05-31-2013 03:33 AM - edited 02-21-2020 06:56 PM
Is it true that ipsec use RSA algorithm when we use the pre-shared Key?
Solved! Go to Solution.
05-31-2013 09:06 AM
i read that IKE phase one for IPSEC uses the asymetric cryptography and the second uses the symetric one.
both can be the case but as a general rule it's not correct.
should i understand that with pre-shared key there is no asymetric cryptography in IKE phase 1?
yes and no ... 😉
You always have the Key-Agreement with Diffie-Hellman which is also an asymetric mechanism. That takes place both with PSK and digital certificates (rsa-sig).
For authentication - and that's probably what you are referring to - with PSKs there is no public-key operation but a couple of hash-operations.If you authenticate with digital certificates you have plenty of public-key operations where digital signatures are computed and also checked.
--
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni
05-31-2013 05:53 AM
No, there aren't any public-key-operations involved in the authentication when you use PSKs. The only public-key-operation is DH for the Key-agreement.
Where did you get that info from?
--
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni
05-31-2013 07:49 AM
i read that IKE phase one for IPSEC uses the asymetric cryptography and the second uses the symetric one.
should i understand that with pre-shared key there is no asymetric cryptography in IKE phase 1?
05-31-2013 09:06 AM
i read that IKE phase one for IPSEC uses the asymetric cryptography and the second uses the symetric one.
both can be the case but as a general rule it's not correct.
should i understand that with pre-shared key there is no asymetric cryptography in IKE phase 1?
yes and no ... 😉
You always have the Key-Agreement with Diffie-Hellman which is also an asymetric mechanism. That takes place both with PSK and digital certificates (rsa-sig).
For authentication - and that's probably what you are referring to - with PSKs there is no public-key operation but a couple of hash-operations.If you authenticate with digital certificates you have plenty of public-key operations where digital signatures are computed and also checked.
--
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni
05-31-2013 11:49 AM
Ok thank you very much
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide