Funkwerk WI2040n Manual de usuario Pagina 288

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 432
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 287
Field Description
(2 1: Blowfish is a very secure and fast algorithm.
Twofish can be regarded as the successor to Blowfish.
+4: CAST is also a very secure algorithm, marginally
slower than Blowfish, but faster than 3DES.
90: DES is an older encryption algorithm, which is rated as
weak due to its small effective length of 56 bits.
0: Rijndael has been nominated as AES due to its fast key
setup, low memory requirements, high level of security
against attacks and general speed.
0: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 128 bits.
0: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 192 bits.
0: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 256 bits.
Hash algorithms (Authentication):
?9 (default value): MD 5 (Message Digest #5) is an older
hash algorithm. It is used with a 96 bit digest length for IPSec.
= : SHA1 (Secure Hash Algorithm #1) is a hash algorithm
developed by the NSA (United States National Security Asso-
ciation). It is rated as secure, but is slower than MD5. It is
used with a 96 bit digest length for IPSec.
6!?9 : RipeMD 160 is a 160 bit hash algorithm. It is
used as a secure replacement for MD5 and RipeMD.
4$: Tiger 192 is a relatively new and very fast al-
gorithm.
Please note that the description of the encryption and authentic-
ation or the hash algorithms is based on the authors knowledge
and opinion at the time of creating this User Guide. In particular,
the quality of the algorithms is subject to relative aspects and
may change due to mathematical or cryptographic develop-
ments.
16 VPN Funkwerk Enterprise Communications GmbH
276 bintec WLAN and Industrial WLAN
Vista de pagina 287
1 2 ... 283 284 285 286 287 288 289 290 291 292 293 ... 431 432

Comentarios a estos manuales

Sin comentarios