Translate

Tuesday, 9 June 2015

VPN TERMINOLOGY KEYS

Symmetric and Asymmetric Key Algorithms:


Before these protocols can establish a secure communications tunnel (VPN) between two endpoints, they generate, exchange, and use keys as a means to authenticate/encrypt the information used to create a secure tunnel that is sent between both parties.

Symmetrical Encryption:
One key to encrypt as well as Decrypt

Symmetrical Encryption Algorithm:
DES     Digital Encryption Standard 56bit
3DES   Triple DES 168bit
AES     Advance Encryption Standard 128 , 192 , 256 bit
IDEA   International Data Encryption Algorithm


Asymmetric Encryption:
One key to encrypt and second key to decrypt, one key is called private key which is keep private and the second key is called as public key which is distributed. The data encrypted by the public key can only be decrypted by the private key and vice-versa. when we need to create session for any bank transaction we use Asymmetrical encryption as its heavy and secure whereas when we need to do file transfer or any data transfer we use symmetrical encryption.

Public/private key pairs commonly use digital certificates as a method of key distribution. Internet shopping and other sites often use SSL/TLS as a way to secure transactions on their websites. In this case, you usually receive a copy of the server’s digital certificate. Within the certificate is a copy of the server’s public key. By using this public key, the host and server can set up a secure communications path (because the server has a corresponding private key). Examples of asymmetric key algorithms include the following:

Rivest, Shamir, and Adleman (RSA)
Diffie-Hellman (DH)



No comments:

Post a Comment