Keep it quiet!
- Status of fed encryption standard gains. Faust, Linda // Network World;11/7/2005, Vol. 22 Issue 44, p40
This article highlights the functions of the Federal Information Processing Standard (FIPS) 140-2 encryption standard. FIPS 140-2 resulted from the efforts of the U.S. National Institute of Standards and Technology and Canada's Communications Security Establishment to protect government...
- Banks stand behind DES despite breaking of code. Tracey, Brian // American Banker;7/2/1997, Vol. 162 Issue 126, p19
Describes American banks' reaction to the breaking of a code protected by the Data Encryption Standard (DES). Breaking of the code by groups led by computer consultant Rocker Verser in response to a $10,000 challenge issued by RSA Data Security Inc.; Eventual replacement of the DES.
- A key scheme. Jones, Chris // InfoWorld;11/25/96, Vol. 18 Issue 48, p9
Reports that 24 new members had joined an alliance working toward an interoperable key-recovery encryption standard formed by IBM, Apple, Digital, Groupe Bull, Hewlett-Packard, NCR, RSA Data Security, Sun, Trusted Information Systems and others in October 1996.
- Encryption battle not as heated overseas. Kerstetter, Jim // PC Week;10/06/97, Vol. 14 Issue 42, p35
Discusses relevant issues in worldwide efforts to formulate encryption regulations for the Internet as of October 1997. The importance of security to global companies that plan for Internet-based business in other countries; American encryption limits; The possibility of mandatory key escrow...
- Ciena receives FIPS 140-2 Level 2 Certification for 10G encryption solution. // Optical Networks/WDM;Jan2013, Vol. 17 Issue 1, p13
The article reports on the Federal Information Processing Standard (FIPS) 140-2 Level 2 certification received by Ciena Corp. for it 10 Gigabit (G) wire-speed encryption solution. It notes that the FIPS approval enables Ciena's integrated transport offering with 10 encryption to be deployed by...
- Hardware Security Modules Attracting More Scrutiny. Heun, David // American Banker;11/22/2011, Vol. 176 Issue 180, p6
The article questions whether the Payment Card Industry (PCI) Security Standards Council will require hardware security modules, which protect card data during transaction processing, to comply with PCI data security standard's encryption rules.
- Intel eyes encryption role. Hatlestad, Luc; Quinlan, Tom // InfoWorld;8/19/96, Vol. 18 Issue 34, p1
Reports on Intel Corp.'s development of a Common Data Security Architecture (CDSA) designed to integrate security software, operating systems and third-party applications. Features and capabilities of the technology; CDSA as a catalyst for building Internet security; Intel's draft specifications.
- International experts see need for global encryption policy. Mills, Elinor // InfoWorld;01/26/98, Vol. 20 Issue 4, p73
Highlights international experts' belief that there must be greater commitment toward global encryption and authentication standards if electronic commerce is to fulfill its potential. Use of digital signatures to accomplish encryption and authentication; Global unified policies; Obstacles...
- X.509 is a start, but it's no panacea. Lewis, Jamie // PC Week;09/01/97, Vol. 14 Issue 37, p109
Discusses the limitations to the X.509 standard for cryptography for E-mail and groupware applications. The incomplete interoperability that X.509 offers; How an X.509 certificate works; The issue of directory services; Supporting the certificates; Problems that can surface with APIs; X.509 as...