Installation guide
BlackBerry Enterprise Solution
Encryption algorithms that the BlackBerry device supports for use with layer 2 security methods ...83
EAP authentication methods and encryption algorithms with which the BlackBerry device supports
the use of CCKM.................................................................................................................................................84
VPN solution on the Wi-Fi enabled BlackBerry device................................................................................85
Appendix I: Algorithm suites that the BlackBerry device supports for negotiating SSL connections.....85
Appendix J: RSA SecurID software token tokencode generation process.................................................... 87
Appendix K: Content protection initialization process....................................................................................87
Appendix L: Protocol for resetting the password on a content-protected BlackBerry device remotely .88
Cryptosystem parameters.................................................................................................................................88
Protocol process .................................................................................................................................................89
© 2008 Research In Motion Limited. All rights reserved.
www.blackberry.com