Previous Topic: Configuring EncryptionNext Topic: Selection of the Matching Encryption Algorithm


Encryption Algorithms for Communication

The encryption algorithms used for communication and their preferred order are defined in an encryption policy, the cipher preference list.

When a communication should be established, the defined algorithms of both communication partners are considered and the most preferable matching algorithm in the list is chosen for the session following. To establish a communication session, at least one common algorithm must be shared by both communication partners.

The following list shows the available encryption algorithms, sorted by increasing order of their strength (that is, AES-256 is the strongest algorithm):

Triple-DES (Data Encryption Standard)

Indicates a symmetric key according to the Data Encryption Standard with a key length of 168 bits.

AES-128 (Advanced Encryption Standard)

Indicates a symmetric key according to the Advanced Encryption Standard with a key length of 128 bits.

AES-192

Indicates a symmetric key according to the Advanced Encryption Standard with a key length of 192 bits.

AES-256

Indicates a symmetric key according to the Advanced Encryption Standard with a key length of 256 bits.