Field
Description
(Advanced Encryption Standard). It is rated as just as secure
as Rijndael (AES), but is slower.
•
B *&
: Blowfish is a very secure and fast algorithm.
Twofish can be regarded as the successor to Blowfish.
•
4*"
: CAST is also a very secure algorithm, marginally
slower than Blowfish, but faster than 3DES.
•
9%0
: DES is an older encryption algorithm, which is rated as
weak due to its small effective length of 56 bits.
•
%0
: Rijndael has been nominated as AES due to its fast key
setup, low memory requirements, high level of security
against attacks and general speed.
Hash algorithms (Authentication):
•
,9
(default value): MD 5 (Message Digest #5) is an older
hash algorithm. It is used with a 96 bit digest length for IPSec.
•
0A
: SHA1 (Secure Hash Algorithm #1) is a hash al-
gorithm developed by the NSA (United States National Secur-
ity Association). It is rated as secure, but is slower than MD5.
It is used with a 96 bit digest length for IPSec.
•
;/,9
: RipeMD 160 is a 160 bit hash algorithm. It is
used as a secure replacement for MD5 and RipeMD.
•
: Tiger 192 is a relatively new and very fast al-
gorithm.
Please note that the description of the encryption and authentic-
ation or the hash algorithms is based on the author’s knowledge
and opinion at the time of creating this User Guide. In particular,
the quality of the algorithms is subject to relative aspects and
may change due to mathematical or cryptographic develop-
ments.
DH Group
The Diffie-Hellman group defines the parameter set used as the
basis for the key calculation during phase 1. "MODP" as sup-
ported by funkwerk devices stands for "modular exponenti-
ation".
Possible values:
•
'1 B"(
: During the Diffie-Hellman key calculation,
modular exponentiation at 768 bits is used to create the en-
cryption material.
Funkwerk Enterprise Communications GmbH
12 VPN
funkwerk TR200aw/bw
237