Jump to content

Apply cryptographic protection

From Hackerpedia
Revision as of 02:53, 15 January 2026 by imported>Unknown user

Languages: English | Français

Apply cryptographic protection

Depending on the algorithm, to encrypt or sign data, generate a hash function or Message Authentication Code (MAC), or establish keys (including wrapping and deriving keys).


Source: NIST SP 800-131A Rev.2 | Category: