SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
This section lists the supported cryptographic algorithms and standards supported by SSH Tectia client/server solution.
The following data integrity algorithms are supported:
* Supported with SSH Tectia Server (with EFT) and Server (with Tunneling)
For symmetric session encryption, the following algorithms are supported:
* Supported with SSH Tectia Server (with EFT) and Server (with Tunneling)
SSH Tectia Server for IBM z/OS supports hardware acceleration on cryptographic operations with the following:
3DES
AES
SHA-1
RNG (random number generation)
SSH Tectia Server, Client, and Connector can be operated in FIPS mode, using a version of the cryptographic library that has been certified according to the Federal Information Processing Standard (FIPS) 140-2.
The FIPS 140-2 Cryptographic Library has been validated for the following operating systems:
Microsoft Windows XP
Sun Solaris 8
HP-UX 11.11
In addition, the FIPS 140-2 Cryptographic Library is supported on the following operating systems:
Microsoft Windows 2000 and Server 2003
Sun Solaris 2.6, 9, 10
Red Hat Enterprise Linux 3
AIX 5.3
HP-UX 11.00, 11.22, 11.23