O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Applications of Cryptography

In this last section of the chapter, we look at how all these algorithms, standards, and others are used to make computers and networks more secure. Solaris 8 is a heavy user of cryptography. Its uses range from the encrypted passwords in /etc/shadow, to NFS using the Diffie-Hellman algorithm, to MD5 checksumming, to the use of both authentication and encryption algorithms in the IP Security Architecture (IPsec).

Cryptography in Solaris 8

The following encryption, key exchange, message digest, and message authentication algorithms are used in Solaris 8:

  • DES (Data Encryption Standard)

  • DES-CBC (Data Encryption Standard in Cipher Block Chaining mode)

  • 3DES (Triple DES)

  • 3DES-CBC (Triple DES in Cipher Block Chaining mode) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required