Confirmed users
529
edits
No edit summary |
|||
| Line 15: | Line 15: | ||
</td> | </td> | ||
</tr></table> | </tr></table> | ||
= Algorithms by security levels = | = Algorithms by security levels = | ||
| Line 78: | Line 69: | ||
| Hash || MD5 || 64 bits | | Hash || MD5 || 64 bits | ||
|} | |} | ||
= Handling= | |||
== Key material == | |||
Key material identifies the cryptographic secrets that compose a key. All key material must be treated as restricted data, meaning that only individual with specific training and need-to-know should have access to key material. | |||
Key material must be encrypted on transmission. Key material can be stored in clear text, but with proper access control. | |||
== Public certificates == | |||
Public certificates are public and do not require specific access control or encryption. | |||