AH and ESP and uses symmetric and asymmetric secret algorithms.

Unanswered Question
Apr 15th, 2007

I have read in some blog that :

AH uses asymmetric (not symmetric) secret algorithms, and ESP uses symmetric (not asymmetric) secret key algorithms.

And he referred to Managing Cisco Network Security (Cisco Press), I do not have that book, but isn?t other way around that :

AH uses symmetric (not asymmetric) secret algorithms, and ESP uses asymmetric (not symmetric) secret key algorithms.

When I checked that "Data Communication" Book by Forouzan pag 843 :

" The AH protocol calculates a message digest, using hashing function and a symmetric key, and insert the digest in the authentication header " .

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)


This Discussion