Public Key Configuration; Asymmetric Key Algorithm Overview - 3Com 4210G Series Configuration Manual

24-port/48-port
Hide thumbs Also See for 4210G Series:
Table of Contents

Advertisement

12

Public Key Configuration

When configuring public keys, go to these sections for information you are interested in:

Asymmetric Key Algorithm Overview

Configuring the Local Asymmetric Key Pair
Configuring the Public Key of a Peer
Displaying and Maintaining Public Keys
Public Key Configuration Examples
Asymmetric Key Algorithm Overview
Basic Concepts
Algorithm: A set of transformation rules for encryption and decryption.
Plain text: Information without being encrypted.
Cipher text: Encrypted information.
Key: A string of characters that controls the transformation between plain text and cipher text. It
participates in both the encryption and decryption.
Key Algorithm Types
As shown in
Figure
text is transmitted in the network, and then is decrypted by the receiver to obtain the original pain text.
Figure 12-1 Encryption and decryption
There are two types of key algorithms, based on whether the keys for encryption and decryption are
the same:
Symmetric key algorithm: The same key is used for both encryption and decryption. Commonly
used symmetric key algorithms include Advanced Encryption Standard (AES) and Data
Encryption Standard (DES).
Asymmetric key algorithm: Both ends have their own key pair, consisting of a private key and a
public key. The private key is kept secret while the public key may be distributed widely. The
information encrypted with the public key/private key can be decrypted only with the
corresponding private key/public key; however, the private key cannot be practically derived from
the public key.
12-1, the information is encrypted before being sent for confidentiality. The cipher
12-1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4210g nt4210g pwr

Table of Contents