cryptographic key

collocation in English

meaningsofkey

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withkey.
key
noun[C]
uk
/kiː/
us
/kiː/
a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ...
See more atkey

(Definition ofkeyfrom theCambridge English Dictionary© Cambridge University Press)

Examplesofcryptographic key

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Each message has to be encrypted using somecryptographickeythat is known only to the intended receivers.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Address assignment andcryptographickeyinitialization is sometimes performed by closing a contact on the device while having a master controller broadcast an assignment message.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if thecryptographickeyis unknown.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
One-time pad encryption has the absolute requirement that thecryptographickeyis used only once.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The token may, for example, be acryptographickey, that is protected by encrypting it under a password.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Some vendors offer a mobile device authentication solution that uses acryptographickeyfor user authentication.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Thecryptographickeyor the nationality of the entities involved in the transaction do not matter.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Another situation where quick guessing is possible is when the password is used to form acryptographickey.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses thecryptographickey, through the process of decryption.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
To win, a contestant would have had to break the code by finding the original plaintext and thecryptographickeythat will generate the posted ciphertext from the plaintext.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Consider two observers of a sequence of bits, when only one of whom has thecryptographickeyneeded to turn the sequence of bits into a readable message.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
For example, if we periodically contact a server to determine its health, a monitor will never see a failure unless the monitor tries to verify the server'scryptographickey.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Names can model a wide variety of identifiers: communication channels, machine addresses, pointers, object references, cryptographic keys, and so on.
From theCambridge English Corpus
With acryptographickeyused for interchange, the decrypted key will be immediately reencrypted and will be routed to the issuer's system over normal communications channels.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Well, some police officers came in and asked me to get the cryptographic keys, so that we could decrypt something.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
Regardless of the technique used, such methods are intended to capture highly sensitive information e.g. cryptographic keys, key-rings, passwords or unencrypted plaintext.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The cryptographic keys are typically, but not necessarily, self-generated.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The attack can non-invasively extract cryptographic keys and other secret information from the device.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Users can easily create cryptographic keys, and write, encrypt, decrypt, sign, or verify messages.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The latter depends on the secrecy of cryptographic keys.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofkey
See other collocations withkey