academics header
 

Encryption Policy

1.0 Purpose
The purpose of this policy is to provide guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively. Additionally, this policy provides direction to ensure that Federal regulations are followed, and legal authority is granted for the dissemination and use of encryption technologies outside of the United States.

2.0 Scope
This policy applies to all Hampshire College employees and affiliates.

3.0 Policy
Proven, standard algorithms such as DES, Blowfish, RSA, RC5, and IDEA should be used as the basis for encryption technologies. These algorithms represent the actual cipher used for an approved application. For example, Network Associate's Pretty Good Privacy (PGP) uses a combination of IDEA and RSA or Diffie-Hellman, while Secure Socket Layer (SSL) uses RSA encryption. The cryptographic security strength of any cipher should be at least 80 bits in order to be considered secure. For comparison, 3DES provides 112 bits of security and 1024-bit RSA keys provide 80 bits of security. Hampshire College’s key length requirements will be reviewed annually and upgraded as technology allows.

The use of proprietary encryption algorithms is not allowed for any purpose, unless reviewed by qualified experts outside of the vendor in question and approved by IT. Be aware that the export of encryption technologies is restricted by the U.S. Government. Residents of countries other than the United States should make themselves aware of the encryption technology laws of the country in which they reside.

True Crypt is a College-approved encryption application for file encryption. Please see our Data Encryption page for help using True Crypt.

4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

5.0 Definitions

Proprietary Encryption: An algorithm that has not been made public and/or has not withstood public scrutiny. The developer of the algorithm could be a vendor, an individual, or the government.

Symmetric Cryptosystem: A method of encryption in which the same key is used for both encryption and decryption of the data.

Asymmetric Cryptosystem: A method of encryption in which two different keys are used: one for encrypting and one for decrypting the data (e.g., public-key encryption).

 

Contact Us

Information Technology
Harold F. Johnson Library Center
Hampshire College
893 West Street
Amherst, MA 01002
413.559.5418
Fax 413.559.5419
helpdesk@hampshire.edu
 

© 2014 Hampshire College 893 West Street Amherst, MA 01002 . 413.549.4600