First, the identity of the sender is authenticated because, as mentioned above, successful decryption using the sender's public key verifies that the message digest
was encrypted using the sender's private key, which presumably is used only by the sender.
The Alcatel OmniAccess 210 combines VPN features including IPsec tunneling, Diffie-Hellman key exchange, Message Digest
5 (MD5) and Secure Hash Algorithm (SHA-1) hashing functions, Digital Signature Algorithm (DSA) and RSA digital signatures, Data Encryption Standard (DES and 3DES), and Advanced Encryption Standard (AES) encryption algorithms.
Altera completes the IPSec solution with the availability of two new cores -- Secure Hash Algorithm (SHA-1) and Message Digest
NTRU includes public key cryptography functions and tools for hashing and message digest
The SonicWALL ASIC accelerates today's standard IP Security (IPSec) algorithms, including Triple Data Encryption Standard (3DES) and Data Encryption Standard (DES), Secure Hash Algorithm (SHA-1) and Message Digest
CBIG IPSec creates secure tunnels through non-trusted networks, encrypts data using 3DES algorithms, offers authentication with secret key and such other IPSec-related tasks as message digest
or secure hash, key exchange, storage of security associations and security policy procedures.
4 Gbps wirespeed performance for today's state-of-the-art strong security algorithms such as Triple Data Encryption Standard (3DES)-CBC, Hashed Message Authentication Code -- Secure Hash Algorithm (HMAC-SHA-1), and Hashed Message Authentication Code -- Message Digest
(HMAC-MD5) IPSec processing.
Dallas' most sophisticated iButton, the DS1957 Java-powered crypto iButton, integrates in one chip the functions necessary for secure Internet transmission: a microprocessor for generating the secure message digest
used in digital signatures, a high-speed math accelerator to perform public key digital signatures, and secure storage for the private keys used in public key cryptography.
It introduces such features as real time cryptographic binary control via Message Digest
Algorithm Execution, real time restricted process information directly controlled via the kernel, and real time socket control via registered sockets.