cryptography use complex mathematical algorithms to encrypt and decrypt data.
Symantec pcAnywhere uses a standard combination of public-key cryptography
and symmetric encryption algorithms to ensure that the data you send cannot be
read or altered by unauthorized users while in transit.
About the Symantec Cryptographic Module
The Symantec Cryptographic Module that is included in Symantec pcAnywhere
contains algorithms that provide AES encryption at varying key lengths. The
Symantec Cryptographic Module has received Federal Information Processing
Standards (FIPS) 140-2 certification.
The FIPS 140-2 Security Requirements for Cryptographic Modules is a set of
standards developed by the National Institute of Standards and Technology (NIST).
The FIPS 140-2 standards apply to federal agencies that use cryptographic-based
security systems to protect sensitive but unclassified information in computer
and telecommunication systems. This security technology is mandated for many
government and financial instructions in the United States and Canada.
For more information about the FIPS 140-2 requirements or the validation process,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-2.htm
For more information about the Symantec Cryptographic Module and other
cryptographic modules that have passed FIPS 140-1 or 140-2 validation testing,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-1/1401val.htm
About symmetric encryption
Symmetric encryption encrypts and decrypts data using a set of symmetric
cryptographic keys that are randomly generated for each connection. These keys
are negotiated and exchanged using standard protocols for anonymous key
exchange. During a session, both the sender and the recipient share these keys.
The benefit of symmetric encryption is that it is easy to set up; however, it is not
without risk. Because the keys are exchanged anonymously, it is possible for
someone to intercept the data during the initial key exchange, manipulate the
keys used for this exchange, and discover the symmetric key. This type of
vulnerability is known as a Man in the Middle attack. The recipient has no way
of verifying that the data actually came from the person who originally sent it.
205
Securing your computer and sessions
Using encryption to protect data
Summary of Contents for 14541094 - pcAnywhere Host & Remote
Page 1: ...Symantec pcAnywhere User s Guide 10529206...
Page 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1...
Page 7: ...Select your country or language from the site index...
Page 8: ......
Page 18: ...Contents 18...
Page 30: ...Introducing Symantec pcAnywhere Where to find more information 30...
Page 46: ...Installing Symantec pcAnywhere Post installation tasks 46...
Page 90: ...Allowing others to control your computer What you can do during a host session 90...
Page 188: ...Automating file transfer and management tasks Running a command queue file 188...
Page 220: ...Securing your computer and sessions Ways to assess host security 220...