Quentin Gouchet, IT Security Consultant,atsec information security and Stephan Mueller, Principal Consultant and Evaluator, atsec information security. AES-GCM and IG A.5 confuse many vendors about how this algorithm should be implemented, which often delays FIPS 140-2
validations. The questions that remain to be answered are: Is IG A.5 meaningful? Is this IG going too far? How could it be relaxed? We might never find out!

General Technology Track