Примеры использования Cryptographic keys на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Contains cryptographic keys for signing data only.
Authorized certification authorities may issue certificates in relation to the cryptographic keys of natural and legal persons.
Contains cryptographic keys for encryption and decryption.
Individual Bitcoins are calculated as cryptographic keys in peer-to-peer networks.
Store cryptographic keys in the fewest possible locations.
In case Key_P1 device loss will be a way to recover cryptographic keys and transfer keys on a new device Key_P1.
Cryptographic keys must be strongly protected because those who obtain access will be able to decrypt data.
The attack can non-invasively extract cryptographic keys and other secret information from the device.
The cryptographic keys that protect your software are securely stored in a CmActLicense that is separate from your software.
The workshop card shall be able to store the cryptographic keys needed for pairing motion sensors to vehicle units.
Cryptographic keys must be stored securely to prevent unauthorized or unnecessary access that could result in the exposure of cardholder data.
And to issue a security policy proving that cryptographic keys will be managed securely which has to be approved by the ERCA.
The core of every CmDongle is a smart card chip,which includes a microcontroller with a secure storage area for cryptographic keys and the firmware.
Restrict access to cryptographic keys to the fewest number of custodians necessary.
These utilize the authentication services and port access control described in IEEE 802.1X to establish andchange the appropriate cryptographic keys.
In addition, export all cryptographic keys that are stored on the server before you use the wizard to delete the domain.
Each AES cipher encrypts and decrypts data in blocks of 128 bits using the cryptographic keys of 128, 192 and 256-bit- with 256-bit being the most secure.
Some tokens may store cryptographic keys, such as a digital signature, or biometric data, such as fingerprint details.
Once the import process is complete, these CmActLicenses are bound to the machine andcan be used as secure repositories for licenses and cryptographic keys.
CSP_203 If the VU distributes cryptographic keys, it shall be in accordance with specified key distribution methods.
Any person who, or entity which,as an ordinary part of its business, engages in issuing certificates in relation to cryptographic keys used for the purposes of digital signatures.
CSP_204 If the VU accesses cryptographic keys, it shall be in accordance with specified cryptographic keys access methods.
The group claimed that the technology involves a"64-bit encryption machine" that requires cryptographic keys unique to the specific hardware of each installed system.
CSP_205 If the VU destroys cryptographic keys, it shall be in accordance with specified cryptographic keys destruction methods.
This sample encrypts files of office applications(such as Microsoft Office and OpenOffice), archives, images,database files, cryptographic keys, the files of 1C: Enterprise and others.
CSP_103 If the motion sensor distributes cryptographic keys, it shall be in accordance with specified key distribution methods.
Storing cryptographic keys in the fewest locations helps an organization to keep track and monitor all key locations, and minimizes the potential for keys to be exposed to unauthorized parties.
Examine system configurations andkey storage locations to verify that cryptographic keys used to encrypt/decrypt cardholder data exist in one(or more) of the following form at all times.
CSP_202 If the VU generates cryptographic keys, it shall be in accordance with specified cryptographic key generation algorithms and specified cryptographic key sizes.
Providing guidance to customers on how to securely transmit,store and update cryptographic keys can help prevent keys from being mismanaged or disclosed to unauthorized entities.