Cryptographic Key Material Sample Clauses

Cryptographic Key Material. Cryptographic keys, classified CONFIDENTIAL CRYPTO, will be needed to operate the GPS equipment in the PPS mode. Provision of keys is through separate arrangement with NSA.
Cryptographic Key Material. Any parameter passed to an encryption cipher which influences the output of the algorithm (with the exception of the message itself). Cryptographic Software Software used to protect the confidentiality, integrity, authenticity or accountability of information systems, or software used to generate cryptographic key material to be used for the above. Digital Signature The result of a cryptographic transformation of data that, when properly implemented with a supporting infrastructure and policy, provides the services of: 1. Origin authentication; 2. Data integrity authentication; 3. Signer non-repudiation. Encrypt-then- MAC The plaintext is first encrypted, and then a Message Authentication Code (MAC) is produced based on the resulting ciphertext. Antonymous to MAC-then-encrypt and encrypt-and-MAC. Ephemeral Key A key generated at each individual execution of a key exchange process. The opposite of a static or persistent key. FIPS 140-2 A cryptographic standard created by the American National Institute of Standards and Technology (NIST) used to certify cryptographic modules against four increasing security levels. Where later versions of FIPS 140 are approved for use by NIST, e.g. FIPS 140-3, we will also accept these certifications as equivalent. Hash (also known as: Cryptographic Hash, Message Digest, Digest) The result of a cryptographic hash function, an algorithm with the following properties: 1. Variable size input; 2. Fixed size output; 3. Efficient; 4. Pre-image resistance (the function is computationally difficult to reverse); 5. Second pre-image resistance (Given a message, it is computationally difficult to find a message with the same cryptographic hash); 6. Collision resistance (it is computationally difficult to find any two messages with the same cryptographic hash).

Related to Cryptographic Key Material

  • Proprietary Materials Each of the Parties shall own its own intellectual property including without limitation all trade secrets, know-how, proprietary data, documents, and written materials in any format. Any materials created exclusively by IPS for the School shall be owned by IPS, and any materials created exclusively by Operator for the School shall be Operator’s proprietary material. The Parties acknowledge and agree that neither has any intellectual property interest or claims in the other Party’s proprietary materials. Notwithstanding the foregoing, materials and work product jointly created by the Parties shall be jointly owned by the Parties and may be used by the individual Party as may be agreed upon by both Parties from time to time.

  • Customer Materials Subject to Section 4(a), all right, title and interest (including all Intellectual Property Rights) in and to the Customer Materials are owned by Customer or Customer’s suppliers.

  • Heavy Materials An Employee shall not be required to lift a building materials in excess of 20 kg in weight unless such Employee is provided with a mechanical aid or with an assisting Employee; provided that an Employee shall not to manually lift any building materials in excess of 20 kg weight to a height of more than 4 feet (1.2m) above the working platform.

  • Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.

  • Operator Materials Operator retains all right, title and interest in and to any and all of Operator’s software, materials, tools, forms, documentation, training and implementation materials and intellectual property (“Operator Materials”). Operator grants to the LEA a personal, nonexclusive license to use the Operator Materials for its own non-commercial, incidental use as set forth in the Service Agreement. Operator represents that it has all intellectual property rights necessary to enter into and perform its obligations in this DPA and the Service Agreement, warrants to the District that the District will have use of any intellectual property contemplated by the Service Agreement free and clear of claims of any nature by any third Party including, without limitation, copyright or patent infringement claims, and agrees to indemnify the District for any related claims.