Appearance
Only AACAs or high assurance cryptographic algorithms are used by cryptographic equipment and software.