You can select the symmetric encryption algorithm that best suits your security
and performance needs. Each algorithm uses a string of bits known as a key to
perform the calculations. You can strengthen the level of encryption by selecting
a key length. The larger the key length, the greater the number of potential
patterns that can be created. This makes it more difficult to break the encryption
code. A larger key length creates stronger encryption, but it might also result in
slower performance. The key lengths that are available depend on the type of
algorithm that you select and your computer's operating system.
See
“Understanding the performance trade-offs”
on page 206.
See
“Configuring pcAnywhere to use symmetric encryption”
on page 208.
About public-key encryption
Public-key encryption requires that both the sender and recipient have a digital
certificate and an associated public/private key pair. The public key is distributed
freely as part of the digital certificate; however, the private key is a closely guarded
secret. The private key can decrypt what the public key encrypts.
Like symmetric encryption, public-key encryption encrypts and decrypts data by
using the same set of symmetric cryptographic keys. The difference is in the key
exchange protocol that is used. While symmetric encryption uses an anonymous
protocol, public-key encryption uses a strongly authenticated protocol.
During the key exchange, the sender generates a symmetric key and encrypts it
using the recipient's public key. Only the recipient can decrypt this data using a
private key, which is never exchanged. For this reason, public-key encryption is
invulnerable to a Man in the Middle attack.
See
“Configuring pcAnywhere to use public-key encryption”
on page 210.
Understanding the performance trade-offs
When deciding whether to use encryption and which method to use, you must
balance performance with the need for security. Using strong encryption can
protect the privacy and integrity of your data. However, it might also slow
performance because stronger encryption requires more resources to process and
transfer the data.
You should use strong encryption if the data that you are transferring is highly
confidential or sensitive or if you work in an industry that mandates it.
Securing your computer and sessions
Using encryption to protect data
206
Summary of Contents for 14541094 - pcAnywhere Host & Remote
Page 1: ...Symantec pcAnywhere User s Guide 10529206...
Page 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1...
Page 7: ...Select your country or language from the site index...
Page 8: ......
Page 18: ...Contents 18...
Page 30: ...Introducing Symantec pcAnywhere Where to find more information 30...
Page 46: ...Installing Symantec pcAnywhere Post installation tasks 46...
Page 90: ...Allowing others to control your computer What you can do during a host session 90...
Page 188: ...Automating file transfer and management tasks Running a command queue file 188...
Page 220: ...Securing your computer and sessions Ways to assess host security 220...