RSA Security Projection Television 5.2.2 Manual do Utilizador Página 171

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 376
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 170
Chapter 4 Using Crypto-C 149
Using Cryptographic Hardware
To implement this, the hardware accelerator might require you to call its key-
wrapping routines to build a digital envelope. When you request the key in order to
store it for later use, the hardware could return a handle to the key. But if you give
that data to another cryptographic package, the key will mean nothing.
So, once you build a key (symmetric or private) on a hardware device, it is possible
that only that hardware device will be able to use that key. Therefore, you should use
hardware accelerators only if you thoroughly understand their use.
Vista de página 170
1 2 ... 166 167 168 169 170 171 172 173 174 175 176 ... 375 376

Comentários a estes Manuais

Sem comentários