Data Encryption - Approved Encryption Algorithms and Protocols
Section outline
-
The Company uses a variety of encryption methods depending on the nature of the information being stored or transferred, its location, and its use. Below are the standard and acceptable forms of encryption used by The Company.
Symmetric Key Encryption Algorithms
Advanced Encryption Standard (AES)- Minimum encryption key length of 256 bits
Asymmetric Key Encryption Algorithms
Digital Signature Standard (DSS)
Elliptic Curve Digital Signature Algorithm (ECDSA)
RSA
Encryption Protocols
IPSec (IP Security)
SSH (Secure Shell)
TLS (Transport Layer Security)
S/MIME (Secure Multipurpose Internet Extension)