Cryptographic Algorithms PCI
Cryptographic Algorithms PCI
It is probably worth pointing out that we are not talking about the intrinsic strength of the
algorithm itself. For example how much effort it takes to brute-force AES or Triple DES. Rather
we note the possibility that a programmer, while coding an algorithm into a software
application makes some often simple, mistake. The resulting “encryption” that occurs is not a
true implementation of the defined algorithm, but is in fact some much weaker function that
can be more-easily decoded and that fails to adequately protect the information. If NIST’s
statistics are to believed then this is something that happens on a regular basis.
1
NIST. , ITL NEWSLETTER FOR AUGUST 2006, [Online], Available from:
<http://www.itl.nist.gov/lab/pub/newsaug06.htm>.
2
http://csrc.nist.gov/groups/STM/cavp/index.html
3
https://www.pcisecuritystandards.org/security_standards/documents.php
4
http://selfservice.talisma.com/article.aspx?article=10359&p=81
5
http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2_Mar08-2007.pdf
6
https://www.pcisecuritystandards.org/pdfs/pci_ptp_encryption.pdf
7
http://csrc.nist.gov/groups/STM/cavp/validation.html
8
http://csrc.nist.gov/groups/STM/testing_labs/index.html