1-1
1
Public Key Configuration
When configuring public keys, go to these sections for information you are interested in:
z
Asymmetric Key Algorithm Overview
z
Configuring the Local Asymmetric Key Pair
z
Configuring the Public Key of a Peer
z
Displaying and Maintaining Public Keys
z
Public Key Configuration Examples
Asymmetric Key Algorithm Overview
Basic Concepts
z
Algorithm: A set of transformation rules for encryption and decryption.
z
Plain text: Information without being encrypted.
z
Cipher text: Encrypted information.
z
Key: A string of characters that controls the transformation between plain text and cipher text. It
participates in both the encryption and decryption.
Key Algorithm Types
As shown in
Figure 1-1
, the information is encrypted before being sent for confidentiality. The cipher text
is transmitted in the network, and then is decrypted by the receiver to obtain the original pain text.
Figure 1-1
Encryption and decryption
There are two types of key algorithms, based on whether the keys for encryption and decryption are the
same:
z
Symmetric key algorithm: The same key is used for both encryption and decryption. Commonly
used symmetric key algorithms include Advanced Encryption Standard (AES) and Data Encryption
Standard (DES).
z
Asymmetric key algorithm: Both ends have their own key pair, consisting of a private key and a
public key. The private key is kept secret while the public key may be distributed widely. The
information encrypted with the public key/private key can be decrypted only with the corresponding
private key/public key; however, the private key cannot be practically derived from the public key.
Asymmetric Key Algorithm Applications
Asymmetric key algorithms can be used for encryption/decryption and digital signature:
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...