Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Data Integrity Algorithms

The following data integrity algorithms are supported:

  • CryptiCore (Badger) (16-byte key)

  • HMAC MD5 (16-byte key, FIPS PUB 198)

  • HMAC SHA-1 (20-byte key, FIPS PUB 198)



Want to see how PrivX can help your organisation?

Are you a DEVELOPER accessing cloud hosts, are you a IT ADMIN managing access & credentials in your corporation, are you BUSINESS MANAGER and want to save money or are you responsible of IT SECURITY in DevOps