Lines Matching refs:algorithms
25 3-1 Use verified, secure, and open encryption algorithms.
31 Recommended cipher algorithms are as follows:
40 The following are examples of insecure cipher algorithms:
44 3-2 Do not use algorithms for error control coding, such as parity check and CRC, to perform integr…
46 3-3 Cipher algorithms must use cryptographically secure random numbers for security purposes.
59 3-4 By default, use secure cipher algorithms and disable/prohibit insecure cipher algorithms. Use c…
61 …ipher algorithms may become insecure. Using such algorithms may bring risks to user data. In addit…
65 3-5 The GCM mode is preferred when block cipher algorithms are used.
77 …on and digital signature are required. Check the order in which cipher algorithms are called, and …
117 …encryption, weak authentication, weak key exchange, weak symmetric key algorithms, or weak message…
151 4-2 Use irreversible algorithms such as PBKDF2 for encryption in scenarios where authentication cre…