The art and science of creating messages that have some combination of being private,signed, unmodified with non-repudiation.
A system comprised of cryptographic algorithms, all possible plain text, ciphertext, and keys.
A method of ensuring information has not been altered by unauthorized orunknown means.
The process of turning cipher text back into plain text.
DES (Data Encryption Standard)
A 64-bit block cipher, symmetric algorithm also known as Data Encryption Algorithm
(DEA) by ANSI and DEA-1 by ISO. Widely used for over 20 years,adopted in 1976 as FIPS 46.
A calculated brute force attack to reveal a password by trying obvious and logicalcombinations of words.
The first public key algorithm, invented in 1976, using discrete logarithms in afinite field.
Electronic money that is stored and transferred through a variety of complex protocols.
An establishment of peer-to-peer confidence.
The underlying mathematical problem used in/by asymmetric algorithms, likeDiffie-Hellman and Elliptic Curve. It is the inverse problem of modular exponentiation,which is a one-way function.
DMS (Defense Messaging System)
Standards designed by the U.S. Department of Defense to provide a secure andreliable enterprise-wide messaging infrastructure for government and militaryagencies.
DNSSEC (Domain Name System Security Working Group)
A proposed IETF draft that will specify enhancements to the DNS protocol toprotect the DNS against unauthorized modification of data and against masqueradingof data origin. It will add data integrity and authentication capabilities tothe DNS via digital signatures.
DSA (Digital Signature Algorithm)
The signing-only public key algorithm used in the Digital Signature Standard.DSA is a variant of the Elgamal (q.v.) algorithm.
An electronic identification of a person or thing created by using a public keyalgorithm. Intended to verify to a recipient the integrity of data and identity of thesender of the data.
DSS (Digital Signature Standard)
A U.S. Federal Information Processing Standard (FIPS) for digital signatures,using DSA and SHA-1.
ECC (Elliptic Curve Cryptosystem)
Variants of the Diffie-Hellman family of public key algorithms, these operate onother sets than the integers and give smaller keys faster execution.
Дата добавления: 2015-07-07; просмотров: 124 | Нарушение авторских прав
|<== предыдущая страница|||||следующая страница ==>|