Words By John Carl Villanueva
Last Updated:
Learn how to enable FTPS, SFTP, HTTPS, WebDAVS, OFTP, and AS2 file transfers with AES 256 bit encryption
- Blog
- JSCAPE MFT
- Secure File Transfer
- SFTP
Not many organizations require AES 256 encryption to secure their sensitive documents. But those who do might find this post quite useful. Here, we'll show you how to enable FTPS, SFTP, HTTPS, WebDAVS, OFTP, and AS2 file transfers with AES 256 bit encryption. Does that look like something you can use? Read on! In terms of key lengths, AES encryption typically comes in 3 "varieties" - AES 128, 192, and 256. AES 256, which uses 256-bit keys, is generally considered the strongest. So far, the only organizations I know that require AES 256 encryption are the US Government (for their Top Secret Information) and the State of Iowa. Yes, unlike other states and organizations that also require encryption, the State of Iowa is quite explicit with its encryption requirements. The use of AES 256 for "file transfers" or "data in transit" is clearly specified in the State of Iowa's Enterprise Interconnectivity Security Standard and in their Data Backup Operational Standard. If you have similar secure file transfer requirements as the State of Iowa and the US Government AND need to transmit files using any of these protocols: HTTPS, FTPS , SFTP , WebDAVS , OFTP , or AS2, I suggest you request and install the free, fully-functional evaluation edition of JSCAPE MFT Server and follow the instructions below.Overview
For HTTPS File Transfers
WebDAVS and AS2 (if secured by SSL/TLS) run on HTTPS, so what ever you set here will also apply to your WebDAVS and AS2 services.
Navigate to Server > Settings > Web > SSL/TLS Ciphers and then select the cipher suites you're comfortable with that use AES 256.
For FTPS File Transfers
Navigate into a domain and then go to Services > FTP/S > SSL/TLS Ciphers
Like in the HTTPS settings, select the SSL/TLS cipher suites that use AES 256.
For SFTP/SCP File Transfers
Go to Services > SFTP/SCP > Algorithms
Once the SFTP/SCP Algorithms window pops-up, go to the Ciphers tab and then look for the AES 256 ciphers. Unless you prefer one mode over the other (e.g. CTR over CBC or CBC over CTR), select both.
For OFTP File Transfers
Go to Services > OFTP > SSL/TLS Ciphers and then, when the SSL/TLS Cipher Suites appears, select the cipher suites you like that use AES 256-bit encryption.
For WebDAVs and AS2 File Transfers
Scroll up and read the section For HTTPS File Transfers.
That's it!
Popular Articles
View more by JSCAPE
How to setup SFTP public key authentication on the command line
14min read —
SFTP Public Key Authentication enhances security by allowing users to access SFTP services without passwords, favoring automated transfers. The setup process involves creating a .ssh directory, generating a key pair with ssh-keygen, securing permissions, and copying the public key to the server, ensuring a secure connection without the need for passwords
Read ArticleActive vs. passive FTP Simplified
24min read —
The difference between active FTP and passive FTP modes lies in how connections are made. In active mode, the client initiates the connection with a PORT command, making the server connect back for data. In passive mode, the client uses a PASV command, gets a server port, and starts the data transfer connection.
Read ArticleActive-active vs. active-passive high-availability clustering
7min read —
Active-active high availability clusters distribute workloads evenly across all nodes, ensuring optimal load balancing. In contrast, an active-passive setup keeps nodes on standby, activating them only when the primary fails, leading to potential delays. Active-active configurations offer reduced downtime and improved performance, making them the preferred choice for continuous system availability.
Read Article
Posts By Category
Explore All Topics
- JSCAPE MFT
- Managed File Transfer
- Secure File Transfer
- Tutorials
- Business Process Automation
- Videos
- News
- SFTP
- Triggers
- FTP
- AS2
- FTPS
- File Transfer Clients
- Ad-Hoc File Transfers
- Reverse Proxy
- Accelerated File Transfer
- file transfer
- Case Studies
- mft solutions
- sftp server
- ssh
- webdav
- webdav server
- Client Certificate Authentication
- Configuration
- EDI
- JSCAPE SaaS
- RSA 4096
- authentication
- encryption
- file transfer protocol
- load balancing
- security
- transfer protocols
- ASCII
- AWS
- Amazon S3
- Clustering
- DSA
- DSA vs RSA
- FTP Server
- FTP command line
- FTP/S
- HMAC
- High Availability
- Integration
- Load
- Load Balancer
- MDN
- OpenPGP keys
- Product Release
- RSA vs DSA
- S3
- SCP
- SMTP ports
- Transfer mode
- Windows SFTP Client
- binary mode
- binary transfer
- client certificate
- data streaming
- decrypt
- diffie-hellman-group1-sha1
- digital certificates
- forward proxy
- ftp active mode
- ftp active vs passive
- ftp client
- ftp commands
- ftp passive mode
- ftp put command
- gnu privacy guard
- gpg
- key exchange
- key fingerprint
- licenses
- mft gateway
- passive ftp
- pgp
- port 25
- port 587
- proxy server
- reverse proxy server
- sftp port
- sftp port number
- windows ftp
Related Content
Read more about JSCAPE MFT
7 alternatives to an SFTP platform you probably didn’t know
10min read —
Explore seven secure alternatives to SFTP for business file transfers, from SCP and OFTP to MFT solutions. Understand the pros and cons of each option, and learn why Managed File Transfer (MFT) might offer the most comprehensive security, automation, and integration features for your organization's needs. Discover the best solution for your file transfer requirements today.
Read ArticleThe benefits of secure file transfer software
11min read —
Secure file transfer software protects your data during transit with encryption, authentication, and advanced controls. Learn how IT professionals can mitigate data security risks, achieve regulatory compliance, and enhance automation with solutions like Managed File Transfer (MFT). Discover the key benefits and recommended tools for robust and efficient file transfers today.
Read ArticleFixing SSH/SFTP client connection issues involving Diffie-Hellman-Group1-SHA1
7min read —
If you're troubleshooting SSH/SFTP connection issues related to Diffie-Hellman-Group1-SHA1, you’re likely dealing with outdated and insecure key exchange algorithms. This article explains the root cause of the problem and provides four practical solutions to fix it. Learn how to enhance your connection security and maintain compatibility. Read on to find the best solution for your needs.
Read Article