cryptographic information


Related to cryptographic information: cryptologist

cryptographic information

All information significantly descriptive of cryptographic techniques and processes or of cryptographic systems and equipment (or their functions and capabilities) and all cryptomaterial.
References in periodicals archive ?
The documents further reveal that the NSA makes cryptographic modifications to commercial or indigenous cryptographic information security devices or systems so they can be subject to eavesdropping.
Utilizing the unique cryptographic information in a system's TPM module ensures the identity of an individual computer.
Voltage SecureData now integrates with Hardware Security Modules (HSMs) to offer new benefits to companies that use them to store cryptographic information in order to meet internal security requirements.
Which means that our government's current obsession with suppressing the spread of cryptographic information and tools is really a kind of suppression of human nature - and history tells us that any such effort at suppressing something that everybody does is invariably futile over the long run.
Some of the systems supported include VHF digital radio, wideband and satellite communications, cryptographic information, Cisco Voice over Internet Protocol (VoIP), and IT/Networking equipment.
Our centralized security and policy management proved both highly scalable and simple to use, and was completely effective in protecting sensitive cryptographic information.
Chrysalis-ITS Luna HSMs safeguard the most sensitive cryptographic information to ensure encryption keys are invulnerable to attack.
Nasdaq: DKEY) announced today that it has received an initial production order for Datakey cryptographic information security products from BITSource, Inc.
This standard specifies an API (Application Program Interface), called Cryptoki, to devices that hold cryptographic information and perform cryptographic functions.
Certain applications require the additional functionality of two-factor security for reading secured information that requires both the physical possession of the smart card or smart key, which stores the private cryptographic keys and processes cryptographic information, and its password.
a supplier of cryptographic information security solutions that deliver a certificate-based smart card solution for strong, end user authentication.
11-based application programming interface (API) for devices that hold cryptographic information and perform cryptographic functions.
Full browser ?