FIPS 140-2 · DFARS · Section 508 VPAT · NIST CMVP

Encryption your security team can sign off on

PowerArchiver uses the Microsoft CryptoAPI Enhanced Cryptographic Provider — the same FIPS 140-2 validated module the U.S. federal government uses. AES-256, OpenPGP signing (Professional+), PAE2 secure containers, tamper-evident archive integrity. FIPS 140-2 / HIPAA / DFARS validation paperwork is at the Enterprise tier; Business / Professional / Toolbox ship the same AES-256 engine without the formal validation binder. The one-stop reference for procurement reviewers, compliance teams, and security architects.
Validation chain at a glance

Three levels of validation, all third-party

PowerArchiver doesn't ship its own crypto. It uses validated libraries — the validation belongs to NIST, NSA, and DoD review boards, not to us. That's the point.
FIPS 140-2

Cryptographic module

PowerArchiver uses the Microsoft CryptoAPI Enhanced Cryptographic Provider — NIST CMVP certified, validated under FIPS 140-2. This is the same crypto module that ships with Windows Server and is used across federal agencies.

NIST CMVP program →
Section 508

Accessibility VPAT

PowerArchiver publishes a public Voluntary Product Accessibility Template (VPAT) documenting Section 508 conformance. Required for federally-funded institutions and increasingly mandated by state-level procurement.

Download VPAT (PDF) →
Detailed validation matrix

What the certifications actually cover

Validation Authority Scope Reference
FIPS 140-2 NIST CMVP Cryptographic module (AES, SHA-2, RSA, HMAC) · validation paperwork at Enterprise tier CMVP cert list
DFARS 252.204-7012 DoD CUI protection — inherits FIPS 140-2 validation · Enterprise tier Self-attestation supported
Section 508 Federal accessibility (29 U.S.C. § 794d) UI accessibility for federally-funded use VPAT PDF
GDPR-aligned EU GDPR Art. 32 (technical measures) Encryption at rest & in transit · no PII processing in product Architecture statement on request
FERPA-compatible U.S. Dept. of Education Reasonable methods for student-record protection Architecture statement on request
HIPAA-compatible U.S. HHS FIPS-validated AES = recognized safeguard for PHI at rest · validation at Enterprise tier Architecture statement on request
DoD wipe (DoD 5220.22-M) DoD declassification Built-in secure-erase for source files after archival Documented in admin guide
For SaaS-style audits (SOC 2, ISO 27001) — PowerArchiver is desktop software, not a hosted service. We don't store or transmit your data. SOC 2 and ISO 27001 apply to ConeXware's corporate operations, not to PowerArchiver as a product. Procurement teams comparing PA to cloud archiving services should note this distinction. Email compliance for ConeXware corporate attestations.
Cryptographic stack

Validated library, validated algorithms, no roll-your-own

PowerArchiver delegates all cryptographic primitives to the Microsoft CryptoAPI Enhanced Cryptographic Provider. We don't implement our own AES, SHA, or RSA — we call into the operating-system module that's already FIPS 140-2 validated.

Symmetric encryption

Algorithm
AES-256 (CBC, CTR modes)
Key derivation
PBKDF2 with SHA-256, 65,536+ iterations
Library
Microsoft CryptoAPI Enhanced (rsaenh.dll)
FIPS mode
Inherited from Windows OS configuration

Asymmetric / signing

Algorithms
RSA-2048 / RSA-4096, ECDSA P-256 / P-384
Hash
SHA-256, SHA-384, SHA-512
Standards
OpenPGP (RFC 4880), X.509 v3 certificates
Use cases
Archive signing & verification, sender authentication

Integrity & tampering

MAC
HMAC-SHA-256 / HMAC-SHA-512
Authenticated encryption
Encrypt-then-MAC (PAE2 containers)
Detection
Tamper-evident — any modification triggers verification failure
Filename encryption
Names + sizes + timestamps protected (PAE2 / 7Z)
Format coverage

Encryption by archive format

Each archive format has its own encryption capabilities. PowerArchiver uses the strongest scheme each format supports — and reads everything the rest of the world produces.
Format Encryption Key strength Filename encryption Notes
PAE2 AES-256 (CBC + HMAC) 256-bit Yes (default) Recommended — PA proprietary, FIPS-validated, encrypt-then-MAC
7Z AES-256 256-bit Yes (optional) Cross-tool compatible · 7-Zip, p7zip, others
ZIP (AES) AES-256 (WinZip AE-2) 256-bit No (ZIP limitation) Cross-tool compatible · WinZip, 7-Zip, other ZIP-AES tools
ZIP (legacy) ZipCrypto 96-bit, weak No Read-only support · do not use for new archives
OpenPGP AES-256 + RSA-4096 / ECC 256-bit symmetric, 4096-bit RSA N/A (PGP file) Standard OpenPGP (RFC 4880) · interoperable
Recommendation for new archives: Use PAE2 for internal/audit-required workflows (filename encryption + tamper detection), or ZIP-AES-256 for cross-tool sharing. Never use legacy ZipCrypto for new content — it's broken under multiple known attacks.
Responsible disclosure

Reporting a vulnerability

If you've found a security issue in PowerArchiver, we want to know. Coordinated disclosure protects users while we patch.

Where to send reports

Email security@conexware.com with technical details, reproduction steps, and impact assessment. PGP-encrypted email accepted — public key on request.

Response window

Initial acknowledgment within 2 business days. Triage and severity assessment within 5 business days. Patch timeline depends on severity — critical issues prioritized for emergency release.

Disclosure policy

We coordinate public disclosure with the reporter. Default window is 90 days from acknowledgment to public advisory, extendable for complex issues. Reporters receive credit in the advisory unless they request anonymity.

Out of scope

Marketing/web-property issues (powerarchiver.com), social-engineering attacks against ConeXware staff, and physical attacks. We don't operate a paid bug-bounty program, but we credit responsible disclosures publicly.

Past advisories

Security advisories — when issued — are published in PowerArchiver News with the security-advisory tag. Subscribe to the security-advisory feed to receive notifications.

Documentation

Compliance artifacts available on request

For procurement reviewers, security architects, and compliance teams — we provide the documentation you need to clear PowerArchiver for deployment in regulated environments.

On request — email compliance

  • FIPS 140-2 inheritance statement (Microsoft CryptoAPI dependency)
  • DFARS 252.204-7012 self-attestation template
  • FERPA / HIPAA architecture statements
  • GDPR Article 32 technical-measures statement
  • SBOM (Software Bill of Materials) — current release
  • Vulnerability disclosure history (under NDA if requested)
FAQ

Common security & compliance questions

Is PowerArchiver itself FIPS 140-2 validated, or is the Microsoft library?

The cryptographic module is FIPS 140-2 validated. PowerArchiver delegates all cryptographic operations (AES, SHA, RSA, HMAC) to the Microsoft CryptoAPI Enhanced Cryptographic Provider, which holds the NIST CMVP certification. PowerArchiver-the-application doesn't implement its own crypto, so there's no separate validation needed for the app — the validation that matters (the crypto primitives) is held by Microsoft and inherited by every program using CryptoAPI in FIPS mode. This is the same pattern used by Windows Server, BitLocker, and most enterprise Windows software handling regulated data.

Does PowerArchiver have a SOC 2 Type 2 report?

SOC 2 audits a service organization's operational controls — they apply to SaaS / hosted services. PowerArchiver is desktop software that runs on your hardware; we don't operate a service that processes your data. The SOC 2 framework doesn't naturally apply to a product like PowerArchiver. ConeXware (the company) maintains corporate-level operational controls; if your procurement specifically requires SOC 2 attestation as a vendor risk control, contact compliance@conexware.com with the specific control objectives — we can usually map our existing FIPS / DFARS validation chain to your requirements.

Can I deploy PowerArchiver in a FIPS-only Windows environment?

Yes. When Windows is configured with the FIPS local-policy flag (HKLMSystemCurrentControlSetControlLsaFipsAlgorithmPolicy), the CryptoAPI provider operates in FIPS-only mode and rejects non-FIPS algorithms. PowerArchiver inherits that mode and limits itself to FIPS-approved algorithms (AES-256, SHA-2, RSA, HMAC). No PowerArchiver configuration needed beyond the OS-level flag.

What about ZipCrypto — should we disable it?

Legacy ZIP encryption (ZipCrypto, also called PKZIP encryption) is broken under multiple known attacks and shouldn't be used for new archives. PowerArchiver supports it for read compatibility with older archives, but the create-archive UI defaults to AES-256. Admins can lock encryption choice via MSI properties — see the deployment guide for the registry / GPO key that hides the legacy ZipCrypto option from end users entirely.

Do you process or transmit user data?

No. PowerArchiver is desktop software — files stay on your machine. There's no telemetry, no analytics, no cloud upload of file contents. License activation contacts ConeXware once at activation and on optional update checks; that's the only outbound connection in the default configuration. The product never reads your archive contents and transmits them anywhere. This is part of why GDPR / FERPA / HIPAA workflows route around PowerArchiver cleanly — the product isn't a data processor in the regulatory sense.

Can the encryption be backdoored or accessed via a master key?

No. PowerArchiver uses standard cryptographic primitives (AES, RSA, OpenPGP) implemented by Microsoft CryptoAPI. There's no master key, no backdoor, no recovery escrow — if you lose your password or private key, the data is unrecoverable. We can't recover it for you, even with a court order. This is the trade-off of using validated cryptography correctly; it's also why these algorithms are trusted for federally-funded research and DoD-grade workflows.

How do you handle vulnerability disclosure?

Coordinated disclosure on a 90-day default window, extendable for complex issues. Reports go to security@conexware.com. Initial acknowledgment within 2 business days, triage within 5. Public advisory follows after the patch ships. Reporters credited unless they request anonymity. We don't operate a paid bug bounty, but every responsible disclosure gets a public credit. Full policy above.

Talk to compliance

Need a specific compliance artifact, architecture statement, or vendor questionnaire response? Email compliance with the documents you need and your procurement timeline. Same-business-day response on standard requests; complex compliance reviews modeled within a week.
FIPS 140-2 · DFARS 252.204-7012 · Section 508 VPAT · GDPR Art. 32 · FERPA · HIPAA · DoD wipe
Need help?

Get unstuck

🛟

Support

Installation issues, license activation, registration recovery — submit a ticket through the support form and we'll respond within one business day.
Open the support form →
📚

Wiki

Feature documentation, command-line reference (PACL), MSI deployment notes, FAQ archives, and configuration guides for IT.
Browse the Wiki →
🔑

Order Recovery

Lost your license key, need to re-download an old purchase, or want to update billing details? Manage everything from your ConeXware account.
Recover an order →