Legacy use: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
The algorithm or key length may be used only to process already protected information (e.g., to decrypt ciphertext data or to verify a digital signature).
Source: NIST SP 800-131A Rev.2 | Category: