Previous Topic: Encryption Algorithms for CommunicationNext Topic: Encryption in Top Secret Environments


Selection of the Matching Encryption Algorithm

Each communication partner has a list of preferred ciphers defined in the encryption policy, with the most preferable cipher in first position of the list. The lists of both communication partners are compared and evaluated according to the following rules:

Example:

The cipher list of partner A contains: Triple-DES, AES-192, AES-128. The cipher list of partner B contains: AES-256, AES-128, Triple-DES, AES-192.

The system performs the following steps to identify matching ciphers:

  1. Go through the cipher list of partner A:

    The first entry, Triple-DES, is searched in the list of partner B.

    A match is found; Triple-DES is the first matching cipher.

  2. Go through the cipher list of partner B:

    The first entry, AES-256, is searched in the list of partner A.

    No match is found.

    The second entry, AES-128, is searched in the list of partner A.

    A match is found; AES-128 is the second matching cipher.

  3. The system considers AES-128 stronger than Triple-DES and uses this algorithm for the subsequent session.

Note: Only the first two matches are considered; no further search and compare action is performed on the two cipher lists.