
100 MetaFrame Solutions Guide
SecureICA Services offers the following features:
K
128-bit encryption during user authentication
To ensure account security, SecureICA uses 128-bit encryption during the
authentication phase.
K
Strong session encryption and flexible encryption support
The 128-bit encryption level is considered virtually impossible to break with
current technology. The 40-bit and 56-bit encryption levels require a
significant investment in time and money to break with a brute force attack.
The availability of 56-bit encryption for global use provides an international
data encryption solution.
K
Per-connection encryption support
Different encryption levels can be used for each connection. For example, a
dial-up connection with 40-bit encryption and a LAN connection with 128-bit
encryption can be used simultaneously.
K
Cross client compatibility
SecureICA Clients are available for DOS, Win16, Win32, and the ICA Web
Client Netscape Plug-in and Internet Explorer ActiveX control.
K
Enforceable encryption levels
The Citrix server administrator can enforce minimum encryption levels on a
per-connection and per-user (W
INFRAME only) basis. ICA Client connections
are allowed only if the ICA Client is using at least the minimum level.
K
Dynamic key generation
The SecureICA server and client generate unique RC5 keys for each
connection. A system service periodically generates new Diffie-Hellman
parameters in the background, providing an enhanced level of security.
Understanding Encryption
Encryption is the process of obscuring the true meaning of a message so that only
the intended recipient can understand it.
The encryption process transforms data into a form that is unreadable to anyone
without a special piece of information. This information allows the recipient to
unscramble or decrypt the message. This piece of information is called a key.
The process used to create the scrambled message is called an encryption
algorithm.
There are two general types of encryption algorithms. A symmetric key algorithm
uses the same key to encrypt and decrypt the scrambled data. This means the
secret key must never be revealed to anyone but the intended recipient of the data.
The advantage of a symmetric key algorithm is its speed.
Comentarios a estos manuales