Encryption technologies |
Main supported algorythms to choose from in the configuration of each encrypted link include IDEA, AES, Blowfish, Twofish, CAST, DES, Tripple-DES. Main supported key exchange protocols include secret keys, preshared keys, IKE and X.509 Certificates with public/private keys exchanges. Lightning's products have been approved and are used in all security-sensitive applications, ranging from Swiss-banks, government, defense and commercial applications, up to aerospace applications. |
< Prev | Next > |
---|