Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

Cryptography

The art and science of creating messages that have some combination of being private,signed, unmodified with non-repudiation.

Cryptosystem

A system comprised of cryptographic algorithms, all possible plain text, ciphertext, and keys.

Data integrity

A method of ensuring information has not been altered by unauthorized orunknown means.

Decryption

The process of turning cipher text back into plain text.

DES (Data Encryption Standard)

A 64-bit block cipher, symmetric algorithm also known as Data Encryption Algorithm

(DEA) by ANSI and DEA-1 by ISO. Widely used for over 20 years,adopted in 1976 as FIPS 46.

Dictionary attack

A calculated brute force attack to reveal a password by trying obvious and logicalcombinations of words.

Diffie-Hellman

The first public key algorithm, invented in 1976, using discrete logarithms in afinite field.

Digital cash

Electronic money that is stored and transferred through a variety of complex protocols.

Direct trust

An establishment of peer-to-peer confidence.

Discrete logarithm

The underlying mathematical problem used in/by asymmetric algorithms, likeDiffie-Hellman and Elliptic Curve. It is the inverse problem of modular exponentiation,which is a one-way function.

DMS (Defense Messaging System)

Standards designed by the U.S. Department of Defense to provide a secure andreliable enterprise-wide messaging infrastructure for government and militaryagencies.

DNSSEC (Domain Name System Security Working Group)

A proposed IETF draft that will specify enhancements to the DNS protocol toprotect the DNS against unauthorized modification of data and against masqueradingof data origin. It will add data integrity and authentication capabilities tothe DNS via digital signatures.

DSA (Digital Signature Algorithm)

The signing-only public key algorithm used in the Digital Signature Standard.DSA is a variant of the Elgamal (q.v.) algorithm.

Digital signature

An electronic identification of a person or thing created by using a public keyalgorithm. Intended to verify to a recipient the integrity of data and identity of thesender of the data.

DSS (Digital Signature Standard)

A U.S. Federal Information Processing Standard (FIPS) for digital signatures,using DSA and SHA-1.

ECC (Elliptic Curve Cryptosystem)

Variants of the Diffie-Hellman family of public key algorithms, these operate onother sets than the integers and give smaller keys faster execution.


Дата добавления: 2015-07-07; просмотров: 124 | Нарушение авторских прав


Читайте в этой же книге: Основные положения защиты информации в сетях | Подключение Small Office | Общие и функциональные требования | Практические методики обеспечения безопасности при внедрении и использовании устройств аппаратной защиты (HSM). | Управление ключами | Инспекционные процедуры | Методические указания | A0 8440 406a df60 278f 47cf 42d6 15d7 | Приложение 5 | AES (Advanced Encryption Standard) |
<== предыдущая страница | следующая страница ==>
Capstone| Key recovery

mybiblioteka.su - 2015-2024 год. (0.005 сек.)