
cryptography use complex mathematical algorithms to encrypt and decrypt data.
Symantec pcAnywhere uses a standard combination of public-key cryptography
and symmetric encryption algorithms to ensure that the data you send cannot be
read or altered by unauthorized users while in transit.
About the Symantec Cryptographic Module
The Symantec Cryptographic Module that is included in Symantec pcAnywhere
contains algorithms that provide AES encryption at varying key lengths. The
Symantec Cryptographic Module has received Federal Information Processing
Standards (FIPS) 140-2 certification.
The FIPS 140-2 Security Requirements for Cryptographic Modules is a set of
standards developed by the National Institute of Standards and Technology (NIST).
The FIPS 140-2 standards apply to federal agencies that use cryptographic-based
security systems to protect sensitive but unclassified information in computer
and telecommunication systems. This security technology is mandated for many
government and financial instructions in the United States and Canada.
For more information about the FIPS 140-2 requirements or the validation process,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-2.htm
For more information about the Symantec Cryptographic Module and other
cryptographic modules that have passed FIPS 140-1 or 140-2 validation testing,
visit the Web site for the National Institute of Standards and Technology at the
following URL:
http://csrc.nist.gov/cryptval/140-1/1401val.htm
About symmetric encryption
Symmetric encryption encrypts and decrypts data using a set of symmetric
cryptographic keys that are randomly generated for each connection. These keys
are negotiated and exchanged using standard protocols for anonymous key
exchange. During a session, both the sender and the recipient share these keys.
The benefit of symmetric encryption is that it is easy to set up; however, it is not
without risk. Because the keys are exchanged anonymously, it is possible for
someone to intercept the data during the initial key exchange, manipulate the
keys used for this exchange, and discover the symmetric key. This type of
vulnerability is known as a Man in the Middle attack. The recipient has no way
of verifying that the data actually came from the person who originally sent it.
Securing your computer and sessions
Using encryption to protect data
212
Содержание PCANYWHERE - V12.1
Страница 1: ...Symantec pcAnywhere User s Guide 12164653 ...
Страница 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 ...
Страница 7: ...Select your country or language from the site index ...
Страница 8: ......
Страница 18: ...Contents 18 ...
Страница 30: ...Introducing Symantec pcAnywhere Where to find more information 30 ...
Страница 92: ...Allowing others to control your computer What you can do during a host session 92 ...
Страница 144: ...Controlling another computer remotely Connecting to a computer that does not have a host running 144 ...
Страница 252: ...Connecting across multiple platforms Navigating in a pcAnywhere CrossPlatform session 252 ...