[Last Call] Learn how to a build a cloud-first strategyRegister Now

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 427
  • Last Modified:

encryption standards

Hey - you know when people refer to stuff like federal info processing standards are they on about disk level encryption? Or data in transit?
For example are there FIPS compliant protocols? Or is it just FIPS compliant encryption software for data at rest?
For example if someone sells your FIPS compliant encryption - what are they selling you? A disc encryption, or someone sort of encrypted certifacate?
Excuse my ingorance (please bare that in mind in your responses).
  • 2
2 Solutions
pma111Author Commented:
pma111Author Commented:
Using FIPS compliant algorithms most of the  vendors integrated in to their products.
For example Microsoft using 3DES algoritham in their NTFS file system.
IBM using cryptographic libraries on Notes and Domino 8.0.1 on platform.
FIPS is a compliance standard - FIPS 140 is relevant for cryptographic products and specifically 140-1 140-2. They are more focused on tamper evident and tamper resistant features for cryptographic key exchange, key storage and key management rather than use of specific algorithms.

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now