About The Symantec Cryptographic Module; About Symmetric Encryption - Symantec PCANYWHERE 12.0 User Manual

Hide thumbs Also See for PCANYWHERE 12.0:
Table of Contents

Advertisement

About the Symantec Cryptographic Module

About symmetric encryption

cryptography use complex mathematical algorithms to encrypt and decrypt data.
Symantec pcAnywhere uses a standard combination of public-key cryptography
and symmetric encryption algorithms to ensure that the data you send cannot be
read or altered by unauthorized users while in transit.
The Symantec Cryptographic Module that is included in Symantec pcAnywhere
contains algorithms that provide AES encryption at varying key lengths. The
Symantec Cryptographic Module has received Federal Information Processing
Standards (FIPS) 140-2 certification.
The FIPS 140-2 Security Requirements for Cryptographic Modules is a set of
standards developed by the National Institute of Standards and Technology (NIST).
The FIPS 140-2 standards apply to federal agencies that use cryptographic-based
security systems to protect sensitive but unclassified information in computer
and telecommunication systems. This security technology is mandated for many
government and financial instructions in the United States and Canada.
For more information about the FIPS 140-2 requirements or the validation process,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-2.htm
For more information about the Symantec Cryptographic Module and other
cryptographic modules that have passed FIPS 140-1 or 140-2 validation testing,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-1/1401val.htm
Symmetric encryption encrypts and decrypts data using a set of symmetric
cryptographic keys that are randomly generated for each connection. These keys
are negotiated and exchanged using standard protocols for anonymous key
exchange. During a session, both the sender and the recipient share these keys.
The benefit of symmetric encryption is that it is easy to set up; however, it is not
without risk. Because the keys are exchanged anonymously, it is possible for
someone to intercept the data during the initial key exchange, manipulate the
keys used for this exchange, and discover the symmetric key. This type of
vulnerability is known as a Man in the Middle attack. The recipient has no way
of verifying that the data actually came from the person who originally sent it.
Securing your computer and sessions
Using encryption to protect data
205

Advertisement

Table of Contents
loading

This manual is also suitable for:

14541094 - pcanywhere host & remote

Table of Contents