Skip to navigation Skip to content

FIPS Certified Algorithms

GoSilent utilizes Federal Information Processing Standards (FIPS) CAVP certified algorithms.

FIPS Certified Algorithms for Remote Access

Only FIPS 140-2 compliant solutions may be deployed to work with federal government departments that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information.

Attila’s GoSilent portable VPN and firewall offers robust encryption protection using FIPS CAVP certified algorithms.


Encryption for U.S. Government Agencies and Contractors

GoSilent deploys AES 256-bit encryption to protect sensitive data via dual tunnel, end-to-end encryption. Data never gets stored on an intermediary server, and no extra keys are ever generated.


Using two nested, independent encryption tunnels helps to protect the confidentiality and integrity of data as it moves through an untrusted network. Each of the two tunnels helps protect data flow by using one of two independent encryption protocols:

  • Internet Protocol Security (IPsec) generated by a Virtual Private Network (VPN) Gateway
  • Media Access Control Security (MACsec) generated by a MACsec Device.

The outer tunnel of a dual tunnel VPN refers to the components that terminate the outer layer of encryption.

GoSilent utilizes AES 256-bit encryption for the outer tunnel to protect your private data and keeps it fully encrypted end-to-end. Data is never stored on an intermediary server. In keeping with Top Secret level encryption standards, there are no extra keys. Attila Security does not record, copy or have access to the encryption codes. This means that your data remains secure, even if compromised.

Learn More

FIPS Certification Information and Resources

FIPS PUB 140-2

Learn more about the FIPS security standards for cryptographic modules.

Learn More

FIPS Compliant vs. FIPS Certified

FIPS Compliance isn’t enough for more robust security needs.

Learn More

Commercial National Security Algorithm Suite

Learn more about the CNSA encryption suite on the NSA website.

Learn More

What does FIPS Certification Mean?

Full FIPS Validation

A 6-9 month process, claims must be tested by a NIST accredited independent laboratory.

AES 256-bit encryption

AES 256-bit end-to-end encryption is the most secure solution in the marketplace.

Dual tunnel, end-to-end encryption

Two nested, independent encryption tunnels to protect data as it moves through untrusted networks.

Top Secret level encryption standards

Data is never stored on an intermediary server. No record, copy or access to encryption codes.

Frequently Asked Questions

Is FIPS Compliant the same as FIPS Certified?

IT security solutions that are marketed as being FIPS compliant are making a claim that the product meets FIPS requirements. However, this is very different than if a NIST-approved laboratory validates that the product meets FIPS requirements.

During FIPS certification, the file transfer software and client and server applications are each independently tested to confirm they meet FIPS standards and are also checked for security vulnerabilities, predictable number generation and reckless disposal of keys.

Learn More