From: John Matus (John.Matus@tokiom.com)
Date: Thu Dec 01 2005 - 17:46:47 GMT-3
..........ok, back to logic
i guess you would want the router on the other end to authenticate b4 the
decryption takes place........so in the case that there is a rouge router
on the subnet, it would not be able to decrypt the packets and then brute
force the authentication....................
ok, i have no real idea :)
Regards,
John D. Matus
Technical Support / PAS
Fujitsu Consulting
626-568-7716
John.Matus@tokiom.com
                                                                           
             Nancy Khln                                                    
             <nancy_merill@yah                                             
             oo.com>                                                    To 
             Sent by:                  ccielab@groupstudy.com              
             nobody@groupstudy                                          cc 
             .com                                                          
                                                                   Subject 
                                       Authentication vs Decryption!       
             12/01/2005 11:23                                              
             AM                                                            
                                                                           
                                                                           
             Please respond to                                             
                Nancy Khln                                                 
             <nancy_merill@yah                                             
                  oo.com>                                                  
                                                                           
                                                                           
  In a BOTunnel Source and destination must authenticate before encryption
takes place, now
  at the destination host, which security procedure is usually done first-
decryption or authentication? Any good white papers on this!
  Much appreciated.
  Thanks
  Nancy
---------------------------------
 Yahoo! Music Unlimited - Access over 1 million songs. Try it free.
This archive was generated by hypermail 2.1.4 : Mon Jan 09 2006 - 07:07:50 GMT-3