NCJ Number
207833
Journal
Law Enforcement Technology Volume: 31 Issue: 10 Dated: October 2004 Pages: 116,118,123
Date Published
October 2004
Length
7 pages
Annotation
This article describes three types of encryption technology.
Abstract
Data security tools are necessary to keep information and networks secure. Among the various tools for data security is authentication, which requires users to verify their identity before being allowed to access the information. Three types of authentication software are reviewed, beginning with RSA Security’s SecurID, which is used by the Kansas Bureau of Investigation (KBI). SecurID uses a two factor authentication procedure involving both a unique personal identification number (PIN) and a token, which can take the form of a key fob, PINpad or card, or software token. RSA’s SecurID offers ease of use and little maintenance. The second encryption technology reviewed is CipherOptics’ SG1001 network encryption appliance, which uses the IP Security Protocol (IPSec). A technique known as hashing is part of the IPSec encryption; hashing authenticates both the data source and its network. Different encryption algorithms are also used, including advanced encryption standard (AES) and triple data encryption standard (3DES). The third authentication product reviewed is Meganet’s Virtual Matrix Encryption (VME), which is different from other encryption algorithms in that encrypted data does not contain message content. Instead, the encryption directs readers to where the content is stored. VME technology uses AES and is considered very sophisticated yet easy to use.