The encryption algorithms used for communication and their preferred order are defined in an encryption policy, the cipher preference list.
When a communication should be established, the defined algorithms of both communication partners are considered and the most preferable matching algorithm in the list is chosen for the session following. To establish a communication session, at least one common algorithm must be shared by both communication partners.
The following list shows the available encryption algorithms, sorted by increasing order of their strength (that is, AES-256 is the strongest algorithm):
Indicates a symmetric key according to the Data Encryption Standard with a key length of 168 bits.
Indicates a symmetric key according to the Advanced Encryption Standard with a key length of 128 bits.
Indicates a symmetric key according to the Advanced Encryption Standard with a key length of 192 bits.
Indicates a symmetric key according to the Advanced Encryption Standard with a key length of 256 bits.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|