Re: Authentication vs Decryption!

From: John Matus (John.Matus@tokiom.com)
Date: Thu Dec 01 2005 - 17:46:47 GMT-3


..........ok, back to logic
i guess you would want the router on the other end to authenticate b4 the
decryption takes place........so in the case that there is a rouge router
on the subnet, it would not be able to decrypt the packets and then brute
force the authentication....................
ok, i have no real idea :)

Regards,

John D. Matus
Technical Support / PAS
Fujitsu Consulting
626-568-7716
John.Matus@tokiom.com

                                                                           
             Nancy Khln
             <nancy_merill@yah
             oo.com> To
             Sent by: ccielab@groupstudy.com
             nobody@groupstudy cc
             .com
                                                                   Subject
                                       Authentication vs Decryption!
             12/01/2005 11:23
             AM
                                                                           
                                                                           
             Please respond to
                Nancy Khln
             <nancy_merill@yah
                  oo.com>
                                                                           
                                                                           

  In a BOTunnel Source and destination must authenticate before encryption
takes place, now
  at the destination host, which security procedure is usually done first-
decryption or authentication? Any good white papers on this!
  Much appreciated.
  Thanks
  Nancy

---------------------------------
 Yahoo! Music Unlimited - Access over 1 million songs. Try it free.



This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3