Field Description
• +&: Twofish was a final candidate for the AES
(Advanced Encryption Standard). It is rated as just as secure
as Rijndael (AES), but is slower.
• >/&: Blowfish is a very secure and fast algorithm.
Twofish can be regarded as the successor to Blowfish.
• 40-+: CAST is also a very secure algorithm, marginally
slower than Blowfish, but faster than 3DES.
• 1-: DES is an older encryption algorithm, which is rated as
weak due to its small effective length of 56 bits.
• 0-: Rijndael has been nominated as AES due to its fast key
setup, low memory requirements, high level of security
against attacks and general speed.
• 0-!: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 128 bits.
• 0-!: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 192 bits.
• 0-!: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 256 bits.
Hash algorithms (Authentication):
• (1 (default value): MD 5 (Message Digest #5) is an older
hash algorithm. It is used with a 96 bit digest length for IPSec.
• -@0: SHA1 (Secure Hash Algorithm #1) is a hash algorithm
developed by NSA (United States National Security Associ-
ation). It is rated as secure, but is slower than MD5. It is used
with a 96 bit digest length for IPSec.
• ;,(1 : RipeMD 160 is a 160 bit hash algorithm. It is
used as a secure replacement for MD5 and RipeMD.
• +$: Tiger 192 is a relatively new and very fast al-
gorithm.
Please note that the description of the encryption and authentic-
ation or the hash algorithms is based on the author’s knowledge
Funkwerk Enterprise Communications GmbH
18 VPN
bintec Rxxx2/RTxxx2 327