A set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
A set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
Usage: IDOCs SHOULD use definition 1 because it covers a wider range of algorithms than definition 2.
"A collection of transformations from plain text into cipher text and vice versa [which would exclude digital signature, cryptographic hash, and key-agreement algorithms], the particular transformation(s) to be used being selected by keys. The transformations are normally defined by a mathematical algorithm." [X509]