To strengthen algorithms, keys were invented.

  • Cryptography keys encrypt and decrypt your plain text and cipher text information.
  • Requiring a key to be used in this process allows the algorithm to be released to the public for testing, ensuring that it's a strong algorithm.

Since vendors document which algorithms they use for their VPNs, and hackers can get copies of cipher text using sniffers, the strength of your security lies within the key.