| Encryption technologies |
|
Main supported algorythms to choose from in the configuration of each encrypted link include IDEA, AES, Blowfish, Twofish, CAST, DES, Tripple-DES. Main supported key exchange protocols include secret keys, preshared keys, IKE and X.509 Certificates with public/private keys exchanges. Lightning's products have been approved and are used in all security-sensitive applications, ranging from Swiss-banks, government, defense and commercial applications, up to aerospace applications. |
| < Prev | Next > |
|---|


Lightning's products support optionally world-class strong
encryption. This includes a broad range of cypher-algorithms to
choose from for security and interoperability reasons, encryption
protocols, keys etc.