HP VPN Server Appliance sa3110/sa3150/sa3400/sa3450 - Virtual Private Networking Concepts Guide
Hewlett-Packard Company Virtual Private Networking Concepts Guide
C
CC
Cr
rr
ry
yy
yp
pp
pt
tt
to
oo
og
gg
gr
rr
ra
aa
ap
pp
ph
hh
hi
ii
ic
cc
c
S
SS
Sy
yy
ys
ss
st
tt
te
ee
em
mm
ms
ss
s
a
aa
an
nn
nd
dd
d
E
EE
En
nn
nc
cc
cr
rr
ry
yy
yp
pp
pt
tt
ti
ii
io
oo
on
nn
n
T
TT
Te
ee
er
rr
rm
mm
mi
ii
in
nn
no
oo
ol
ll
lo
oo
og
gg
gy
yy
y
Cryptographic Systems and Encryption Terminology
Cryptographic Systems and Encryption TerminologyCryptographic Systems and Encryption Terminology
Cryptographic Systems and Encryption Terminology
Cryptographic Systems and Encryption Terminology Overview . . . . . . . . . . . . . . . . . 2-1
Symmetric Cryptographic Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Data Encryption Standard (DES) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4
Triple Pass DES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-5
3DES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-7
Outer Cipher Block Chaining (CBC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-8
Asymmetric Cryptographic Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-9
Symmetric Vs. Asymmetric Cryptography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10
Diffie-Hellman Session Key Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-11
Key Space and Brute Force Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-13










