7 encryption and compression, Encryption – HP Data Protector Express Basic-Software User Manual
Page 40
7 Encryption and Compression
Encryption
Encryption is the process of changing data into a form that cannot be read until it is deciphered,
protecting the data from unauthorized access and use. Company policy normally determines when
encryption is required.
For example, your company may require encryption for company confidential and financial data,
but not for personal data. Company policy will also define how encryption keys should be generated
and managed.
Data Protector Express provides the ability to encrypt the data that is written to the media and fully
implements the Advanced Encryption Standard (AES) for both hardware and software encryption.
•
Hardware encryption is supported on some backup devices, such as HP LTO-4 tape drives.
Hardware encryption is faster than software encryption and requires no processing on the
backup server. The encryption strength is determined by the backup device. HP LTO-4 and
later generation tape drives always provide strong AES-256 encryption. This feature can be
managed by a backup application that supports hardware encryption, such as Data Protector
Express.
•
Software encryption uses the encryption algorithms available within Data Protector Express.
You can select an encryption strength: Low 56 bit, Medium 128-bit or High 256-bit. Each
encryption key size causes the algorithm to behave slightly differently. Increasing software
encryption strength makes the data more secure, but requires more processing power.
Cryptographic Algorithms
Cryptographic algorithms are the basic components of cryptographic applications. As the complexity
of the encryption algorithm increases, the information gets harder to read, and for software-based
encryption, the load on the machine increases.
Software
Three cryptographic algorithms are provided. These three settings provide three levels of resistance
which require progressively more CPU time to convert the same amount of data. The three options
are for the software encryption mode only.
•
Low – DES 56-bit
•
Medium – AES 128-bit
•
High – AES 256-bit
Hardware
The cryptographic algorithm provided by hardware devices that provide hardware encryption is
not under Data Protector Express control. The device provides access to configuration and operating
parameters via a device-specific encryption method. In Data Protector Express, you can enable or
disable hardware encryption, but you cannot adjust the encryption level or algorithm through the
Data Protector Express interface. If the device supports multiple encryption algorithms, Data Protector
Express will attempt to use the highest encryption algorithm supported on the device. If the device
does not support encryption, you will be prompted with an alert saying that the device cannot be
used because it does not support hardware encryption.
40
Encryption and Compression