Примеры использования Cryptographic keys на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
CSP_203 If the VU distributes cryptographic keys, it shall be in accordance with specified key distribution methods.
CSP_205 If the VU destroys cryptographic keys, it shall be in accordance with specified cryptographic keys destruction methods.
The group claimed that the technology involves a"64-bit encryption machine" that requires cryptographic keys unique to the specific hardware of each installed system.
Storing cryptographic keys in the fewest locations helps an organization to keep track and monitor all key locations,
Some tokens may store cryptographic keys, such as a digital signature,
which might leak sensitive values like cryptographic keys.
non-locality can be used to distribute cryptographic keys with perfect security.
where they are used to generate random cryptographic keys to transmit data securely.
The security mechanisms within the software produced by the project MUST generate all cryptographic keys and nonces using a cryptographically secure random number generator,
protocols, and cryptographic keys used to protect cardholder data,
installed to safely store cryptographic keys and enable encryption of all video data,
in the course of its business, engages in issuing certificates in relation to cryptographic keys used for the purposes of digital signatures.
with respect to the cryptographic keys and key certificates used in the mutual authentication,
seals that must be broken to attain physical access to the plaintext cryptographic keys and critical security parameters(CSPs)
to deliver the cryptographic keys and the interoperability certificates.
The user generates or is given a unique cryptographic key pair;
At the field Cryptographic key can choose following options.
The user's public cryptographic key;
During the login process, a cryptographic key is performed using 1024-bit RSA encryption.
In a case where a private and a public cryptographic key are used respectively to create and verify an electronic signature,