--- title: System cryptography Use FIPS compliant algorithms for encryption hashing and signing (Windows 10) description: This security policy reference topic for the IT professional describes the best practices location values policy management and security considerations for this policy setting. MSHAttr: PreferredLib /library ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045 ms.prod: W10 ms.mktglfcycl: deploy ms.sitesec: library author: brianlic-msft --- # System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing **Applies to** - Windows 10 **In this article** - [Reference](#reference) - [Policy management](#policy-management) - [Security considerations](#security-considerations) - [Related topics](#related-topics) This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. ## Reference The Federal Information Processing Standard (FIPS) 140 is a security implementation that is designed for certifying cryptographic software. Windows implements these certified algorithms to meet the requirements and standards for cryptographic modules for use by departments and agencies of the United States federal government. **TLS/SSL** This policy setting determines whether the TLS/SSL security provider supports only the FIPS-compliant strong cipher suite known as TLS\_RSA\_WITH\_3DES\_EDE\_CBC\_SHA, which means that the provider only supports the TLS protocol as a client computer and as a server, if applicable. It uses only the Triple Data Encryption Standard (3DES) encryption algorithm for the TLS traffic encryption, only the Rivest-Shamir-Adleman (RSA) public key algorithm for the TLS key exchange and authentication, and only the Secure Hash Algorithm version 1 (SHA-1) hashing algorithm for the TLS hashing requirements. **Encrypting File System (EFS)** For the EFS service, this policy setting supports the 3DES and Advanced Encryption Standard (AES) encryption algorithms for encrypting file data supported by the NTFS file system. To encrypt file data, by default EFS uses the Advanced Encryption Standard (AES) algorithm with a 256-bit key in the Windows Server 2003, Windows Vista, and later, and it uses a DESX algorithm in Windows XP. **Remote Desktop Services (RDS)** For encrypting Remote Desktop Services network communication, this policy setting supports only the Triple DES encryption algorithm. **BitLocker** For BitLocker, this policy setting needs to be enabled before any encryption key is generated. Recovery passwords created on Windows Server 2012 R2 and Windows 8.1 and later when this policy is enabled are incompatible with BitLocker on operating systems prior to Windows Server 2012 R2 and Windows 8.1; BitLocker will prevent the creation or use of recovery passwords on these systems, so recovery keys should be used instead. ### Possible values - Enabled - Disabled - Not defined ### Best practices - For use with TLS, set this policy to **Enabled**. Client devices with this policy setting enabled will be unable to communicate through digitally encrypted or signed protocols with servers that do not support these algorithms. Client devices that are connected to the network and do not support these algorithms cannot use servers that require the algorithms for network communications. If you enable this policy setting, you must also configure Internet Explorer to use TLS. ### Location Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options ### Default values The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
Server type or GPO | Default value |
---|---|
Default Domain Policy |
Not defined |
Default Domain Controller Policy |
Not defined |
Stand-Alone Server Default Settings |
Disabled |
DC Effective Default Settings |
Disabled |
Member Server Effective Default Settings |
Disabled |
Client Computer Effective Default Settings |
Disabled |
Operating systems | Applicability |
---|---|
Windows 10, Windows 8.1, and Windows Server 2012 R2 |
When created on these operating systems, the recovery password cannot be used on other systems listed in this table. |
Windows Server 2012 and Windows 8 |
When created on these operating systems, the recovery key can be used on other systems listed in this table as well. |
Windows Server 2008 R2 and Windows 7 |
When created on these operating systems, the recovery key can be used on other systems listed in this table as well. |
Windows Server 2008 and Windows Vista |
When created on these operating systems, the recovery key can be used on other systems listed in this table as well. |