Each communication partner has a list of preferred ciphers defined in the encryption policy, with the most preferable cipher in first position of the list. The lists of both communication partners are compared and evaluated according to the following rules:
Example:
The cipher list of partner A contains: Triple-DES, AES-192, AES-128. The cipher list of partner B contains: AES-256, AES-128, Triple-DES, AES-192.
The system performs the following steps to identify matching ciphers:
The first entry, Triple-DES, is searched in the list of partner B.
A match is found; Triple-DES is the first matching cipher.
The first entry, AES-256, is searched in the list of partner A.
No match is found.
The second entry, AES-128, is searched in the list of partner A.
A match is found; AES-128 is the second matching cipher.
Note: Only the first two matches are considered; no further search and compare action is performed on the two cipher lists.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|