the hash
value is sometimes called the message digest or simply digest. There are some main
cryptographic hash algorithms are as follows:
MD5
The MD5 message-digest 5 (MD5) algorithm is a widely used cryptographic hash
function that produces a 128-bit (16-byte) hash value. MD5 has been utilized in a
wide variety of security applications, and is also commonly used to check data
integrity. An MD5 hash value is typically expressed as a hexadecimal number, 32
digits long.
SHA
Secure Hash Algorithm (SHA). The four SHA algorithms are structured differently and
are distinguished as SHA-0, SHA-1, SHA-2, and SHA-3. SHA-1 is very similar to
SHA-0, but corrects an error in the original SHA hash specification that led to
significant weaknesses. The SHA-0 algorithm was not adopted by many applications.
SHA-2 on the other hand significantly differs from the SHA-1 hash function.
VPN

IKE

ENCRYPTION ALGORITHMS

CRYPTOGRAPHIC HASH FUNCTION

HITRON CGNV2 USER'S GUIDE

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents