Field Description
3 , a key length of 128 bits is used.
• 3 : Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 128 bits.
• 3 : Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 192 bits.
• 3 : Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 256 bits.
• *7$: Twofish was a final candidate for the AES
(Advanced Encryption Standard). It is rated as just as secure
as Rijndael (AES), but is slower.
• :17$: Blowfish is a very secure and fast algorithm.
Twofish can be regarded as the successor to Blowfish.
• 63*: CAST is also a very secure algorithm, marginally
slower than Blowfish, but faster than 3DES.
• 5: DES is an older encryption algorithm, which is rated as
weak due to its small effective length of 56 bits.
Hash algorithms (Authentication):
• '5 (default value): MD5 (Message Digest #5) is an older
hash algorithm. It is used with a 96 bit digest length for IPSec.
• 300 : All options can be used.
• @3: SHA1 (Secure Hash Algorithm #1) is a hash algorithm
developed by NSA (United States National Security Associ-
ation). It is rated as secure, but is slower than MD5. It is used
with a 96 bit digest length for IPSec.
• @3 : SH2 (Secure Hash Algorithmus #2) is a hash al-
gorithm which has been designed to supersede SHA 1. It can
be used with hash lengths of 256, 384 or 512 bits.
• @3 &: SHA-2 with 384 bit hash length.
• @3 : SHA-2 with 512 bit hash length.
Note that RipeMD 160 and Tiger 192 are not available for mes-
sage hashing in phase 2.
bintec elmeg GmbH
14 VPN
bintec RS Series 381