We use cookies on this website. To find out more about cookies and how they are used on this website, see our Privacy Policy.
By clicking ‘Continue’, you hereby agree with our use of cookies.

Declaration

Cryptographic Mechanisms

The following are the cryptographic mechanisms used:

  • The HTTPS protocol, SSL cryptographic protocol, RSA encryption algorithm, and 1024-bit key length are used for commanding encryption control.
  • The SSH cryptographic protocol, RSA encryption algorithm, and 1024-bit key length are used for commanding encryption control.
  • The CHAP protocol, MD5 cryptographic hash-function, and 128-bit key length are used for authentication (access control) when connecting to an iSCSI device’s volumes.
  • The Rsync protocol, SSH cryptographic protocol, AES encryption algorithm, integrity checkup with HMAC-SHA1, and 128-bit key length are used for remote control when synchronizing two analogue subsystems, built in a data transfer tunnel (not the technological channel for system telecommunications).
  • The SMB v3.0 protocol, AES encryption algorithm, AES-CMAC mode, and 128-to-256-bit key length are used for accessing data in files kept in the storage system (not the technological channel for system telecommunications).
  • The RSA encryption algorithm, 2048-bit key length, and integrity checkup SHA-256 (256 bits) are used to allow starting up the operating systems or when upgrading the firmware, also used for protection against hardware dissembling.
  • The SFTP protocol, SSH cryptographic protocol, AES encryption algorithm, integrity checkup with HMAC-SHA1, and 128-bit key length are used for remote management between the client and the storage subsystem (not the technological channel).
  • EonCloud technology (service/gateway for data transfer between the local storage system and cloud service providers, e.g. Amazon S3, Microsoft Azure, or OpenStack Swift), HTTPS protocol, SSL cryptographic protocol, RSA encryption algorithm, and 2048-bit key length are used for data transfer protection between the storage subsystem and cloud service providers within an operating system Linux CentOS (not the technological data transfer channel).
  • The FTPS protocol, SSL cryptographic protocol, RSA encryption algorithm, and 1024-bit key length are used for authentication between the client and the storage subsystem (not the technological channel).