Skip to main content

๐Ÿ’ผ 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).

  • Contextual name: ๐Ÿ’ผ 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).
  • ID: /frameworks/apra-cpg-234/e/3
  • Located in: ๐Ÿ’ผ Attachment E - Cryptographic techniques

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-1dea3dd2

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags