EasyManua.ls Logo

Funkwerk R1202 - Page 341

Funkwerk R1202
594 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Field Description
+&: Twofish was a final candidate for the AES
(Advanced Encryption Standard). It is rated as just as secure
as Rijndael (AES), but is slower.
>/&: Blowfish is a very secure and fast algorithm.
Twofish can be regarded as the successor to Blowfish.
40-+: CAST is also a very secure algorithm, marginally
slower than Blowfish, but faster than 3DES.
1-: DES is an older encryption algorithm, which is rated as
weak due to its small effective length of 56 bits.
0-: Rijndael has been nominated as AES due to its fast key
setup, low memory requirements, high level of security
against attacks and general speed.
0-!: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 128 bits.
0-!: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 192 bits.
0-!: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 256 bits.
Hash algorithms (Authentication):
(1 (default value): MD 5 (Message Digest #5) is an older
hash algorithm. It is used with a 96 bit digest length for IPSec.
-@0: SHA1 (Secure Hash Algorithm #1) is a hash algorithm
developed by NSA (United States National Security Associ-
ation). It is rated as secure, but is slower than MD5. It is used
with a 96 bit digest length for IPSec.
;,(1 : RipeMD 160 is a 160 bit hash algorithm. It is
used as a secure replacement for MD5 and RipeMD.
+$: Tiger 192 is a relatively new and very fast al-
gorithm.
Please note that the description of the encryption and authentic-
ation or the hash algorithms is based on the authors knowledge
Funkwerk Enterprise Communications GmbH
18 VPN
bintec Rxxx2/RTxxx2 327

Table of Contents

Related product manuals