๐ผ 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).
- Contextual name: ๐ผ 3 APRA envisages that a regulated entity would select encryption algorithms from the population of well-established and proven international standards that have been subjected to rigorous public scrutiny and verification of effectiveness. The length of a cryptographic key would typically be selected to render a brute force attack9 impractical (i.e. would require an extremely long period of time to breach using current computing capabilities).
- ID:
/frameworks/apra-cpg-234/e/3
- Located in: ๐ผ Attachment E - Cryptographic techniques
Descriptionโ
Empty...
Similarโ
- Internal
- ID:
dec-c-1dea3dd2
- ID:
Sub Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|