Implementation of data encryption standard, Other Subject

Implementation of this standard-

This standard became efficient July 1977. It was reaffirmed in 1983, 1988, and 1993. It applies to all Federal agencies, contractors of Federal agencies, or other organizations that process information (telecommunications system or using a computer) on behalf of the Federal Government to complete a Federal function. Every Federal agency or section may issue interior directives for the use of this standard by their operating units based on their data security requisite determinations. FIPS 46-2 which revises the accomplishment of the Data Encryption Algorithm to contain firmware, hardware, software, or any combination thereof, is effective June 30, 1994. This revised standard may be used in the interim period previous to the effective date.

Posted Date: 10/12/2012 8:52:20 AM | Location : United States







Related Discussions:- Implementation of data encryption standard, Assignment Help, Ask Question on Implementation of data encryption standard, Get Answer, Expert's Help, Implementation of data encryption standard Discussions

Write discussion on Implementation of data encryption standard
Your posts are moderated
Related Questions
WHAT IS A CRO? GIVE 20 USES OF CRO?

Questions: I need a report on Prehistoric archaeology. I want to know their types, Prehistoric archaeology report for about 2500 words? Would you able to assist me in report? Let

Question 1: Illustrate the crucial aspects that you need to attend to during an initial interview with a prospective client? Question 2: Describe and clarify the emotio


Ask questioThe initial investment in the project is estimated to be $210,000 in year 0 of the project. Terra Nova Inc. requires a discount rate of 11%. It is anticipated project fu

You are asked to analyse data from a large cross-sectional community survey conducted in a low income country in Asia which aimed to investigate factors associated with the risk of

(a) Communication in the business organization is very important but to structure it through appropriate networks is even more vital as unregulated communication flow could make i

CARD BASED EFT EFT may be begun by a cardholder when a payment card for instance a credit card or debit card is used. This might take place at an automated teller machine (ATM)

what was she hoping to hear from her husband

Question 1: (a) List any ten rules for making good design. (b) Elaborate on any five of those. Give visual examples as appropriate to illustrate each rule and use written