Examples of using Cryptographic operations in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Members are authorized to perform cryptographic operations.
All sensitive cryptographic operations are securely computed in the Nitrokey.
Members of this group are authorized to perform cryptographic operations.
Security keys allow performing cryptographic operations in such a way that private information never leaves the device.
As a result,user 4 can no longer use key 6 in cryptographic operations.
The cryptographic operations using the private key take place in the HSM, the remaining operations with the SASS security software.
All keys are securely stored and all cryptographic operations happen on this hardware.
The owner manages the key, canexport and delete it, and can use the key in cryptographic operations.
Certificates are issued to subjects, but cryptographic operations with those certificates fail.
Providing a secure, closed computing environment for encryption, hashing and other cryptographic operations.
Users who share the key can use it in cryptographic operations, but they cannot export it.
This parameter givesother HSM crypto users(CUs) permission to use this key in cryptographic operations.
Users who share the key can use the key in cryptographic operations, but they cannot delete, export, share, or unshare the key.
CU: Crypto users can create an manage keys and use keys in cryptographic operations.
Through these cryptographic operations IxProtector ensures that the typical"record and playback" attack is prevented.
It is recommended, for example, to compile the library for cryptographic operations into the app.
Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module TPM.
Users with whom the key is shared can use the key in cryptographic operations, but they cannot export it.
It includes multiple commands that generate, delete, import, and export keys, get and set attributes, find keys,and perform cryptographic operations.
The list displays only algorithms that support the cryptographic operations required for the certificate purpose that is selected on the Request Handling tab.
The central certificate administration of Gpg4win, which ensures uniform user navigation for all cryptographic operations.
But newer solid-state disks(SSDs) use hardware-based FDE, where the cryptographic operations are performed on an AES coprocessor baked into the disk rather than on the host computer's CPU.
When quorum authentication is enabled on a key,a quorum of users must approve any cryptographic operations that use the key.
The security certified OPTIGA™ TPM offers besides cryptographic operations a tamper resistant key store for high sensible credentials, and thereby secures not only the sensible external interfaces of the car but also the vehicle supply chain.
For example, you must have permissions to create a KMS CMK, to manage the CMK,to use the CMK for cryptographic operations(such as encryption and decryption), and so on.
The following instructions show how to use Luna JSP, which consists of a single JCA/JCE service provider, to build a Java-based sample application thatuses SafeNet Luna products for secure cryptographic operations.
A hardware security module(HSM)is a hardware appliance that provides secure key storage and cryptographic operations within a tamper-resistant hardware module.
The following procedure shows how to build a sample program that uses the SafeNet PKCS 11 library toencrypt and decrypt a string, using the HSM to perform the cryptographic operations.
The wrapKey command writes the encrypted key to a file that you specify, but it does not remove the key from the HSM,change its key attributes, or prevent you from using it in cryptographic operations.