This is currently one of the two recommended modes of operation.
Configuration is vital. A misconfigured safe protocol is ultimately unsafe.
Counter-mode encryption (“CTR mode”) was introduced by Diffie and Hellman already in 1979.CTR mode has significant efficiency advantages over the standard encryption
modes without weakening the security. In particular its tight security has been proven. CTR mode is well suited to operate on a multi-processor machine where blocks can be encrypted in parallel.
Are you a developer? Get started with crucial implementation details above.
Are you an IT administrator? Get started with best practice setup details above.
Are you a Manager? Get started with best practice setup details above.
Best Practices and Advisories:
For more details check the FAQ for this algorithm.