In this last section of the chapter, we look at how all these algorithms, standards, and others are used to make computers and networks more secure. Solaris 8 is a heavy user of cryptography. Its uses range from the encrypted passwords in /etc/shadow, to NFS using the Diffie-Hellman algorithm, to MD5 checksumming, to the use of both authentication and encryption algorithms in the IP Security Architecture (IPsec).
The following encryption, key exchange, message digest, and message authentication algorithms are used in Solaris 8:
DES (Data Encryption Standard)
DES-CBC (Data Encryption Standard in Cipher Block Chaining mode)
3DES (Triple DES)
3DES-CBC (Triple DES in Cipher Block Chaining mode) ...