This section lists the supported cryptographic algorithms and standards supported by SSH Tectia client/server solution.
The following data integrity algorithms are supported:
* Supported with SSH Tectia Server (with EFT) and Server (with Tunneling)
For symmetric session encryption, the following algorithms are supported:
* Supported with SSH Tectia Server (with EFT) and Server (with Tunneling)
SSH Tectia Server for IBM z/OS supports hardware acceleration on cryptographic operations with the following:
3DES
AES
SHA-1
RNG (random number generation)
SSH Tectia Server, Client, and Connector can be operated in FIPS mode, using a version of the cryptographic library that has been certified according to the Federal Information Processing Standard (FIPS) 140-2.
The FIPS 140-2 Cryptographic Library has been validated for the following operating systems:
Microsoft Windows XP
Sun Solaris 8
HP-UX 11.11
In addition, the FIPS 140-2 Cryptographic Library is supported on the following operating systems:
Microsoft Windows 2000, Server 2003, and Vista (for SSH Tectia Client)
Sun Solaris 9 and 10
Red Hat Enterprise Linux 3, 4, and 5
AIX 5.3
HP-UX 11.23