You are asked to implement the hashing algorithm that uses the most bits in the calculation on your Junos security device.
Which algorithm should you use?
A. SHA-512
B. SHA-256
C. MD5-Plus
D. MD5
2 Comments on “Which algorithm should you use?”
Mikesays:
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.
0
0
http://www.juniper.net/documentation/en_US/junos13.2/topics/task/configuration/services-ike-proposals-configuring.html
[edit services ipsec-vpn ike proposal proposal-name]
authentication-algorithm (md5 | sha1 | sha-256);
0
0