RSA Security Projection Television 5.2.2 Manuel d'utilisateur Page 171

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 376
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 170
Chapter 4 Using Crypto-C 149
Using Cryptographic Hardware
To implement this, the hardware accelerator might require you to call its key-
wrapping routines to build a digital envelope. When you request the key in order to
store it for later use, the hardware could return a handle to the key. But if you give
that data to another cryptographic package, the key will mean nothing.
So, once you build a key (symmetric or private) on a hardware device, it is possible
that only that hardware device will be able to use that key. Therefore, you should use
hardware accelerators only if you thoroughly understand their use.
Vue de la page 170
1 2 ... 166 167 168 169 170 171 172 173 174 175 176 ... 375 376

Commentaires sur ces manuels

Pas de commentaire