From: John Matus (John.Matus@tokiom.com)
Date: Thu Dec 01 2005 - 17:46:47 GMT-3
..........ok, back to logic
i guess you would want the router on the other end to authenticate b4 the
decryption takes place........so in the case that there is a rouge router
on the subnet, it would not be able to decrypt the packets and then brute
force the authentication....................
ok, i have no real idea :)
Regards,
John D. Matus
Technical Support / PAS
Fujitsu Consulting
626-568-7716
John.Matus@tokiom.com
Nancy Khln
<nancy_merill@yah
oo.com> To
Sent by: ccielab@groupstudy.com
nobody@groupstudy cc
.com
Subject
Authentication vs Decryption!
12/01/2005 11:23
AM
Please respond to
Nancy Khln
<nancy_merill@yah
oo.com>
In a BOTunnel Source and destination must authenticate before encryption
takes place, now
at the destination host, which security procedure is usually done first-
decryption or authentication? Any good white papers on this!
Much appreciated.
Thanks
Nancy
---------------------------------
Yahoo! Music Unlimited - Access over 1 million songs. Try it free.
This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3