Security Basics mailing list archives

Re: IP Encryption


From: "Vladimir B. Kropotov" <slyman2000 () mail ru>
Date: Tue, 16 Dec 2003 13:12:52 +0300

Hi!
I think you must use threshold cryptography instead using the same  keys for
all devices. Or another way - you must store the same private key in every
device of your network and use this key to encrypt session keys In that case
you'll be able to encrypt any packet BUT what you gona do if you loose or
compromise the PRIVATE key??? The same keys is not a good idea!

Regards
Vladimir B. Kropotov

----- Original Message -----
From: <Clive.Madden () barclayscapital com>
To: <security-basics () securityfocus com>
Sent: Friday, December 12, 2003 6:54 PM
Subject: IP Encryption



Are there any IP encryption products out there that do not require the
exchange of keys or have no concept of remote peering (tunnelling).
Instead
each device encrypts data based on PKI centralised keys which are all the
same for all encryptors. So if a packet is encrypted no matter the
destination, as long as an encryptor is in the path the device knows how
to
decrypt it. We are looking at deploying this over MPLS with an encryption
device at every entry point to the cloud. Any help gratefully appreciated.

Thanks
C.


------------------------------------------------------------------------
For more information about Barclays Capital, please
visit our web site at http://www.barcap.com.


Internet communications are not secure and therefore the Barclays
Group does not accept legal responsibility for the contents of this
message.  Although the Barclays Group operates anti-virus programmes,
it does not accept responsibility for any damage whatsoever that is
caused by viruses being passed.  Any views or opinions presented are
solely those of the author and do not necessarily represent those of the
Barclays Group.  Replies to this email may be monitored by the Barclays
Group for operational or business reasons.

------------------------------------------------------------------------


--------------------------------------------------------------------------
-
--------------------------------------------------------------------------
--




---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: