RSA Security Projection Television 5.2.2 Manual de usuario Pagina 171

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 376
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 170
Chapter 4 Using Crypto-C 149
Using Cryptographic Hardware
To implement this, the hardware accelerator might require you to call its key-
wrapping routines to build a digital envelope. When you request the key in order to
store it for later use, the hardware could return a handle to the key. But if you give
that data to another cryptographic package, the key will mean nothing.
So, once you build a key (symmetric or private) on a hardware device, it is possible
that only that hardware device will be able to use that key. Therefore, you should use
hardware accelerators only if you thoroughly understand their use.
Vista de pagina 170
1 2 ... 166 167 168 169 170 171 172 173 174 175 176 ... 375 376

Comentarios a estos manuales

Sin comentarios