This section lists the supported cryptographic algorithms and standards supported by SSH Tectia client/server solution.
The following data integrity algorithms are supported:
* Supported with SSH Tectia Server (with EFT) and Server (with Tunneling)
For symmetric session encryption, the following algorithms are supported:
* Supported with SSH Tectia Server (with EFT) and Server (with Tunneling)
SSH Tectia Server for IBM z/OS supports hardware acceleration on cryptographic operations with the following:
3DES
AES
SHA-1
RNG (random number generation)
SSH Tectia Server, Client, and Connector can be operated in FIPS mode, using a version of the cryptographic library that has been certified according to the Federal Information Processing Standard (FIPS) 140-2.
The FIPS 140-2 Cryptographic Library has been validated for the following operating systems:
Microsoft Windows XP
Sun Solaris 8
HP-UX 11.11
In addition, the FIPS 140-2 Cryptographic Library is supported on the following operating systems:
Microsoft Windows 2000 and Server 2003
Sun Solaris 2.6, 9, 10
Red Hat Enterprise Linux 3
AIX 5.3
HP-UX 11.00, 11.22, 11.23