For example, DES's key schedule involves rotating 28-bit key registers.
2.
The SRP ID and SRP Authentication Key register and authenticate the BlackBerry Enterprise Server on the network.
3.
A translation selected by the virtual address has its key compared to each of the protection key registers.
4.
A running process has several protection key registers ( 16 for Itanium, 4 for HP / PA ).
5.
The software fault handler can, if desired, check the missing key against a larger list of keys maintained by software; thus, the protection key registers inside the processor may be treated as a software-managed cache of a larger list of keys associated with a process.