Jump to content

Legacy use: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
imported>Unknown user
No edit summary
 
(No difference)

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Legacy use

The algorithm or key length may be used only to process already protected information (e.g., to decrypt ciphertext data or to verify a digital signature).


Source: NIST SP 800-131A Rev.2 | Category: