For more information about the Symantec Cryptographic Module and other
cryptographic modules that have passed FIPS 140-1 or 140-2 validation testing,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-1/1401val.htm
About symmetric encryption
Symmetric encryption encrypts and decrypts data using a set of symmetric
cryptographic keys that are randomly generated for each connection. These keys
are negotiated and exchanged using standard protocols for anonymous key
exchange. During a session, both the sender and the recipient share these keys.
The benefit of symmetric encryption is that it is easy to set up; however, it is not
without risk. Because the keys are exchanged anonymously, it is possible for
someone to intercept the data during the initial key exchange, manipulate the
keys used for this exchange, and discover the symmetric key. This type of
vulnerability is known as a Man in the Middle attack. The recipient has no way
of verifying that the data actually came from the person who originally sent it.
You can select the symmetric encryption algorithm that best suits your security
and performance needs. Each algorithm uses a string of bits known as a key to
perform the calculations. You can strengthen the level of encryption by selecting
a key length. The larger the key length, the greater the number of potential
patterns that can be created. This makes it more difficult to break the encryption
code. A larger key length creates stronger encryption, but it might also result in
slower performance. The key lengths that are available depend on the type of
algorithm that you select and your computer's operating system.
See
“Understanding the performance trade-offs”
on page 220.
See
“Configuring pcAnywhere to use symmetric encryption”
on page 221.
About public-key encryption
Public-key encryption requires that both the sender and recipient have a digital
certificate and an associated public/private key pair. The public key is distributed
freely as part of the digital certificate; however, the private key is a closely guarded
secret. The private key can decrypt what the public key encrypts.
Like symmetric encryption, public-key encryption encrypts and decrypts data by
using the same set of symmetric cryptographic keys. The difference is in the key
exchange protocol that is used. While symmetric encryption uses an anonymous
protocol, public-key encryption uses a strongly authenticated protocol.
219
Securing your computer and sessions
Using encryption to protect data
Summary of Contents for PCANYWHERE - V12.5
Page 1: ...Symantec pcAnywhere User s Guide 12164653 ...
Page 16: ...Contents 16 ...
Page 28: ...Introducing Symantec pcAnywhere Where to find more information 28 ...
Page 68: ...Installing Symantec pcAnywhere Post installation tasks 68 ...
Page 234: ...Securing your computer and sessions Ways to assess host security 234 ...