HTML to PDF / DOCX / RTF Java converter library › Forums › PD4ML v3 Archived Forums (Read Only) › General questions / FAQ › Federal Government Export Law Compliance
- This topic has 1 reply, 2 voices, and was last updated Aug 10, 2009
11:48:46 by PD4ML.
-
AuthorPosts
-
August 5, 2009 at 19:44#26238
We are looking for feedback regarding the use of encryption technology within pd4ml because we have to provide answers to the following questions to the Federal Government. (We must include any Third Party Products which we use.)
Thank you.
- 1. Does your product perform “cryptography”, or otherwise contain any parts or components that are capable of performing any of the following “information security” functions?
(Mark with an “X” all that apply)-
a. _ encryption
b. _ decryption only (no encryption)
c. _ key management / public key infrastructure (PKI)
d. _ authentication (e.g., password protection, digital signatures)
e. _ copy protection
f. _ anti-virus protection
g. _ other, e.g., home grown scrambling (please explain): _______________________________
h. _ NONE / NOT APPLICABLE2. For items with encryption, decryption and/or key management functions (1.a, 1.b, 1.c above):
-
a. What symmetric algorithms and key lengths (e.g., 56-bit DES, 112 /168-bit Triple-DES, 128 / 256-bit AES / Rijndael) are implemented or supported?
b. What asymmetric algorithms and key lengths (e.g., 512-bit RSA /Diffie-Hellman, 1024 / 2048-bit RSA / Diffie-Hellman) are implemented or supported?
c. What encryption protocols (e.g., SSL, SSH, IPSEC or PKCS standards) are implemented or supported?
d. What type of data is encrypted?3. For products that contain an “encryption component”, can this encryption component be easily used by another product, or else accessed / re-transferred by the end-user for cryptographic use?
August 10, 2009 at 11:48#274281. Does your product perform “cryptography”, or otherwise contain any parts or components that are capable of performing any of the following “information security” functions?
(Mark with an “X” all that apply)a. X encryption
b. _ decryption only (no encryption)
c. _ key management / public key infrastructure (PKI)
d. X authentication (e.g., password protection, digital signatures)
e. _ copy protection
f. _ anti-virus protection
g. _ other, e.g., home grown scrambling (please explain): _______________________________
h. _ NONE / NOT APPLICABLE2. For items with encryption, decryption and/or key management functions (1.a, 1.b, 1.c above):
a. What symmetric algorithms and key lengths (e.g., 56-bit DES, 112 /168-bit Triple-DES, 128 / 256-bit AES / Rijndael) are implemented or supported?
ARC4 (ARCFOUR) 40-128bit
b. What asymmetric algorithms and key lengths (e.g., 512-bit RSA /Diffie-Hellman, 1024 / 2048-bit RSA / Diffie-Hellman) are implemented or supported?
–
c. What encryption protocols (e.g., SSL, SSH, IPSEC or PKCS standards) are implemented or supported?
–
d. What type of data is encrypted?
Text content, images, attachments, textual meta data
3. For products that contain an “encryption component”, can this encryption component be easily used by another product, or else accessed / re-transferred by the end-user for cryptographic use?
No way
-
AuthorPosts
The forum ‘General questions / FAQ’ is closed to new topics and replies.