About Encryption
The Application Control and Device Control applications use two encryption algorithms to secure data in transit and data at rest.
The encryption algorithms used are:
- Advanced Encryption Standard (AES) 256-bit encryption
- RSA (for Rivest, Shamir, and Adleman)
Using these algorithms Application Control and Device Control accomplish the primary criteria used measure the effectiveness of a cryptographic method:
- Confidentiality (privacy), only an authorized recipient can extract the original data from the encrypted message.
- Integrity, a recipient can determine whether the data was altered during the transmission.
- Authentication, a recipient can unmistakably identify the sender and verify who actually sent the data.
- Non-repudiation, a sender cannot deny sending the data.