About Encryption

The Application Control and Device Control applications use two encryption algorithms to secure data in transit and data at rest.

The encryption algorithms used are:

  • Advanced Encryption Standard (AES) 256-bit encryption
  • RSA (for Rivest, Shamir, and Adleman)

Using these algorithms Application Control and Device Control accomplish the primary criteria used measure the effectiveness of a cryptographic method:

  • Confidentiality (privacy), only an authorized recipient can extract the original data from the encrypted message.
  • Integrity, a recipient can determine whether the data was altered during the transmission.
  • Authentication, a recipient can unmistakably identify the sender and verify who actually sent the data.
  • Non-repudiation, a sender cannot deny sending the data.