Recommendation for cryptographic key generation

Friday, March 8, 2019 - 09:00 in Mathematics & Economics

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm (i.e., cryptographic methodology) and a cryptographic key. NIST has developed a wide variety of Federal Information Processing Standards (FIPS) and guidance to specify, approve, and manage cryptographic algorithms and keys for Federal Government use.

Read the whole article on Physorg

More from Physorg

Latest Science Newsletter

Get the latest and most popular science news articles of the week in your Inbox! It's free!

Check out our next project, Biology.Net