Vendors get behind encryption specification

By

A group of hardware and security vendors including HP, IBM and RSA are putting their weight behind a new encryption key specification.

The specification, known as the Key Management Interoperability Protocol (KMIP), proposes a method for allowing various hardware devices and encryption systems to communicate with one another and manage multiple encryption keys.

Other companies backing the standard include Seagate, LSI, Brocade and Thales.

The companies hope that the KMIP specification will allow users to more efficiently decrypt data and manage secured hardware without reducing the security level of encryption systems.

Those behind the specification said that they now intend to submit it to Organization for the Advancement of Structured Information Standards (OASIS) in hopes of eventually establishing KMIP as a security industry standard for encryption key management.

OASIS has already come out in favor of the move.

"The IT community is asking for open standards and interoperability to help meet the increasing demand for encryption," said OASIS executive director Laurent Liscia.

"We applaud Brocade, HP, IBM, LSI, RSA, Seagate and Thales for choosing to advance KMIP through the open standards process, and we encourage others in the security community, both users and providers, to participate in the standardisation of this very important work."

Vendors get behind encryption specification
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

Ex-student charged over Western Sydney University cyberattacks

Ex-student charged over Western Sydney University cyberattacks

Home Affairs officer accessed data on "friends and associates"

Home Affairs officer accessed data on "friends and associates"

SA Water plans 'once-in-a-generation' core technology uplift

SA Water plans 'once-in-a-generation' core technology uplift

Sportsbet recruits 'security champions' in shift-left strategy

Sportsbet recruits 'security champions' in shift-left strategy

Log In

  |  Forgot your password?