Questions? Call Now
The cryptographic process performed within a TRSM whereby encrypted data is decrypted from using one PIN encrypting key and re-encrypted the PIN using a second PIN encrypting key.
Back to Definitions, T.