Results for query secret key
key that is used with a symmetric cryptographic algorithm
NOTE 1 Possession of a secret key is restricted (usually to two entities).
NOTE 2 For ERI, there can be only one entity or several entities, depending on the key management policy.