D-Link DFL-2500 User Guide - Page 215

Symmetric Encryption

Page 215 highlights

196 Chapter 20. VPN Basics Symmetric Encryption In symmetric encryption, the same key is used for both encryption and decryption. Therefore the key is shared by the sender and the recipients, and must be kept secretly. Using the same secret key is a faster and simpler computation method, but the key distribution among users in the first place is a major problem, which must be carried out very carefully to prevent from passing the key to a wrong hand. To secure the sharing of the secret key, session keys or public keys are often involved in the actual operation. A session key, as its name describes, is only valid for one session. Even if the key is compromised at a session, it cannot be used for future decryption. Another solution is the use of public key handled by asymmetric encryption presented next. Currently, common used symmetric encryption algorithms include: • DES and Triple DES - DES uses a 56-bit key and is considered equal in strength to most other algorithms that use 40-bit keys. Its relatively short key length by modern standards means that it is now considered vulnerable to brute force attacks. Triple-pass DES uses three different keys in three DES passes, forming a theoretical key length of 168 bits. • Blowfish - A 64-bit block cipher with key length variable between 32 and 448 bits. • Twofish - A 128-bit block cipher with key length 128, 192, or 256 bits. • CAST-128 - A 64-bit block cipher with a 128-bit key, less frequently employed than Blowfish. • AES - A 128-bit block size with key lengths of 128-256 bits, a sound alternative to the ageing DES. D-Link firewall's VPN implementation supports all the above algorithms. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

196
Chapter 20. VPN Basics
Symmetric Encryption
In symmetric encryption, the same key is used for both encryption and
decryption. Therefore the key is shared by the sender and the recipients,
and must be kept secretly. Using the same secret key is a faster and simpler
computation method, but the key distribution among users in the first
place is a major problem, which must be carried out very carefully to
prevent from passing the key to a wrong hand.
To secure the sharing of the secret key,
session keys
or
public keys
are often
involved in the actual operation.
A session key, as its name describes, is only valid for one session. Even if
the key is compromised at a session, it cannot be used for future
decryption. Another solution is the use of public key handled by
asymmetric encryption
presented next.
Currently, common used symmetric encryption algorithms include:
DES and Triple DES
– DES uses a 56-bit key and is considered equal in strength to most
other algorithms that use 40-bit keys. Its relatively short key length
by modern standards means that it is now considered vulnerable to
brute force attacks
.
Triple-pass DES uses three different keys in three DES passes,
forming a theoretical key length of 168 bits.
Blowfish
– A 64-bit block cipher with key length variable between 32 and 448
bits.
Twofish
– A 128-bit block cipher with key length 128, 192, or 256 bits.
CAST-128
– A 64-bit block cipher with a 128-bit key, less frequently employed
than Blowfish.
AES
– A 128-bit block size with key lengths of 128-256 bits, a sound
alternative to the ageing DES.
D-Link firewall’s VPN implementation supports all the above algorithms.
D-Link Firewalls User’s Guide