Applications of Cryptography
In this last section of the chapter, we look at how all these algorithms, standards, and others are used to make computers and networks more secure. Solaris 8 is a heavy user of cryptography. Its uses range from the encrypted passwords in /etc/shadow, to NFS using the Diffie-Hellman algorithm, to MD5 checksumming, to the use of both authentication and encryption algorithms in the IP Security Architecture (IPsec).
Cryptography in Solaris 8
The following encryption, key exchange, message digest, and message authentication algorithms are used in Solaris 8:
DES (Data Encryption Standard)
DES-CBC (Data Encryption Standard in Cipher Block Chaining mode)
3DES (Triple DES)
3DES-CBC (Triple DES in Cipher Block Chaining mode) ...
Get Solaris 8 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.