įor Veeam Data Movers installed on Microsoft Windows-based machines, Veeam Backup & Replication also uses Veeam Cryptographic Module. For digital signature generation: SHA-1, SHA-256įor Linux-based components and services, Veeam Backup & Replication uses Veeam Cryptographic Module.Veeam Backup & Replication uses the following hashing algorithms: To generate a request for data restore from a backup server, Veeam Backup & Replication uses the RSA algorithm with a 2048-bit key length.įor more information, see RSA Cryptography Specifications.To generate Enterprise Manager keys required for data restore without a password, Veeam Backup & Replication uses the RSA algorithm with a 4096-bit key length.For more information, see Recommendation for Password-Based Key Derivation. Veeam Backup & Replication uses 10,000 HMAC-SHA1 iterations and a 512-bit salt. To generate a key based on a password, Veeam Backup & Replication uses the Password-Based Key Derivation Function, PKCS #5 version 2.0.For more information, see Advanced Encryption Standard (AES). To encrypt data blocks in backup files and files archived to tape, Veeam Backup & Replication uses the 256-bit AES with a 256-bit key length in the CBC-mode.
Veeam Backup & Replication uses the following industry-standard data encryption algorithms: