Cryptographic key definition

Cryptographic key means data used to encrypt and decrypt data;
Cryptographic key means a series of symbols that is used in an algorithm to generate cipher text (encryption) from plain text or vice versa – from cipher text into plain text (decryption).
Cryptographic key means the data used to encrypt and digitally sign data for ----------------- secure storage and transmission.

Examples of Cryptographic key in a sentence

  • Hierarchical to: No other components Dependencies: [FDP_ITC.1 or FDP_ITC.2 orFCS_CKM.1Cryptographic key generation] FCS_CKM.4 Cryptographic key destructionFCS_COP.1.1 The TSF shall perform [encryption/decryption of HDD] in accordance with a specified cryptographic algorithm [AES] and cryptographic key sizes [256-bit] that meet the following: [FIPS PUB 197].

  • Hierarchical to: No other components.Dependencies: [FCS_CKM.2 Cryptographic distribution orFCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destructionFCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [random key generation method] and specified cryptographic key sizes [256-bit] that meet the following: [None].

  • FCS_CKM.4 Cryptographic key destruction FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method zeroisation that meets the following: none.

  • FCS_CKM.1/Session Cryptographic key generation for session keys FCS_CKM.1.1/SessionThe TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].

  • FCS_CKM.4/BT Cryptographic key destruction - BT FCS_CKM.4.1/BT The Basic Terminal shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method secure erase of the key value that meets the following: none.The Basic Terminal shall meet the requirement “Cryptographic operation (FCS_COP.1)” as specified below [CC-1].

  • FCS_CKM.1/Session Keys Cryptographic key generation FCS_CKM.1.1/Session Keys The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm PAP Session Keys Derivation and specified cryptographic key sizes 16 bytes that meet the following: [PM-1] and [PM-2] standard.

  • FCS_CKM.4/Session Keys Cryptographic key destruction FCS_CKM.4.1/Session Keys The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method (clearKey() method) that meet the following: [JCAPI222].

  • See also 47 CFR 76.56(d)(3).27 See NAB Reply Comments at 2–3.28 See Fourth FNPRM, at para.

  • FCS_CKM.1 /AA Cryptographic key generation for AA FCS_CKM.1.1/AAThe TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].

  • Hierarchical to:No other componentsDependencies:[FCS_CKM.2 Cryptographic key distribution or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction FCS_CKM.1.1/SCDThe TSF shall generate SCD/SVD pair in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].


More Definitions of Cryptographic key

Cryptographic key. A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. Cryptography: The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification. Data: A subset of information in an electronic format that allows it to be retrieved or transmitted. Data Privacy: The assurance that a person’s or organization’s personal and private information is not inappropriately disclosed. Ensuring Data Privacy requires Access Management, eSecurity, and other data protection efforts. (SOURCE: Data Governance Institute) Data Security: Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. Defense-in-Depth: Information security strategy integrating people, technology, and operation capabilities to establish variable barriers across multiple layers and dimensions of the organization. Denial of Service (DoS): The prevention of authorized access to resources or the delaying of time-critical operations. Depending on the service provided, time-critical may be defined at milliseconds or hours. Disaster Recovery Plan (DRP): A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities. Distributed Denial of Service (DDoS): A Denial of Service technique that uses numerous hosts to perform the attack. Electronic Protected Health Information (ePHI): Electronic Protected Health Information (PHI) consists of any information about health status, provision of health care, or payment for health care that can be linked to an individual. PHI refers to all “individually identifiable information” held or transmitted by State entities or its business associates in any form or media, whether paper, electronic or oral. “Individually identifiable health information” is information, including demographic data, that relates to:
Cryptographic key means a value used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification.
Cryptographic key means a variable value that is applied using an algorithm to data to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the data.
Cryptographic key means a parameter which is used with a mathematical algorithm to convert, confirm, authenticate, encrypt or decode data,
Cryptographic key means a parameter used with a cryptographic algorithm to transform, validate, authenticate, encrypt or decrypt data.

Related to Cryptographic key

  • Images means all types of visual content, including without limitation still photography, motion film or video and may include audio elements, whether generated optically, electronically, digitally or by any other means, and shall include all metadata, keywords, descriptions and captions associated therewith. Any reference to Images includes the whole or the part.

  • Media means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system.

  • Computer network means the interconnection of hardwire or wireless communication lines with a computer through remote terminals, or a complex consisting of 2 or more interconnected computers.

  • Hyperlink means a special HTML code that allows text or graphics to serve as a link that, when clicked on, takes a user to another place in the same document, to another document, or to another Internet Web site or Web page.

  • Computer Virus means a set of corrupting, harmful or otherwise unauthorized instructions or code including a set of maliciously introduced unauthorized instructions or code, programmatic or otherwise, that propagate themselves through a computer system or network of whatsoever nature. “Computer Virus” includes, but is not limited to, “Trojan Horses,” “worms” and “time or logic bombs”.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Crypt means a chamber in a mausoleum of sufficient size to entomb the uncremated remains of a deceased person.

  • Computer database or “database” means a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.

  • Logo means the SAP Partner logo as detailed in the SAP Partner Logo Usage Guidelines.

  • snippetLinks [{"key":"specifically","type":"clause","offset":[20,32]},{"key":"provided-herein","type":"clause","offset":[33,48]},{"key":"at-the-closing","type":"clause","offset":[50,64]},{"key":"the-parties-shall","type":"clause","offset":[65,82]},

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Metadata includes all information created manually or automatically to provide meaning or context to other data.

  • Online means transactions through electronic data-interchange whether real time transactions or otherwise, which may be through the internet, intranet networks and the like.

  • Electronic device technology means a technology involving

  • Download means copying data from one computer system (for example a backend server) to another (for example a vehicle).

  • Devices means any and all devices owned or purchased from time to time by Party A and utilized for the purposes of the provision of the Services.

  • Tomographic plane means that geometric plane which is identified as corresponding to the output tomogram.

  • Web Site means the website that you are currently using (xxx.xxxxxxxxxxxxxxx.xx.xx) and any sub-domains of this site (e.g. xxxxxxxxx.xxx.xxxxxxxxxxxxxxx.xx.xx) unless expressly excluded by their own terms and conditions.

  • fingerprint data means the data relating to the four fingerprints of the index, middle finger, ring finger and little finger from the right hand where present, and otherwise from the left hand;

  • Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer databases or computer software documentation.

  • Web means the World Wide Web.

  • coronavirus means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);

  • Web spray adhesive means any aerosol adhesive that is not a mist spray or special purpose spray adhesive.

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • Commercial Software means Software developed or regularly used that: (i) has been sold, leased, or licensed to the general public; (ii) has been offered for sale, lease, or license to the general public; (iii) has not been offered, sold, leased, or licensed to the public but will be available for commercial sale, lease, or license in time to satisfy the delivery requirements of this Contract; or (iv) satisfies a criterion expressed in (i), (ii), or (iii) above and would require only minor modifications to meet the requirements of this Contract.

  • Chip means an integrated circuit embedded in the Card.