We have a requirement from one of our customers regarding the encryption 
algorithms - "Make use of published public encryption algorithms that are 
considered to be practically unbroken. Contracting Authority considers an 
algorithm practically unbroken when a key can't be recovered within 1 year with 
hardware costing less than 1,000,000 euro. We should have a life cycle process 
for the encryption algorithms in place to ensure the 1 year duration is kept 
despite the every increase computing power. Describe the process."



We would greatly appreciate if you could help us with this question.



Best regards,

Ido


This e-mail message is intended for the recipient only and contains information 
which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have 
received this transmission in error, please inform us by e-mail, phone or fax, 
and then delete the original and all copies thereof.

Reply via email to