Strong Cryptography

Cryptography based on sector-tested and accepted algorithms along with durable code lengths and good code management practices. Cryptography is a method of data protection and includes both encryption (reversal) and key transformation (which is irreversible or "one-way").

SHA-1 is an example of a sector-tested and accepted key transformation algorithm. Examples of sector-tested and accepted standards and coding algorithms include AES (128 bits or more), TDES (minimum length codes), RSA (1024 bits or more), ECC (160 bits or more), and ElGamal (1024 bits or more ).


Strong Cryptography

Cryptography based on sector-tested and accepted algorithms along with durable code lengths and good code management practices. Cryptography is a method of data protection and includes both encryption (reversal) and key transformation (which is irreversible or "one-way").

SHA-1 is an example of a sector-tested and accepted key transformation algorithm. Examples of sector-tested and accepted standards and coding algorithms include AES (128 bits or more), TDES (minimum length codes), RSA (1024 bits or more), ECC (160 bits or more), and ElGamal (1024 bits or more ).

Used in methodology