
BEKO 300TR Security Policy V1.5
All information contained in this document is property of Arçelik A.Ş..
This document can't be used, copied, disclosed or divulged in whole or in part for any purpose by any person without the
written approval of Arçelik A.Ş..
8.1 KEY MANAGEMENT TECHNIQUES ................................................................................................................... 14
8.2 CRYPTOGRAPHIC ALGORITHMS ...................................................................................................................... 14
8.3 KEY TYPE AND USAGE ..................................................................................................................................... 14
8.4 KEY LOADING METHOD .................................................................................................................................. 15
8.5 KEY REPLACEMENT ......................................................................................................................................... 15
9 PIN CONFIDENTIALITY ..................................................................................................................................... 16
10 DECOMMISSIONING ........................................................................................................................................ 17
Comentários a estes Manuais