When encryption incompatibilities occur, it's typically due to using these older algorithms. Symantec recommends always staying on the latest versions of software so that you continue to use safe and secure encryption and hashing algorithms. From time to time older encryption and hashing algorithms may be used by third-party vendors and this is typically due to using outdated software. Not all third-party encryption software ensures this is done. Symantec Encryption Desktop uses encryption and hashing algorithms that are considered safe and secure. SEE 11.3.0 and above is recommended.Īll of the above algorithms are generally talking about Drive Encryption technologies and there are other encryption and hashing algorithms used by PGP key for file and email encryption. Note: Older versions of SED used PlumbCFB so to take advantage of the current standards, ensure you are running the latest version of these encryption products. The section "currentkey valid="true" alg="9"/>" lists 9 as the current algorithm. Pgpwde -status -disk 0 -xml -passphrase "passphrase here". If using a 64-bit operating system, the proper directory is:Ĭ:\Program Files \PGP Corporation\PGP Desktop> To find out which algorithm was used on a machine that was PGP Whole Disk encrypted, the pgpwde utility must be used via the command line.Ĭ:\Program Files\PGP Corporation\PGP Desktop> Symantec Encryption Desktop 10.4.2 and above also use AES256 for file encryption.Īdditional information for Symantec Encryption Desktop and how to tell which algorithm is being used: Symantec Endpoint Encryption NIST Certification Symantec Encryption Desktop NIST Certification. See the following articles for information on this: ![]() S ymantec Endpoint Encryption Removable Media Encryption (RME) uses AES256 with a 256-bit key.īoth Symantec Encryption Desktop 10 and Symantec Endpoint Encryption 11 are NIST certified, which comply with current NIST requirements including strong ciphers for encryption. In the screenshot below, a PGP Key was generated on the Symantec Encryption Management Server, and then imported into PGP Command Line to view all the key details and attributes (As of version 10.5):Īs can be seen above, all the latest ciphers and hashes are available for PGP Key encryption by default. Similar to all the attributes of PGP Keys for the Symantec Encryption Desktop and PGP Command Line Products, the PGP Server generates keys with all the capabilities of the highest algorithms available.Ī key generated on the PGP Server by default will have all these attributes. Keys Generated by Symantec Encryption Management Server (PGP Server) For example, multiple encryption algorithms are available such as AES, CAST, TripleDES, IDEA or Twofish with supported hashes of SHA-2-256, SHA-2-384, SHA-2-512, RIPEMD-160 or SHA-1. SED will always encrypt to the preferred algorithms specified on the key for backwards compatibility. ![]() Symantec Encryption Desktop (PGP Desktop) and PGP Command Line use PGP Keys and has the capability to use AES256 for encryption should the recipient support this.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |