Encryption

Encryption is the process of transforming data in a form which is impossible to decipher without the knowledge of the key or keys used to encrypt it. Depending on the encryption algorithm, either symmetric or asymmetric keys are used. These keys were discussed in the preceding sections of this chapter.

This part of the chapter will cover the following:

  • Encryption process

  • Encryption algorithms

Encryption Process

The type of keying used affects how encryption is performed. For example, if you use a symmetric keying algorithm, data is encrypted and decrypted with the same key. However, with an asymmetric keying encryption algorithm, a public key is used to encrypt the data and the corresponding private key is used to decrypt it. We have ...

Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.