From: John Matus (John.Matus@tokiom.com)
Date: Thu Dec 01 2005 - 17:42:06 GMT-3
although i can't say for sure.............
logically, the packets would have to be decrypted first before they could
be authenticated, because the router would not be able to compare the
encrypted key-string to what it has in the local data-base or where-ever it
is that you are authenticating.
but logic, of course, isn't always right.
Regards,
John D. Matus
Technical Support / PAS
Fujitsu Consulting
626-568-7716
John.Matus@tokiom.com
                                                                           
             Nancy Khln                                                    
             <nancy_merill@yah                                             
             oo.com>                                                    To 
             Sent by:                  ccielab@groupstudy.com              
             nobody@groupstudy                                          cc 
             .com                                                          
                                                                   Subject 
                                       Authentication vs Decryption!       
             12/01/2005 11:23                                              
             AM                                                            
                                                                           
                                                                           
             Please respond to                                             
                Nancy Khln                                                 
             <nancy_merill@yah                                             
                  oo.com>                                                  
                                                                           
                                                                           
  In a BOTunnel Source and destination must authenticate before encryption
takes place, now
  at the destination host, which security procedure is usually done first-
decryption or authentication? Any good white papers on this!
  Much appreciated.
  Thanks
  Nancy
---------------------------------
 Yahoo! Music Unlimited - Access over 1 million songs. Try it free.
This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3