Jump to content

Deprecated: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
imported>Unknown user
No edit summary
 
(One intermediate revision by the same user not shown)
(No difference)

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Deprecated

The algorithm and key length may be used, but the user must accept some security risk. The term is used when discussing the key lengths or algorithms that may be used to apply cryptographic protection.


Source: NIST SP 800-131A Rev.2 | Category: