EasyManuals Logo

ASCOM IPBL User Manual

ASCOM IPBL
178 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #31 background imageLoading...
Page #31 background image
TD 92579EN
15 February 2012 / Ver. H
Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 5.0.x)
23
Cryptography tasks can be divided into the two general categories Encryption and
Authentication.
Encryption
Encryption is the scrambling of information so that the original message cannot be
determined by unauthorized recipients by applying an encryption algoritm to the message
plaintext producing ciphertext (appearently random bits). A decryption algoritm, if given
the correct key, converts the ciphertext back into plaintext. Public key algoritms use paired
keys, one for encryption and another for decryption.
Authentication
Authentication is the verification of a message’s sender. This requires the message to be
protected so it cannot be altered, usually by generating a digital signature formed by a
hash of the message. Only the correct key can generate a valid signature.

Table of Contents

Other manuals for ASCOM IPBL

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ASCOM IPBL and is the answer not in the manual?

ASCOM IPBL Specifications

General IconGeneral
BrandASCOM
ModelIPBL
CategoryGateway
LanguageEnglish

Related product manuals