Jump to content

Legacy use

From Hackerpedia
Revision as of 00:12, 15 January 2026 by imported>Unknown user
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Languages: English | Français

Legacy use

The algorithm or key length may be used only to process already protected information (e.g., to decrypt ciphertext data or to verify a digital signature).


Source: NIST SP 800-131A Rev.2 | Category: