About Public-Key Encryption; Understanding The Performance Trade-Offs - Symantec PCANYWHERE 12.0 User Manual

Hide thumbs Also See for PCANYWHERE 12.0:
Table of Contents

Advertisement

206
Securing your computer and sessions
Using encryption to protect data

About public-key encryption

Understanding the performance trade-offs

You can select the symmetric encryption algorithm that best suits your security
and performance needs. Each algorithm uses a string of bits known as a key to
perform the calculations. You can strengthen the level of encryption by selecting
a key length. The larger the key length, the greater the number of potential
patterns that can be created. This makes it more difficult to break the encryption
code. A larger key length creates stronger encryption, but it might also result in
slower performance. The key lengths that are available depend on the type of
algorithm that you select and your computer's operating system.
See
"Understanding the performance trade-offs"
See
"Configuring pcAnywhere to use symmetric encryption"
Public-key encryption requires that both the sender and recipient have a digital
certificate and an associated public/private key pair. The public key is distributed
freely as part of the digital certificate; however, the private key is a closely guarded
secret. The private key can decrypt what the public key encrypts.
Like symmetric encryption, public-key encryption encrypts and decrypts data by
using the same set of symmetric cryptographic keys. The difference is in the key
exchange protocol that is used. While symmetric encryption uses an anonymous
protocol, public-key encryption uses a strongly authenticated protocol.
During the key exchange, the sender generates a symmetric key and encrypts it
using the recipient's public key. Only the recipient can decrypt this data using a
private key, which is never exchanged. For this reason, public-key encryption is
invulnerable to a Man in the Middle attack.
See
"Configuring pcAnywhere to use public-key encryption"
When deciding whether to use encryption and which method to use, you must
balance performance with the need for security. Using strong encryption can
protect the privacy and integrity of your data. However, it might also slow
performance because stronger encryption requires more resources to process and
transfer the data.
You should use strong encryption if the data that you are transferring is highly
confidential or sensitive or if you work in an industry that mandates it.
on page 206.
on page 208.
on page 210.

Advertisement

Table of Contents
loading

This manual is also suitable for:

14541094 - pcanywhere host & remote

Table of Contents