Powerhouse ENCRYPT

Bob Deskin Bob.Deskin at ca.ibm.com
Thu Nov 18 09:08:49 CST 2010


It does its own thing, so to speak. PowerHouse encryption was developed in 
the 1970s. It is not a heavy weight encryption scheme and was intended for 
visual encryption when doing ad hoc QUIZ reports rather than serious data 
hiding. If the data is truly sensitive or must comply with standards, I 
suggest another approach.

Bob

Bob Deskin
Senior Product Manager
IBM Cognos Application Development Tools
IBM Canada
+1 613-356-5633
bob.deskin at ca.ibm.com
http://www.ibm.com/software/data/cognos/products/powerhouse/



From:   Adrian Hudson <adrianhudsonuk at googlemail.com>
To:     powerh-l at lists.sowder.com
Date:   2010-11-18 07:53 AM
Subject:        Powerhouse ENCRYPT
Sent by:        powerh-l-bounces+bob.deskin=ca.ibm.com at lists.sowder.com



Hi All,

Does anyone know if the Powerhouse ENCRYPT function uses one of the
documented symmetric key algorithms (like AES, TDES, RC4 etc.) or is
it just doing its own thing?

I have some work coming down the line looking at storing sensitive
information in encrypted form (Image database) to comply to Payment
Card Industry Standards  and want to get a heads up on the types of
questions which might come up.

All the best

Adrian
-- 
= = = = = = = = = = = = = = = = = = = = = = = = = = = =
Mailing list: powerh-l at lists.sowder.com
Subscribe: 'subscribe' in message body to 
powerh-l-request at lists.sowder.com
Unsubscribe: 'unsubscribe &lt;password&gt;' in message body to 
powerh-l-request at lists.sowder.com
http://lists.sowder.com/mailman/listinfo/powerh-l
This list is closed, thus to post to the list you must be a subscriber.
Add 'site:lists.sowder.com powerh-l' to your search terms to search the 
list archive at Google.




More information about the powerh-l mailing list