AKSA MySEAL 2.0 Monitored
Specifically designated for cryptographic algorithms intended solely for ensuring interoperability with legacy systems. They are not intended for general use and should be carefully monitored to serve their purpose effectively in bridging the gap between modern cryptographic requirements and legacy system constraints. The listed cryptographic algorithms must be highly monitored for their ability to achieve the security objectives and when in use, must be with high caution.
Cryptographic Primitives | Algorithms |
Symmetric Algorithms |
|
Digital Signature Verification | < 112 bits of security strength:
|
Hash Functions |
|
MAC Algorithms |
|