000
| 02621nam 2200349za 4500 |
---|
001 | 9.843597 |
---|
003 | CaOODSP |
---|
005 | 20230713113540 |
---|
007 | cr ||||||||||| |
---|
008 | 170914s2016 onc ob f000 0 eng d |
---|
040 | |aCaOODSP|beng |
---|
043 | |an-cn--- |
---|
086 | 1 |aD97-3/111-2016E-PDF |
---|
245 | 00|aCryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information |h[electronic resource]. |
---|
260 | |a[Ottawa] : |bCommunications Security Establishment, |c2016. |
---|
300 | |a24 p. |
---|
490 | 1 |aPractitioner series, information technology security guidance ; |vITSP.40.111 |
---|
500 | |aIssued also in French under title: Algorithmes cryptographiques pour l'information NON CLASSIFIÉ, PROTÉGÉ A et PROTÉGÉ B. |
---|
500 | |aCover title. |
---|
500 | |a"Unclassified." |
---|
500 | |a"August 2016." |
---|
500 | |aIssued also in HTML format. |
---|
504 | |aIncludes bibliographical references. |
---|
520 | |a"The Government of Canada’s (GC) ability to protect sensitive data and information is fundamental to the delivery of programs and services. Cryptography provides security mechanisms which can be used to protect the authenticity, confidentiality, and integrity of GC information. Data authenticity, confidentiality and integrity, stakeholder authentication and accountability, and non-repudiation are all benefits of properly configured cryptography. Several algorithms may be required to satisfy these security requirements, and each algorithm should be selected and implemented to ensure these requirements are met. The information in this publication identifies and describes approved cryptographic algorithms and appropriate methods of use to protect the confidentiality of PROTECTED A and PROTECTED B information and the integrity of information to the medium injury level as defined in CSE’s ITSG-33 IT Security Risk Management: A Lifecycle Approach"--Overview, p. 3. |
---|
692 | 07|2gccst|aFederal government |
---|
692 | 07|2gccst|aComputer security |
---|
710 | 2 |aCommunications Security Establishment (Canada) |
---|
775 | 08|tAlgorithmes cryptographiques pour l'information NON CLASSIFIÉ, PROTÉGÉ A et PROTÉGÉ B |w(CaOODSP)9.843598 |
---|
830 | #0|aPractitioner series, information technology security guidance (Communications Security Establishment (Canada))|vITSP.40.111.|w(CaOODSP)9.842846 |
---|
856 | 40|qPDF|s474 KB|uhttps://publications.gc.ca/collections/collection_2017/cstc-csec/D97-3-111-2016-eng.pdf |
---|
856 | 4 |qHTML|sN/A|uhttps://cyber.gc.ca/en/guidance/cryptographic-algorithms-unclassified-protected-and-protected-b-information-itsp40111 |
---|