cryptographic key
collocation in Englishmeaningsofkey
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withkey.
key
noun[C]
uk/kiː/us/kiː/
a piece of metal that has been cut into a special shape and is used for opening or closing a lock, starting a car ...
See more atkey
(Definition ofkeyfrom theCambridge English Dictionary© Cambridge University Press)
Examplesofcryptographic key
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Each message has to be encrypted using somecryptographickeythat is known only to the intended receivers.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Address assignment andcryptographickeyinitialization is sometimes performed by closing a contact on the device while having a master controller broadcast an assignment message.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if thecryptographickeyis unknown.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
One-time pad encryption has the absolute requirement that thecryptographickeyis used only once.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The token may, for example, be acryptographickey, that is protected by encrypting it under a password.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Some vendors offer a mobile device authentication solution that uses acryptographickeyfor user authentication.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Thecryptographickeyor the nationality of the entities involved in the transaction do not matter.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Another situation where quick guessing is possible is when the password is used to form acryptographickey.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses thecryptographickey, through the process of decryption.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
To win, a contestant would have had to break the code by finding the original plaintext and thecryptographickeythat will generate the posted ciphertext from the plaintext.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Consider two observers of a sequence of bits, when only one of whom has thecryptographickeyneeded to turn the sequence of bits into a readable message.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
For example, if we periodically contact a server to determine its health, a monitor will never see a failure unless the monitor tries to verify the server'scryptographickey.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Names can model a wide variety of identifiers: communication channels, machine addresses, pointers, object references, cryptographic keys, and so on.
From theCambridge English Corpus
With acryptographickeyused for interchange, the decrypted key will be immediately reencrypted and will be routed to the issuer's system over normal communications channels.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Well, some police officers came in and asked me to get the cryptographic keys, so that we could decrypt something.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
Regardless of the technique used, such methods are intended to capture highly sensitive information e.g. cryptographic keys, key-rings, passwords or unencrypted plaintext.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The cryptographic keys are typically, but not necessarily, self-generated.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The attack can non-invasively extract cryptographic keys and other secret information from the device.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Users can easily create cryptographic keys, and write, encrypt, decrypt, sign, or verify messages.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The latter depends on the secrecy of cryptographic keys.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofkey
See other collocations withkey