Skip to main content

💼 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).

  • Contextual name: 💼 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).
  • ID: /frameworks/apra-cpg-234/e/3
  • Located in: 💼 Attachment E - Cryptographic techniques

Description​

Empty...

Similar​

  • Internal
    • ID: dec-c-1dea3dd2

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags