💼 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).
- Contextual name: 💼 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).
- ID:
/frameworks/apra-cpg-234/e/3
- Located in: 💼 Attachment E - Cryptographic techniques
Description​
Empty...
Similar​
- Internal
- ID:
dec-c-1dea3dd2
- ID:
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|