Your browser does not allow storing cookies. We recommend enabling them.

Tectia

Encryption Algorithms

For session encryption, the following symmetric algorithms are supported:

  • 3DES (168-bit key)

  • AES (128-, 192-, and 256-bit key, CBC and CTR modes)

  • Arcfour (128-bit key)

  • Blowfish (128-bit key)

  • SEED (128-bit key)

  • Twofish (128-, 192-, or 256-bit key)

  • CryptiCore Rabbit (128-bit key)


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now