Slide 43 of 45
Notes:
Host id is accomplished through use of public key/private key technology.
Authentication and encryption uses RSA reference library
Looking at additional security options to better support its use outside the U.S. Can provide 2 distributions one with full security, one with none, looking at possible support for 40 bit keys (crackable in 2 hours on PC, but session probably over by then, and use new key) or in early deployment simply turn off encryption.