Applications of Cryptography

In this last section of the chapter, we look at how all these algorithms, standards, and others are used to make computers and networks more secure. Solaris 8 is a heavy user of cryptography. Its uses range from the encrypted passwords in /etc/shadow, to NFS using the Diffie-Hellman algorithm, to MD5 checksumming, to the use of both authentication and encryption algorithms in the IP Security Architecture (IPsec).

Cryptography in Solaris 8

The following encryption, key exchange, message digest, and message authentication algorithms are used in Solaris 8:

  • DES (Data Encryption Standard)

  • DES-CBC (Data Encryption Standard in Cipher Block Chaining mode)

  • 3DES (Triple DES)

  • 3DES-CBC (Triple DES in Cipher Block Chaining mode) ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.