We have a requirement from one of our customers regarding the encryption algorithms - "Make use of published public encryption algorithms that are considered to be practically unbroken. Contracting Authority considers an algorithm practically unbroken when a key can't be recovered within 1 year with hardware costing less than 1,000,000 euro. We should have a life cycle process for the encryption algorithms in place to ensure the 1 year duration is kept despite the every increase computing power. Describe the process."
We would greatly appreciate if you could help us with this question. Best regards, Ido This e-mail message is intended for the recipient only and contains information which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this transmission in error, please inform us by e-mail, phone or fax, and then delete the original and all copies thereof.