Deprecated: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
The algorithm and key length may be used, but the user must accept some security risk. The term is used when discussing the key lengths or algorithms that may be used to apply cryptographic protection.
Source: NIST SP 800-131A Rev.2 | Category: