-
公开(公告)号:DE69328334D1
公开(公告)日:2000-05-18
申请号:DE69328334
申请日:1993-09-08
Applicant: IBM
Inventor: ELANDER ROBERT C , HOLLOWAY CHRISTOPHER J , JOHNSON DONALD B , KELLY MICHAEL J , LE AN V , LUBOLD PAUL G , MATYAS STEPHEN M , RANDALL JAMES D , WILKINS JOHN D
Abstract: A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
-
公开(公告)号:DE69328334T2
公开(公告)日:2000-10-19
申请号:DE69328334
申请日:1993-09-08
Applicant: IBM
Inventor: ELANDER ROBERT C , HOLLOWAY CHRISTOPHER J , JOHNSON DONALD B , KELLY MICHAEL J , LE AN V , LUBOLD PAUL G , MATYAS STEPHEN M , RANDALL JAMES D , WILKINS JOHN D
Abstract: A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
-
公开(公告)号:CA2100234C
公开(公告)日:1999-01-19
申请号:CA2100234
申请日:1993-07-09
Applicant: IBM
Inventor: ELANDER ROBERT C , HOLLOWAY CHRISTOPHER J , JOHNSON DONALD B , RANDALL JAMES D , WILKINS JOHN D , KELLY MICHAEL J , LE AN V , LUBOLD PAUL G , MATYAS STEPHEN M
Abstract: A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
-
公开(公告)号:CA2100234A1
公开(公告)日:1994-04-17
申请号:CA2100234
申请日:1993-07-09
Applicant: IBM
Inventor: ELANDER ROBERT C , HOLLOWAY CHRISTOPHER J , JOHNSON DONALD B , KELLY MICHAEL J , LE AN V , LUBOLD PAUL G , MATYAS STEPHEN M , RANDALL JAMES D , WILKINS JOHN D
Abstract: A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
-
-
-