User's Manual

Table Of Contents
TD 92579EN
15 October 2014 / Ver. M
Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 7.2.X)
4
Cryptography tasks can be divided into the two general categories Encryption and
Authentication.
Encryption
Encryption is the
scrambling of information so that the original message cannot be
determined by unauthorized recipients by applying an encryption algoritm to the message
plaintext producing ciphertext (appearently random bits). A decryption algoritm, if given
the correct key, converts the ciphertext back into plaintext. Public key algoritms use paired
keys, one for encryption and another for decryption.
Authentication
Authentication is the verification of a message’s sender. This requires the message to be
pr
otected so it cannot be altered, usually by generating a digital signature formed by a
hash of the message. Only the correct key can generate a valid signature.