
You can select the symmetric encryption algorithm that best suits your security
and performance needs. Each algorithm uses a string of bits known as a key to
perform the calculations. You can strengthen the level of encryption by selecting
a key length. The larger the key length, the greater the number of potential
patterns that can be created. This makes it more difficult to break the encryption
code. A larger key length creates stronger encryption, but it might also result in
slower performance. The key lengths that are available depend on the type of
algorithm that you select and your computer's operating system.
See “Understanding the performance trade-offs” on page 213.
See “Configuring pcAnywhere to use symmetric encryption” on page 215.
About public-key encryption
Public-key encryption requires that both the sender and recipient have a digital
certificate and an associated public/private key pair. The public key is distributed
freely as part of the digital certificate; however, the private key is a closely guarded
secret. The private key can decrypt what the public key encrypts.
Like symmetric encryption, public-key encryption encrypts and decrypts data by
using the same set of symmetric cryptographic keys. The difference is in the key
exchange protocol that is used. While symmetric encryption uses an anonymous
protocol, public-key encryption uses a strongly authenticated protocol.
During the key exchange, the sender generates a symmetric key and encrypts it
using the recipient's public key. Only the recipient can decrypt this data using a
private key, which is never exchanged. For this reason, public-key encryption is
invulnerable to a Man in the Middle attack.
See “Configuring pcAnywhere to use public-key encryption” on page 217.
Understanding the performance trade-offs
When deciding whether to use encryption and which method to use, you must
balance performance with the need for security. Using strong encryption can
protect the privacy and integrity of your data. However, it might also slow
performance because stronger encryption requires more resources to process and
transfer the data.
You should use strong encryption if the data that you are transferring is highly
confidential or sensitive or if you work in an industry that mandates it.
213
Securing your computer and sessions
Using encryption to protect data
Содержание PCANYWHERE - V12.1
Страница 1: ...Symantec pcAnywhere User s Guide 12164653 ...
Страница 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 ...
Страница 7: ...Select your country or language from the site index ...
Страница 8: ......
Страница 18: ...Contents 18 ...
Страница 30: ...Introducing Symantec pcAnywhere Where to find more information 30 ...
Страница 92: ...Allowing others to control your computer What you can do during a host session 92 ...
Страница 144: ...Controlling another computer remotely Connecting to a computer that does not have a host running 144 ...
Страница 252: ...Connecting across multiple platforms Navigating in a pcAnywhere CrossPlatform session 252 ...