Keep it quiet!

July 2002
Management Services;Jul2002, Vol. 46 Issue 7, p30
Academic Journal
The new Advanced Encryption Standard, called the Federal Information Processing Standard, has been approved by the American government for mandatory use by all federal agencies on sensitive unclassified information. Thales e-Security is one of the first to equip its Datacryptor 2000 range of encryption hardware with the Rijndael AES algorithm it employs. Expected initial users are banks with cash machine communications, retailers processing credit cards and onto critical business information communications including those carrying personal data.


Related Articles

  • Status of fed encryption standard gains. Faust, Linda // Network World;11/7/2005, Vol. 22 Issue 44, p40 

    This article highlights the functions of the Federal Information Processing Standard (FIPS) 140-2 encryption standard. FIPS 140-2 resulted from the efforts of the U.S. National Institute of Standards and Technology and Canada's Communications Security Establishment to protect government...

  • Banks stand behind DES despite breaking of code. Tracey, Brian // American Banker;7/2/1997, Vol. 162 Issue 126, p19 

    Describes American banks' reaction to the breaking of a code protected by the Data Encryption Standard (DES). Breaking of the code by groups led by computer consultant Rocker Verser in response to a $10,000 challenge issued by RSA Data Security Inc.; Eventual replacement of the DES.

  • A key scheme. Jones, Chris // InfoWorld;11/25/96, Vol. 18 Issue 48, p9 

    Reports that 24 new members had joined an alliance working toward an interoperable key-recovery encryption standard formed by IBM, Apple, Digital, Groupe Bull, Hewlett-Packard, NCR, RSA Data Security, Sun, Trusted Information Systems and others in October 1996.

  • Encryption battle not as heated overseas. Kerstetter, Jim // PC Week;10/06/97, Vol. 14 Issue 42, p35 

    Discusses relevant issues in worldwide efforts to formulate encryption regulations for the Internet as of October 1997. The importance of security to global companies that plan for Internet-based business in other countries; American encryption limits; The possibility of mandatory key escrow...

  • Ciena receives FIPS 140-2 Level 2 Certification for 10G encryption solution.  // Optical Networks/WDM;Jan2013, Vol. 17 Issue 1, p13 

    The article reports on the Federal Information Processing Standard (FIPS) 140-2 Level 2 certification received by Ciena Corp. for it 10 Gigabit (G) wire-speed encryption solution. It notes that the FIPS approval enables Ciena's integrated transport offering with 10 encryption to be deployed by...

  • Hardware Security Modules Attracting More Scrutiny. Heun, David // American Banker;11/22/2011, Vol. 176 Issue 180, p6 

    The article questions whether the Payment Card Industry (PCI) Security Standards Council will require hardware security modules, which protect card data during transaction processing, to comply with PCI data security standard's encryption rules.

  • Intel eyes encryption role. Hatlestad, Luc; Quinlan, Tom // InfoWorld;8/19/96, Vol. 18 Issue 34, p1 

    Reports on Intel Corp.'s development of a Common Data Security Architecture (CDSA) designed to integrate security software, operating systems and third-party applications. Features and capabilities of the technology; CDSA as a catalyst for building Internet security; Intel's draft specifications.

  • International experts see need for global encryption policy. Mills, Elinor // InfoWorld;01/26/98, Vol. 20 Issue 4, p73 

    Highlights international experts' belief that there must be greater commitment toward global encryption and authentication standards if electronic commerce is to fulfill its potential. Use of digital signatures to accomplish encryption and authentication; Global unified policies; Obstacles...

  • X.509 is a start, but it's no panacea. Lewis, Jamie // PC Week;09/01/97, Vol. 14 Issue 37, p109 

    Discusses the limitations to the X.509 standard for cryptography for E-mail and groupware applications. The incomplete interoperability that X.509 offers; How an X.509 certificate works; The issue of directory services; Supporting the certificates; Problems that can surface with APIs; X.509 as...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics