Just so I understand (crypto is a tough subject for me), if one knows the
length of a packet before crypto processing, it becomes a weakness
because....(fill in the blank).







""Howard C. Berkowitz""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> At 12:03 AM +0000 1/13/03, Steven A. Ridder wrote:
> >I agree with Matt. The PIX 515 introduces jitter.  Not sure what the
Cisco
> >IPT Safe document is talking about.
>
> This may be a rather obscure point, but if a cryptographic device
> takes different amounts of time to encrypt and decrypt equal-length
> blocks of text with different contents, it is a cryptographic
> vulnerability and may also provide a covert channel.
>
> These time differences, however, have to be constant.  If they are
> simply a function of processing load, there is no vulnerability.
>
> Latency is not a cryptosecurity issue, although, obviously, it can
> affect speech intelligibility.
>
> >
> >
> >""Matt Hill""  wrote in message
> >[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> >>  Good luck..
> >>
> >>  However you will get latency and jitter issues during the time the
PIXs
> >>  encrypt/decrypt the voice packets...
> >>
> >>  Matt
> >>
> >>  > -----Original Message-----
> >>  > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf
> >>  Of
> >>  > Simer Mayo
> >>  > Sent: Friday, 10 January 2003 6:05 PM
> >>  > To: [EMAIL PROTECTED]
> >>  > Cc: [EMAIL PROTECTED]
> >>  > Subject: VoIP from behind PIX
> >>  >
> >>  > 1. Will PIX 515 handle VoIP traffic?
> >>  > 2. Will PIX 501 handle VoIP traffic?
> >>  > 3. Can we VPN between 2 (site-to-site) and pass VoIP traffice thru
the
> >>  > VPN
> >>  >
> >>  > Thanks
> >>  >
> >  > > Simer




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=60956&t=60859
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to