beautypg.com

8 encryption and compression, Encryption, Cryptographic algorithms – HP Data Protector Express Basic-Software User Manual

Page 55: Chapter 8

background image

8 Encryption and Compression

In this chapter

Encryption for Backup Jobs
Compression
Key Management

Encryption

Encryption is the process of changing data into a form that cannot be read until it is deciphered,

protecting the data from unauthorized access and use. Company policy normally determines when

encryption is required.
For example, it may be mandatory for company confidential and financial data, but not for personal data.

Company policy will also define how encryption keys should be generated and managed.

The current version of Data Protector Express provides the user with the ability to encrypt the data that is

written to the media and fully implements the Advanced Encryption Standard (AES) for both hardware

and software encryption.

Hardware encryption is supported on some backup devices, such as HP LTO-4 tape drives. It is

faster than software encryption and requires no processing on the backup server. The encryption

strength is determined by the backup device. HP LTO-4 tape drives always provide strong AES-256

encryption. This feature can be managed by a backup application that supports hardware

encryption, such as Data Protector Express.

Software encryption uses the encryption algorithms available within Data Protector Express. The

user selects an encryption strength: Low 56 bit, Medium 128-bit or High 256-bit. Each encryption

key size causes the algorithm to behave slightly differently. Increasing software encryption strength

makes the data more secure, but requires more processing power.

If your business requires you to use encryption, Data Protector Express allows you to set the required

encryption types and levels. This chapter contains important information about data encryption.

Cryptographic Algorithms

Cryptographic algorithms are the basic components of cryptographic applications. It is important to

understand that as you increase the complexity of the encryption the information gets closer to impossible

to read and the load on your machine, for software-based encryption, will increase.

Software

Three cryptographic algorithms are provided. These three settings provide three levels of

resistance which require progressively more CPU time to convert the same amount of data. The three

options are for the software encryption mode only.

Low – DES 56-bit

Medium – AES 128-bit

High – AES 256-bit

Hardware

The cryptographic algorithm provided by hardware devices that provide this feature is not

under Data Protector Express control. The hardware provides configuration and operating parameters

via a special encryption command. The device driver adjusts its crypto session settings from this input.

Hardware encryption is an on/off feature, you do not have the ability to adjust the encryption level

through the Data Protector Express interface. By default Data Protector Express will attempt to use the

highest encryption algorithm supported on the device, if the device supports multiple algorithms. If the

User’s Guide

55

This manual is related to the following products: