Overview#
Key is a granted
Privilege used by a
lock (
Policy Enforcement Point PEP) to provide
Access to a
Protected Resource
Key is used for locking or unlocking a Protected Resource
Key may be a physical Entity or a Digital Key or some combination of both.
Key may be an Cryptographic Key
Key is a
parameter used with a
cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the
key can reproduce or reverse the operation, while an entity without knowledge of the key cannot.
Examples applicable to this Recommendation include:
- The computation of a keyed-hash message authentication code.
- The verification of a keyed-hash message authentication code.
- The generation of a Digital Signature on a message.
- The verification of a Digital Signature.
There might be more information for this subject on one of the following: