For phase 1 tunnel negotiations symmetric algo is used and the key is securely generated using dh groups and in phase 2 tunnel negotiations esp protocol is used for securing data and esp uses aes algo (for eg) for encryption but how key is generated on both devices in phase 2 how other device decrypts the encrypted data?
No comments:
Post a Comment