题目内容

1. Private key algorithm vs. public key algorithm? (Com-pare their computation complexity, security, and usage.)

查看答案
更多问题

2. How can we combine the private key algorithm andthe public key algorithm?

3. Where do we use transport-mode IPSec and tunnel-mode IPSec, respectively? What parts o the packetsdo they encrypt?

4. In tunnel-mode IPSec, i authentication is done beoreencryption, what sequence o headers would we havein the packets? (The headers include AH (Authentica-tion Header), ESP (Encapsulation Security Payload),IP, TCP or UDP.)

5. Packet-f lter vs. application-proxy f rewalls? (Com-pare their purpose and where they are implemented inLinux systems.)

答案查题题库