Hp Secure Encryption Uživatelský manuál Strana 70

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 76
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 69
Appendix 70
Appendix
Encryption algorithms
In keeping with the encryption standards outlined in FIPS 140-2
(http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf), controllers utilizing HP
Secure Encryption are designed to meet FIPS-140-2 Level 2 requirements by implementing both physical
security and cryptographic methods in protecting data-at-rest. Specifically, HP Secure Encryption satisfies the
cryptographic requirements established in FIPS 140-2 by using NIST-approved algorithms in protecting both
data and encryption keys. For more information, see the Cryptographic Algorithm Validation Program
website (http://csrc.nist.gov/groups/STM/cavp/standards.html).
Algorithm Description
XTS-AES 256-bit
The XTS algorithm is used to encrypt data on the drive platter as described in NIST
special publication SP 800-38E.
AES-ECB
The AES algorithm is used to perform symmetric key encryption.
SHA-256
The SHA secure hashing algorithms are described in FIPS 180-4.
HMAC
The HMAC algorithm is described in the FIPS 198-1 standard.
PBKDF2
The PBKDF2 algorithm derives cryptographic keying material from user-provided
passwords. The algorithm is described in NIST special publication SP 800-132.
DRBG
An implementation of the SP800-90A algorithm is used to produce random bit
sequences.
Zobrazit stránku 69
1 2 ... 65 66 67 68 69 70 71 72 73 74 75 76

Komentáře k této Příručce

Žádné komentáře