Examples of using Cryptographic operations in English and their translations into Russian
{-}
-
Official
-
Colloquial
Do not prompt for credentials for cryptographic operations.
Injects cryptographic operations into the license queries.
P1: referenced key valid for all cryptographic operations.
Cryptographic operations tend to be very laborious for the CPU, especially transactions with public keys.
Members of this group are authorized to perform cryptographic operations.
Encrypt, Decrypt, MAC etc.-- cryptographic operations performed on the key management server.
Unique built-in Trusted Platform Module(TPM)for highly secure cryptographic operations.
Additional relevant details, related to cryptographic operations involved, are given in sub- appendix 11 Common security mechanisms.
A CSP is responsible for creating keys, destroying them, andusing them to perform a variety of cryptographic operations.
Certificates are issued to subjects, but cryptographic operations with those certificates fail.
Cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module(TPM).
CSM_013 This key shall be used for all subsequent cryptographic operations using secure messaging.
Each CSP supports different character lengths for cryptographic keys. Configuring a longer key character length can enhance security by making it more difficult for a malicious user to decrypt the key, butit can also slow down the performance of cryptographic operations.
These capabilities are built on native Windows libraries for cryptographic operations, such as RSA and AES key generation.
Differential power analysis(DPA) is a more advanced form of power analysis,which can allow an attacker to compute the intermediate values within cryptographic computations through statistical analysis of data collected from multiple cryptographic operations.
The list displays only algorithms that support the cryptographic operations required for the certificate purpose that is selected on the Request Handling tab.
In addition, on the Signing tab of the Online Responder Properties page, the Do not display UI for cryptographic operations check box must be cleared.
Some countermeasure strategies involve algorithmic modifications such that the cryptographic operations occur on data that is related to the actual value by some mathematical relationship that survives the cryptographic operation. .
Dynamic SSL works by using a tokenization system for sensitive data in conjunction with secure redirection of cryptographic operations to a secure environment.
A secure cryptoprocessor is a dedicated computer on a chip ormicroprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.
Also in 2004, Adi Shamir and Eran Tromer demonstrated that it may be possible to conduct timing attacks against a CPU performing cryptographic operations by analyzing variations in acoustic emissions.
Several security vulnerabilities were found in botan1.10, a C++ library which provides support for many common cryptographic operations, including encryption, authentication, X.509v3 certificates and CRLs.
We advise on regulatory issues in the technology, media and telecommunications sectors and the Internet, including personal data protection,commercially sensitive information and cryptographic operations and any related criminal liability and other risks.
Major attempts to increase endpoint security have been to isolate key generation, storage and cryptographic operations to a smart card such as Google's Project Vault.
Using DPA, an adversary can obtain secret keys by analyzing power consumption measurements from multiple cryptographic operations performed by a vulnerable smart card or other device.
CSP_101 Any cryptographic operation performed by the motion sensor shall be in accordance with a specified algorithm and a specified key size.
CSP_201 Any cryptographic operation performed by the VU shall be in accordance with a specified algorithm and a specified key size.
This option can be used to help prevent unapproved use of the CA andits private key by requiring the administrator to enter a password before every cryptographic operation.
Depending on the type of the token, the computer OS will then either read the key from the token and perform a cryptographic operation on it, or ask the token's firmware to perform this operation A related application is the hardware dongle required by some computer programs to prove ownership of the software.
For example, if an encryption routine claims to be only breakable with X number of computer operations, then if it can be broken with significantly fewer than X operations, that cryptographic primitive is said to fail.