For immediate assistance browse through our support center. You can find answers to many questions in just a few minutes.
If still experiencing problems, send us a report.
NIST offers guidelines for generating crypto keys for sensitive info
Ranking is calculated from a formula comprised of user reviews and usage data. Learn more ›
28 Oct 2011 | News Items | Contributor(s): Author Author
The National Institute of Standards and Technology has released draft guidance on creating secure keys to be used with the cryptographic algorithms and products agencies must use when securing …
If crypto keys aren't protected, they can't protect data
Creating and sharing the secret keying material that underlies cryptographic algorithms is a complex security challenge. The keys protect data, but they must be protected themselves. And a poor …
NIST Protects BIOS With New Security Guidelines
27 Dec 2011 | News Items | Contributor(s): Author Author
The organization that sets federal technology standards has provided new security guidelines for protecting the system that starts up PCs. The National Institute for Standards and Technology (NIST) …