Approved Devices

 

Our engineering department is the best prepared on the market

 
 
Our approval process takes into account the following recommendations
 

 
IETF RFC 3279
Saber más
IETF RFC 3279
Saber más
 

Compliance with specific regulations and technical standards in the field.

Current and certified accreditation of the supplier by the Competent Authority.

Discover our cryptographic components and APIs

Cryptographic components
  • Signature algorithm: SHA-256WithRSAEncryption
  • Digestion algorithm: SHA-256 y SHA-512
  • Key length: 1024 bits, 2048 bits y 4096 bits
  • Symmetric encryption algorithm: AES
  • Asymmetric encryption algorithm: RSA