User`s manual

Chapter 2 Getting Started 11
2.1.2 Secure Communication
Advanced multiple security features protect the system and make
data more private and secure. The ADAM-4570S/4571S guards
your network and data by multiple security protections: T-DES
(Triple Data Encryption Standard, which is specified in FIPS
PUB 46-2 and American National Standard X9.25) strong en-
cryption, PKCS#5 (Password-based Cryptographic Standard
#5), and IP address authorization.
We apply T-DES using three blocks (8 bytes for each block) for
plain text 3-time calculation and PKCS#7 for data padding when
block of the plain text isnt enough for 8 bytes. We apply PKCS#5
algorithm to turn user-defined password into a unique key by
means of a hash algorithm. Users only need to specify a pass-
word when configuring ADAM-4570S/4571S in utility. This
prevents important data from being accessed by unauthorized
users.
2.1.2.1 Data Integrity
All records are protected using the symmetry encryption and
checksum algorithms. Symmetry encryption protects the data
privacy. With checksum, which is protected by encryption, we
could guarantee the integrity of data. Transmissions also include
a sequence number, which is protected by encryption, so that
missing, altered or extra messages are detectable.