Howto:Encryption algorithms: Difference between revisions

From innovaphone wiki
Jump to navigation Jump to search
(New page: = Applies To = All innovaphone gateways and phones. = Overview = This is an overview of the encryption algorithms that are used in innovaphone products. == SRTP == === AES === * '''Name:'...)
 
Line 11: Line 11:
* '''Purpose:''' Voice or media encryption between VOIP endpoints
* '''Purpose:''' Voice or media encryption between VOIP endpoints
* '''Bit strength:''' 128, 192 or 256 bits
* '''Bit strength:''' 128, 192 or 256 bits
* '''Key management:''' Keys are generated using a software PRNG and exchanged using the signalling protocol (H.323, SIPS)
* '''Key management:''' A master key is generated using a software PRNG and exchanged using the signalling protocol (H.323, SIPS). Individual keys for data encryption are derived as specified by SRTP standards.
 
== TLS ==
=== AES ===
* '''Name:''' Advanced encryption standard
* '''Type:''' Symmetric
* '''Source:''' Standard algorithm
* '''Purpose:''' Encryption of network traffic between TLS endpoints
* '''Bit strength:''' 128 or 256 bits
* '''Key management:''' During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards.
=== 3DES ===
* '''Name:''' Triple Data Encryption Standard
* '''Type:''' Symmetric
* '''Source:''' Standard algorithm
* '''Purpose:''' Encryption of network traffic between TLS endpoints
* '''Bit strength:''' 168 bits (112 bits effective)
* '''Key management:''' During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards.

Revision as of 13:55, 9 November 2011

Applies To

All innovaphone gateways and phones.

Overview

This is an overview of the encryption algorithms that are used in innovaphone products.

SRTP

AES

  • Name: Advanced encryption standard
  • Type: Symmetric
  • Source: Standard algorithm
  • Purpose: Voice or media encryption between VOIP endpoints
  • Bit strength: 128, 192 or 256 bits
  • Key management: A master key is generated using a software PRNG and exchanged using the signalling protocol (H.323, SIPS). Individual keys for data encryption are derived as specified by SRTP standards.

TLS

AES

  • Name: Advanced encryption standard
  • Type: Symmetric
  • Source: Standard algorithm
  • Purpose: Encryption of network traffic between TLS endpoints
  • Bit strength: 128 or 256 bits
  • Key management: During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards.

3DES

  • Name: Triple Data Encryption Standard
  • Type: Symmetric
  • Source: Standard algorithm
  • Purpose: Encryption of network traffic between TLS endpoints
  • Bit strength: 168 bits (112 bits effective)
  • Key management: During TLS handshake a master key is negotiated between endpoints using asymetric cryptography (see RSA). The master key is based on keying material generated using a software PRNG. Individual keys for data encryption are derived as specified by TLS standards.