Version 1: Release Note 28 November 2014


Common Encryption and Decryption approach - informative



Download 4.8 Mb.
Page33/258
Date03.04.2021
Size4.8 Mb.
1   ...   29   30   31   32   33   34   35   36   ...   258

Common Encryption and Decryption approach - informative


The content and processing of fields in relation to Confidentiality shall be common across all parts of Messages requiring such protections. Where specified in a Use Case, a Remote Party Message may contain one or more encrypted parts. For such requirements, the corresponding Authenticated Encryption and Authenticated Decryption shall always be undertaken using the approach laid out in Section 8.

Note that the GBCS does not require Encryption of the whole of a Message.



    1. Directory: government -> uploads -> system -> uploads -> attachment data -> file
      file -> Remove this if sending to pagerunnerr Page Title Light Rail Security Recommended Best Practice
      file -> 8 Section 1 : Sport
      file -> Notice of exercise of additional powers of seizure under Sections 50 or 51 of the Criminal Justice and Police Act 2001
      file -> Home office circular 004/2014 Powers to search for and seize invalid travel documents in Schedule 8 to the Anti-social Behaviour, Crime and Policing Act 2014
      file -> Consultation on the Royal Parks and Other Open Spaces (Amendment) (No. 2) Regulations 2012
      file -> Crown copyright 2012
      file -> This is the Report to Government by the Film Policy Review Panel The brief
      file -> Impact Assessment (IA)
      file -> Dcms/Wolfson Museums and Galleries Improvement Fund a public-Private Partnership (2002-2010)


      Share with your friends:
1   ...   29   30   31   32   33   34   35   36   ...   258




The database is protected by copyright ©essaydocs.org 2020
send message

    Main page