Wednesday, July 21, 2021

Vpn Negotiations Phase 1 and 2

For phase 1 tunnel negotiations symmetric algo is used and the key is securely generated using dh groups and in phase 2 tunnel negotiations esp protocol is used for securing data and esp uses aes algo (for eg) for encryption but how key is generated on both devices in phase 2 how other device decrypts the encrypted data?



No comments:

Post a Comment