EDITRAN solves the needs for authentication, confidentiality and non rejection of the data that are moved through transmission public networks. This is made using cryptography algorithms implemented in a set of products developed by Indra, and grouped in a family named EDITRAN/SC.
EDITRAN also complies with GDPR regulations on data protection, applying secure encryption algorithms (AES) and SHA-2 hash type from version 5.2 onwards.
EDITRAN/SC guarantees the security of electronic communications through the following modules:
Criptolib/AES. Cryptography for AES symetric keys
Sofware module providing cryptography services AES and TAES.
For EDITRAN mainframe environment, you can use the cryptography services AES by ICSF (IBM hardware cryptography) through the EDITRAN API, developed for this purpose.
Criptolib/RSA. Cryptography for asymetric keys RSA
Software module providing RSA cryptography services, and that makes possible the authentication of extreme nodes and the non rejection of data.
It is used for the encryption, with a public key, of the DES or TDES keys used for cyphering data. It also verifies these data using the corresponding pair of keys, both public and private.
Until version 5.1 it was possible to work with 1024 bits key length; from version 5.2, the user can choose between 1024, 2018 or 4096 bits. In the case of zOS environments, until version 5.1, EDITRAN works with CRIPTOlib; from 5.2, it works with RSA APIs on ICSF cryptographic cards.
Criptolib/DES. Cryptography for DES symetric keys
Sofware module providing cryptography services DES and TDES.
For EDITRAN mainframe environment, you can use the cryptography services DES by ICSF (IBM hardware cryptography) through the EDITRAN API, developed for this purpose.
EDITRAN/GC. Exchange keys management.
This tool is used for the secure exchange of DES and TDES symetric keys and RSA public keys.
Version 3.0 and 4.0 for external key exchange requires that both extreme nodes send to each other the keys to be used later by EDITRAN.
The keys to be used in EDITRAN transmissions are exchanged, encrypted through RSA algorithm, with the public key of the remote extreme node, and they are signed with the private key. This way, their confidentiality and non rejection are assured. This module facilitates the storage management of these keys, and also the generation and control for further versions.