Powerhouse ENCRYPT

Adrian Hudson adrianhudsonuk at googlemail.com
Thu Nov 18 06:53:01 CST 2010


Hi All,

Does anyone know if the Powerhouse ENCRYPT function uses one of the
documented symmetric key algorithms (like AES, TDES, RC4 etc.) or is
it just doing its own thing?

I have some work coming down the line looking at storing sensitive
information in encrypted form (Image database) to comply to Payment
Card Industry Standards  and want to get a heads up on the types of
questions which might come up.

All the best

Adrian


More information about the powerh-l mailing list