Powerhouse ENCRYPT
Bob Deskin
Bob.Deskin at ca.ibm.com
Thu Nov 18 09:08:49 CST 2010
It does its own thing, so to speak. PowerHouse encryption was developed in
the 1970s. It is not a heavy weight encryption scheme and was intended for
visual encryption when doing ad hoc QUIZ reports rather than serious data
hiding. If the data is truly sensitive or must comply with standards, I
suggest another approach.
Bob
Bob Deskin
Senior Product Manager
IBM Cognos Application Development Tools
IBM Canada
+1 613-356-5633
bob.deskin at ca.ibm.com
http://www.ibm.com/software/data/cognos/products/powerhouse/
From: Adrian Hudson <adrianhudsonuk at googlemail.com>
To: powerh-l at lists.sowder.com
Date: 2010-11-18 07:53 AM
Subject: Powerhouse ENCRYPT
Sent by: powerh-l-bounces+bob.deskin=ca.ibm.com at lists.sowder.com
Hi All,
Does anyone know if the Powerhouse ENCRYPT function uses one of the
documented symmetric key algorithms (like AES, TDES, RC4 etc.) or is
it just doing its own thing?
I have some work coming down the line looking at storing sensitive
information in encrypted form (Image database) to comply to Payment
Card Industry Standards and want to get a heads up on the types of
questions which might come up.
All the best
Adrian
--
= = = = = = = = = = = = = = = = = = = = = = = = = = = =
Mailing list: powerh-l at lists.sowder.com
Subscribe: 'subscribe' in message body to
powerh-l-request at lists.sowder.com
Unsubscribe: 'unsubscribe <password>' in message body to
powerh-l-request at lists.sowder.com
http://lists.sowder.com/mailman/listinfo/powerh-l
This list is closed, thus to post to the list you must be a subscriber.
Add 'site:lists.sowder.com powerh-l' to your search terms to search the
list archive at Google.
More information about the powerh-l
mailing list