Cryptographic key definition

Cryptographic key means data used to encrypt and decrypt data;
Cryptographic key means a series of symbols that is used in an algorithm to generate cipher text (encryption) from plain text or vice versa – from cipher text into plain text (decryption).
Cryptographic key means the data used to encrypt and digitally sign data for ----------------- secure storage and transmission.

Examples of Cryptographic key in a sentence

  • FCS_CKM.4 Cryptographic key destruction Hierarchical to: No other components.

  • FCS_CKM.1 Cryptographic key generation Hierarchical to: No other components.

  • The FCS: Cryptographic support class is composed of two families: Cryptographic key management (FCS_CKM) and Cryptographic operation (FCS_COP).

  • Hierarchical to: No other components.Dependencies: [FCS_CKM.2 Cryptographic distribution orFCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destructionFCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [random key generation method] and specified cryptographic key sizes [256-bit] that meet the following: [None].

  • FCS_CKM.3 Cryptographic key access, requires access to cryptographic keys to be performed in accordance with a specified access method which can be based on an assigned standard.

  • The Cryptographic key management (FCS_CKM) family addresses the management aspects of cryptographic keys, while the Cryptographic operation (FCS_COP) family is concerned with the operational use of those cryptographic keys.

  • FCS_CKM.1 Cryptographic key generation, requires cryptographic keys to be generated in accordance with a specified algorithm and key sizes which can be based on an assigned standard.

  • Hierarchical to: No other components Dependencies: [FDP_ITC.1 or FDP_ITC.2 orFCS_CKM.1Cryptographic key generation] FCS_CKM.4 Cryptographic key destructionFCS_COP.1.1 The TSF shall perform [encryption/decryption of HDD] in accordance with a specified cryptographic algorithm [AES] and cryptographic key sizes [256-bit] that meet the following: [FIPS PUB 197].

  • FCS_CKM.2 Cryptographic key distribution Hierarchical to: No other components.

  • FCS_CKM.2 Cryptographic key distribution, requires cryptographic keys to be distributed in accordance with a specified distribution method which can be based on an assigned standard.


More Definitions of Cryptographic key

Cryptographic key means a parameter which is used with a mathematical algorithm to convert, confirm, authenticate, encrypt or decode data,
Cryptographic key means a variable value that is applied using an algorithm to data to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the data.
Cryptographic key means a parameter used with a cryptographic algorithm to transform, validate, authenticate, encrypt or decrypt data.
Cryptographic key means a value used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification.
Cryptographic key. A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. Cryptography: The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification. Data: A subset of information in an electronic format that allows it to be retrieved or transmitted. Data Privacy: The assurance that a person’s or organization’s personal and private information is not inappropriately disclosed. Ensuring Data Privacy requires Access Management, eSecurity, and other data protection efforts. (SOURCE: Data Governance Institute) Data Security: Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure. Defense-in-Depth: Information security strategy integrating people, technology, and operation capabilities to establish variable barriers across multiple layers and dimensions of the organization. Denial of Service (DoS): The prevention of authorized access to resources or the delaying of time-critical operations. Depending on the service provided, time-critical may be defined at milliseconds or hours. Disaster Recovery Plan (DRP): A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities. Distributed Denial of Service (DDoS): A Denial of Service technique that uses numerous hosts to perform the attack. Electronic Protected Health Information (ePHI): Electronic Protected Health Information (PHI) consists of any information about health status, provision of health care, or payment for health care that can be linked to an individual. PHI refers to all “individually identifiable information” held or transmitted by State entities or its business associates in any form or media, whether paper, electronic or oral. “Individually identifiable health information” is information, including demographic data, that relates to:

Related to Cryptographic key

  • Images means all types of visual content, including without limitation still photography, motion film or video and may include audio elements, whether generated optically, electronically, digitally or by any other means, and shall include all metadata, keywords, descriptions and captions associated therewith. Any reference to Images includes the whole or the part.

  • Media means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system.

  • Computer network means the interconnection of hardwire or wireless communication lines with a computer through remote terminals, or a complex consisting of 2 or more interconnected computers.

  • Hyperlink means a special HTML code that allows text or graphics to serve as a link that, when clicked on, takes a user to another place in the same document, to another document, or to another Internet Web site or Web page.

  • Computer Virus means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource;

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Radiographic operations means all activities performed with a radiographic exposure device, or with a radiation machine. Activities include using, transporting except by common or contract carriers, or storing at a temporary job site, performing surveys to confirm the adequacy of boundaries, setting up equipment, and any activity inside restricted area boundaries. Transporting a radiation machine is not considered a radiographic operation.

  • Crypt means a chamber in a mausoleum of sufficient size to entomb the uncremated remains of a deceased person.

  • Computer database or “database” means a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.

  • Logo means the SAP Partner logo as detailed in the SAP Partner Logo Usage Guidelines.

  • snippetLinks [{"key":"specifically","type":"clause","offset":[20,32]},{"key":"provided-herein","type":"clause","offset":[33,48]},{"key":"at-the-closing","type":"clause","offset":[50,64]},{"key":"the-parties-shall","type":"clause","offset":[65,82]},

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Metadata includes all information created manually or automatically to provide meaning or context to other data.

  • Online means transactions through electronic data-interchange whether real time transactions or otherwise, which may be through the internet, intranet networks and the like.

  • Electronic device technology means any technology that involves microelectronics, semiconductors, electronic equipment, and instrumentation, radio frequency, microwave, and millimeter electronics; optical and optic-electrical devices; or data and digital communications and imaging devices.

  • Download means copying data from one computer system (for example a backend server) to another (for example a vehicle).

  • Devices means any and all devices owned or purchased from time to time by Party A and utilized for the purposes of the provision of the Services.

  • Tomographic plane means that geometric plane which is identified as corresponding to the output tomogram.

  • Web Site means the website that you are currently using (xxx.xxxxxxxxxxxxxxx.xx.xx) and any sub-domains of this site (e.g. xxxxxxxxx.xxx.xxxxxxxxxxxxxxx.xx.xx) unless expressly excluded by their own terms and conditions.

  • fingerprint data means the data relating to the four fingerprints of the index, middle finger, ring finger and little finger from the right hand where present, and otherwise from the left hand;

  • Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer databases or computer software documentation.

  • Web means the World Wide Web.

  • coronavirus means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);

  • Web spray adhesive means any aerosol adhesive that is not a mist spray or special purpose spray adhesive.

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • Chip means the microchip embedded in the Card and visible on the Card as a Gold or Silver coloured microchip.