{"id":4162,"date":"2019-07-15T16:16:48","date_gmt":"2019-07-15T19:16:48","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=4162"},"modified":"2019-07-15T16:16:48","modified_gmt":"2019-07-15T19:16:48","slug":"mecanismos-criptograficos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=4162","title":{"rendered":"Mecanismos criptogr\u00e1ficos"},"content":{"rendered":"<p>Gu\u00eda para el uso de est\u00e1ndares criptogr\u00e1ficos en el gobierno federal USA.<!--more--><\/p>\n<p>Network and data security are essential in today&#8217;s environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security services include confidentiality, identity authentication, data integrity authentication, source authentication, and the support of non-repudiation. Cryptographic techniques can offer such protection for data that is sensitive, has high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage.<\/p>\n<p>This document is part of a series that provides recommendations for protecting sensitive, unclassified digitized information using cryptography and NIST\u2019s cryptographic standards. The document discusses cryptographic methods and services and refers to the recently published strategy for deprecating the Triple Data Encryption Algorithm (TDEA). Additional changes are listed in Appendix B.<\/p>\n<p style=\"text-align: right;\"><strong><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-175b\/rev-1\/draft\" target=\"_blank\" rel=\"noopener noreferrer\">Leer m\u00e1s &gt;&gt;<\/a><\/strong><\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-175b\/rev-1\/draft\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/csrc.nist.gov<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gu\u00eda para el uso de est\u00e1ndares criptogr\u00e1ficos en el gobierno federal USA.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4162"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4162"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/4162\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}