encryption standards

Posted on 2011-10-10
Last Modified: 2012-05-12
Hey - you know when people refer to stuff like federal info processing standards are they on about disk level encryption? Or data in transit?
For example are there FIPS compliant protocols? Or is it just FIPS compliant encryption software for data at rest?
For example if someone sells your FIPS compliant encryption - what are they selling you? A disc encryption, or someone sort of encrypted certifacate?
Excuse my ingorance (please bare that in mind in your responses).
Question by:pma111
    LVL 3

    Author Comment

    LVL 3

    Author Comment

    LVL 4

    Accepted Solution

    Using FIPS compliant algorithms most of the  vendors integrated in to their products.
    For example Microsoft using 3DES algoritham in their NTFS file system.
    IBM using cryptographic libraries on Notes and Domino 8.0.1 on platform.
    LVL 3

    Assisted Solution

    FIPS is a compliance standard - FIPS 140 is relevant for cryptographic products and specifically 140-1 140-2. They are more focused on tamper evident and tamper resistant features for cryptographic key exchange, key storage and key management rather than use of specific algorithms.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    The article explains the protocols and technology which is involved when two computers on different TCP/IP networks communicate with each other. In the diagram, a router is used to segregate two networks. The networks are and 192…
    Please see preceding article here: Figure 1 After Root Bridge has been elected, then what?..... Let's start by defining a Root Port in la…
    Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now