O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IPsec Algorithms

As mentioned previously, IPsec does not depend on any particular cryptographic algorithm for its operation. Two kinds of algorithms are employed by IPsec to provide its functions: encryption algorithms and message authentication codes based on one-way hash functions (described in Chapter 2). The two encryption algorithms supported by the Solaris 8 implementation of IPsec are Data Encryption Standard (DES), with 56-bit keys, and Triple DES, with 112-bit keys. Both of these encryption algorithms are used in a mode known as Chaining Block Cipher (CBC), described in RFC 2451, “The ESP CBC-Mode Cipher Algorithms.” The message authentication codes (or MACs, as they are known) use MD5 and SHA1 message digest algorithms, also described ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required