Howto:Encryption algorithms: Difference between revisions
Jump to navigation
Jump to search
(New page: = Applies To = All innovaphone gateways and phones. = Overview = This is an overview of the encryption algorithms that are used in innovaphone products. == SRTP == === AES === * '''Name:'...) |
(→SRTP) |
||
Line 11: | Line 11: | ||
* '''Purpose:''' Voice or media encryption between VOIP endpoints | * '''Purpose:''' Voice or media encryption between VOIP endpoints | ||
* '''Bit strength:''' 128, 192 or 256 bits | * '''Bit strength:''' 128, 192 or 256 bits | ||
* '''Key management:''' | * '''Key management:''' A master key is generated using a software PRNG and exchanged using the signalling protocol (H.323, SIPS). Individual keys for data encryption are derived as specified by SRTP standards. | ||
== TLS == | |||
=== AES === | |||
* '''Name:''' Advanced encryption standard | |||
* '''Type:''' Symmetric | |||
* '''Source:''' Standard algorithm | |||
* '''Purpose:''' Encryption of network traffic between TLS endpoints | |||
* '''Bit strength:''' 128 or 256 bits | |||
* '''Key management:''' During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards. | |||
=== 3DES === | |||
* '''Name:''' Triple Data Encryption Standard | |||
* '''Type:''' Symmetric | |||
* '''Source:''' Standard algorithm | |||
* '''Purpose:''' Encryption of network traffic between TLS endpoints | |||
* '''Bit strength:''' 168 bits (112 bits effective) | |||
* '''Key management:''' During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards. |
Revision as of 13:55, 9 November 2011
Applies To
All innovaphone gateways and phones.
Overview
This is an overview of the encryption algorithms that are used in innovaphone products.
SRTP
AES
- Name: Advanced encryption standard
- Type: Symmetric
- Source: Standard algorithm
- Purpose: Voice or media encryption between VOIP endpoints
- Bit strength: 128, 192 or 256 bits
- Key management: A master key is generated using a software PRNG and exchanged using the signalling protocol (H.323, SIPS). Individual keys for data encryption are derived as specified by SRTP standards.
TLS
AES
- Name: Advanced encryption standard
- Type: Symmetric
- Source: Standard algorithm
- Purpose: Encryption of network traffic between TLS endpoints
- Bit strength: 128 or 256 bits
- Key management: During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards.
3DES
- Name: Triple Data Encryption Standard
- Type: Symmetric
- Source: Standard algorithm
- Purpose: Encryption of network traffic between TLS endpoints
- Bit strength: 168 bits (112 bits effective)
- Key management: During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards.