Cryptographic key definition

Cryptographic key means data used to encrypt and decrypt data;
Cryptographic key. A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. Cryptography: The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification. Data: A subset of information in an electronic format that allows it to be retrieved or transmitted. Data Privacy: The assurance that a person’s or organization’s personal and private information is not inappropriately disclosed. Ensuring Data Privacy requires Access Management, eSecurity, and other data protection efforts. (SOURCE: Data Governance Institute) Data Security: Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. Defense-in-Depth: Information security strategy integrating people, technology, and operation capabilities to establish variable barriers across multiple layers and dimensions of the organization. Denial of Service (DoS): The prevention of authorized access to resources or the delaying of time-critical operations. Depending on the service provided, time-critical may be defined at milliseconds or hours. Disaster Recovery Plan (DRP): A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities. Distributed Denial of Service (DDoS): A Denial of Service technique that uses numerous hosts to perform the attack. Electronic Protected Health Information (ePHI): Electronic Protected Health Information (PHI) consists of any information about health status, provision of health care, or payment for health care that can be linked to an individual. PHI refers to all “individually identifiable information” held or transmitted by State entities or its business associates in any form or media, whether paper, electronic or oral. “Individually identifiable health information” is information, including demographic data, that relates to:
Cryptographic key means a series of symbols that is used in an algorithm to generate cipher text (encryption) from plain text or vice versa – from cipher text into plain text (decryption).

Examples of Cryptographic key in a sentence

  • FCS_CKM.4 Cryptographic key destruction FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method zeroisation that meets the following: none.

  • Hierarchical to: No other components Dependencies: [FDP_ITC.1 or FDP_ITC.2 orFCS_CKM.1Cryptographic key generation] FCS_CKM.4 Cryptographic key destructionFCS_COP.1.1 The TSF shall perform [encryption/decryption of HDD] in accordance with a specified cryptographic algorithm [AES] and cryptographic key sizes [256-bit] that meet the following: [FIPS PUB 197].

  • Hierarchical to: No other components.Dependencies: [FCS_CKM.2 Cryptographic distribution orFCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destructionFCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [random key generation method] and specified cryptographic key sizes [256-bit] that meet the following: [None].

  • FCS_CKM.1/Session Cryptographic key generation for session keys FCS_CKM.1.1/SessionThe TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].

  • FCS_CKM.4/Session Keys Cryptographic key destruction FCS_CKM.4.1/Session Keys The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method (clearKey() method) that meet the following: [JCAPI222].

  • FCS_CKM.4/BT Cryptographic key destruction - BT FCS_CKM.4.1/BT The Basic Terminal shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method secure erase of the key value that meets the following: none.The Basic Terminal shall meet the requirement “Cryptographic operation (FCS_COP.1)” as specified below [CC-1].

  • FCS_CKM.1/KDF_BT Cryptographic key generation – Generation of Document Basic Access Keys by the Basic Terminal FCS_CKM.1.1/KDF_BT The Basic Terminal shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm Document Basic Access Key Derivation Algorithm and specified cryptographic key sizes 112 bit that meet the following: [PKI].The Basic Terminal shall meet the requirement “Cryptographic key destruction (FCS_CKM.4)” as specified below [CC-2].

  • FCS_CKM.1/Session Keys Cryptographic key generation FCS_CKM.1.1/Session Keys The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm PAP Session Keys Derivation and specified cryptographic key sizes 16 bytes that meet the following: [PM-1] and [PM-2] standard.

  • FCS_CKM.4/PACE Cryptographic key destruction Hierarchical to:No other componentsDependencies:[FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, orFCS_CKM.1 Cryptographic key generation]: fulfilled by FCS_CKM.1/DH_PACE andFCS_CKM.1/PERSO.

  • Hierarchical to:No other componentsDependencies:[FCS_CKM.2 Cryptographic key distribution or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction FCS_CKM.1.1/SCDThe TSF shall generate SCD/SVD pair in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].


More Definitions of Cryptographic key

Cryptographic key means a value used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification.
Cryptographic key means the data used to encrypt and digitally sign data for secure storage and transmission.
Cryptographic key means a parameter used with a cryptographic algorithm to transform, validate, authenticate, encrypt or decrypt data.
Cryptographic key means a parameter which is used with a mathematical algorithm to convert, confirm, authenticate, encrypt or decode data,
Cryptographic key means a variable value that is applied using an algorithm to data to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the data.

Related to Cryptographic key

  • Images means all types of visual content, including without limitation still photography, motion film or video and may include audio elements, whether generated optically, electronically, digitally or by any other means, and shall include all metadata, keywords, descriptions and captions associated therewith. Any reference to Images includes the whole or the part.

  • Media means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system.

  • Computer network means the interconnection of hardwire or wireless communication lines with a computer through remote terminals, or a complex consisting of 2 or more interconnected computers.

  • Hyperlink means a special HTML code that allows text or graphics to serve as a link that, when clicked on, takes a user to another place in the same document, to another document, or to another Internet Web site or Web page.

  • Computer Virus means a set of corrupting, harmful or otherwise unauthorized instructions or code including a set of maliciously introduced unauthorized instructions or code, programmatic or otherwise, that propagate themselves through a computer system or network of whatsoever nature. “Computer Virus” includes, but is not limited to, “Trojan Horses,” “worms” and “time or logic bombs”.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Radiographic operations means all activities performed with a radiographic exposure device, or with a radiation machine. Activities include using, transporting except by common or contract carriers, or storing at a temporary job site, performing surveys to confirm the adequacy of boundaries, setting up equipment, and any activity inside restricted area boundaries. Transporting a radiation machine is not considered a radiographic operation.

  • Crypt means a chamber in a mausoleum of sufficient size to entomb the uncremated remains of a deceased person.

  • Computer database means a collection of recorded data in a form capable of being processed by a computer. The term does not include computer software.

  • Logo means the SAP Partner logo as detailed in the SAP Partner Logo Usage Guidelines.

  • snippetLinks [{"key":"specifically","type":"clause","offset":[20,32]},{"key":"provided-herein","type":"clause","offset":[33,48]},{"key":"at-the-closing","type":"clause","offset":[50,64]},{"key":"the-parties-shall","type":"clause","offset":[65,82]},

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Metadata includes all information created manually or automatically to provide meaning or context to other data.

  • Online means transactions through electronic data-interchange whether real time transactions or otherwise, which may be through the internet, intranet networks and the like.

  • Electronic device technology means a technology involving

  • Download means copying data from one computer system (for example a backend server) to another (for example a vehicle).

  • Devices means (whether physical or virtual) a server, system, workstation, computer, mobile device, or end point upon which or through which the Services are used and/or on which the Software is installed.

  • Tomographic plane means that geometric plane which is identified as corresponding to the output tomogram.

  • Web Site means the website that you are currently using (xxx.xxxxxxxxxxxxxxx.xx.xx) and any sub-domains of this site (e.g. xxxxxxxxx.xxx.xxxxxxxxxxxxxxx.xx.xx) unless expressly excluded by their own terms and conditions.

  • Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer databases or computer software documentation.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 Security Rule at 45 CFR § 164.304, encrypt means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key. - Release: Shall have the same meaning as Disclose - LEA: As used in this DPA and all Exhibits, the term LEA shall mean the educational agency, as defined in Education Law Section 2-d, that has executed the DPA; if the LEA is a board of cooperative educational services, then the term LEA shall also include Participating School Districts for purposes of the following provisions of the DPA: Article I, Section 2; Article II, Sections 1 and 3; and Sections 1, 2, and 3 of Article III.

  • Web means the World Wide Web.

  • Web spray adhesive means any aerosol adhesive that is not a mist spray or special purpose spray adhesive.

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • Commercial Software means Software developed or regularly used that: (i) has been sold, leased, or licensed to the general public; (ii) has been offered for sale, lease, or license to the general public; (iii) has not been offered, sold, leased, or licensed to the public but will be available for commercial sale, lease, or license in time to satisfy the delivery requirements of this Contract; or (iv) satisfies a criterion expressed in (i), (ii), or (iii) above and would require only minor modifications to meet the requirements of this Contract.

  • Chip means an integrated circuit embedded in the Card.