cliffnotes
Level 1
Level 1
Member since ‎10-12-2011
‎08-18-2017

User Statistics

  • 2 Posts
  • 0 Solutions
  • 0 Helpful votes Given
  • 0 Helpful votes Received

User Activity

Please clarify this........Authentication (Identification of Peer):1. Using Symmetric Keys: Single key is used, the authentication of remote peer is not accurate when pre-shared key is stolen. So symmetric key alone is not efficient.2. Asymmetric Key...
HI all,This could be a dummy question, but help me to learn as am a newbie into VPN technology.Question: Symmetric hashing algorithms are MD5 & SHA.Symmetric encryption algorithms are DES,3DES etc.. Asymmetric encryption algorithms are RSA etc..To cr...
Community Statistics
Member Since ‎10-12-2011 07:41 AM
Date Last Visited ‎08-18-2017 03:55 AM
Posts 2