Examples of Data Encryption in a sentence
The Passive Authentication Mechanism and the Data Encryption are performed completely and independently of the TOE by the TOE environment.
Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.
Connections between all components of the Tribal Lottery System shall only be through the use of secure communication protocols which are designed to prevent unauthorized access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with changeable seeds or algorithms.
Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.
The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303].
Encryption must be via an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules per GSA policy.
The Passive Authentication Mechanism and the Data Encryption are performed completely and independently on the TOE by the TOE environment.
The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of additional sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303].
Communications network secu- rity that utilizes the Data Encryption Standard algorithm to encrypt the PIN, at a minimum, from the point of entry.
The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303] and Password Authenticated Connection Establishment [TR-SAC].