08-15-2015 04:07 AM
I read through few documents and see that IPsec uses asymmetric key cryptography in Phase 1 to create ike SAs and symmetric key cryptography for IPsec SAs which is bulk data .
Can someone please confirm if this is true. which key ( symmetric key or asymmetric ) the pre-shared key defined for specific peer belngs to .
Thank you in advance
Solved! Go to Solution.
08-15-2015 05:04 AM
As a rule of thumb: Whenever userdata needs to be protected, symmetric crypto is used as it's build for this task and is much faster then asymmetric crypto. Asymmetric crypto is not build for protecting big amounts of data.
With that, the IPsec SAs use only symmetric algorithms to protect the data.
For Phase 1, it depends on the way authentication is done.
If you are using PSKs and router1 wants to authenticate router2, there is the following process involved (slightly simplified):
No asymmetric crypto is involved when PSKs are used which makes the processing quite fast.
If you use digital certificates for authentication (method rsa-sig in the config) then the following happens (even more simplified):
With authentication done with digital certificates we have asymmetric crypto.
In addition to that, there is also asymmetric crypto involved when DH calculates keymaterial for the session-keys.
08-15-2015 05:04 AM
As a rule of thumb: Whenever userdata needs to be protected, symmetric crypto is used as it's build for this task and is much faster then asymmetric crypto. Asymmetric crypto is not build for protecting big amounts of data.
With that, the IPsec SAs use only symmetric algorithms to protect the data.
For Phase 1, it depends on the way authentication is done.
If you are using PSKs and router1 wants to authenticate router2, there is the following process involved (slightly simplified):
No asymmetric crypto is involved when PSKs are used which makes the processing quite fast.
If you use digital certificates for authentication (method rsa-sig in the config) then the following happens (even more simplified):
With authentication done with digital certificates we have asymmetric crypto.
In addition to that, there is also asymmetric crypto involved when DH calculates keymaterial for the session-keys.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide