Cryptographic Key Material Sample Clauses

Cryptographic Key Material. Cryptographic keys, classified CONFIDENTIAL CRYPTO, will be needed to operate the GPS equipment in the PPS mode. Provision of keys is through separate arrangement with NSA.
AutoNDA by SimpleDocs
Cryptographic Key Material. Any parameter passed to an encryption cipher which influences the output of the algorithm (with the exception of the message itself). Cryptographic Software Software used to protect the confidentiality, integrity, authenticity or accountability of information systems, or software used to generate cryptographic key material to be used for the above. Digital Signature The result of a cryptographic transformation of data that, when properly implemented with a supporting infrastructure and policy, provides the services of: 1. Origin authentication 2. Data integrity authentication 3. Signer non-repudiation. Encrypt-then- MAC The plaintext is first encrypted, and then a Message Authentication Code (MAC) is produced based on the resulting ciphertext. Antonymous to MAC-then-encrypt and encrypt-and-MAC. Ephemeral Key A key generated at each individual execution of a key exchange process. The opposite of a static or persistent key. FIPS 140-2 A cryptographic standard created by the American National Institute of Standards and Technology (NIST) used to certify cryptographic modules against four increasing security levels. Where later versions of FIPS 140 are approved for use by NIST, for example. FIPS 140-3, we will also accept these certifications as equivalent. Hash (also known as: Cryptographic Hash, Message Digest, Digest) The result of a cryptographic hash function, an algorithm with the following properties: 1. Variable size input 2. Fixed size output 3. Efficient; 4. Pre-image resistance (the function is computationally difficult to reverse) 5. Second pre-image resistance (Given a message, it is computationally difficult to find a message with the same cryptographic hash) 6. Collision resistance (it is computationally difficult to find any two messages with the same cryptographic hash).

Related to Cryptographic Key Material

  • Proprietary Materials Each of the Parties shall own its own intellectual property including without limitation all trade secrets, know-how, proprietary data, documents, and written materials in any format. Any materials created exclusively by IPS for the School shall be owned by IPS, and any materials created exclusively by Operator for the School shall be Operator’s proprietary material. The Parties acknowledge and agree that neither has any intellectual property interest or claims in the other Party’s proprietary materials. Notwithstanding the foregoing, materials and work product jointly created by the Parties shall be jointly owned by the Parties and may be used by the individual Party as may be agreed upon by both Parties from time to time.

  • Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.

  • Operator Materials Operator retains all right, title and interest in and to any and all of Operator’s software, materials, tools, forms, documentation, training and implementation materials and intellectual property (“Operator Materials”). Operator grants to the LEA a personal, nonexclusive license to use the Operator Materials for its own non-commercial, incidental use as set forth in the Service Agreement. Operator represents that it has all intellectual property rights necessary to enter into and perform its obligations in this DPA and the Service Agreement, warrants to the District that the District will have use of any intellectual property contemplated by the Service Agreement free and clear of claims of any nature by any third Party including, without limitation, copyright or patent infringement claims, and agrees to indemnify the District for any related claims.

  • Materials (Confirm each bullet point and sign below) ▪ Vendor claims some Vendor Data confidential to the extent permitted by T GC Chapter 552 and other applicable law. Vendor claims some Vendor Data confidential to the xtent permitted by TGC Chapter 552 and other applicable law. ▪ Vendor attached to this PDF all potentially confidential Vendor Data and listed the number of attached pages below. ▪ Vendor’s authorized signatory has signed below and shall upload this document in the proper location in the eBid System. ▪ Vendor agrees that TIPS shall not be liable for any release of confidential information required by law. Number of pages attached deemed confidential: Authorized Signature: (Confir ch bullet point and sig bel ) ( Confirm each bullet point and sign below By signing for Option 2 below, V endor ex pressly waives any confidentiality claim for all Vendor Data submitted in relation to this proposal and resulting contract. Vendor confirms that By signing for Option 2 below, V or e pressly waives any confidentiality claim for all Vendor Da ubmitted in relation TIPS may freely release Vendor Data submitted in relation to this proposal or resulting contract to any requestor. Vendor agrees that TIPS shall not be responsible or liable for any use or distribution of Vendor Data by TIPS or TIPS Members. ▪ Vendor’s authorized signatory has signed below and shall upload this document in the proper location in the eBid System. ▪Vendor agrees that TIPS shall not be liable for any release of confidential information required by law.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Samples The Contractor shall submit the following samples of Materials and relevant information to the Authority’s Engineer for pre-construction review:

  • Medical Information Throughout the Pupil's time as a member of the School, the School Medical Officer shall have the right to disclose confidential information about the Pupil if it is considered to be in the Pupil's own interests or necessary for the protection of other members of the School community. Such information will be given and received on a confidential, need-to-know basis.

Time is Money Join Law Insider Premium to draft better contracts faster.