THALES DATACRYPTOR User Manual

Page 133

Advertising
background image

Datacryptor Ethernet User Manual

Appendix J: Glossary of Terms

1270A450-005 - June 2008

Page 133

Element Manager (EM)

Application used to manage Datacryptor Ethernet devices and is
used to launch the Front Panel Viewer (FPV) application.

Encrypted data

Transformed plaintext data to ciphertext.

Encryption

Data encryption scrambles and unscrambles data between two
communication endpoints. The encryption process turns an
original plaintext message that anyone can read into an encrypted
ciphertext message that can be read only by an authorized
recipient.

Framing

Method of distinguishing digital channels that have been
multiplexed together

Front Panel Viewer (FPV) Is the application that authenticates the administrator with a

Datacryptor Ethernet and allows it to be commissioned and
managed.

Hash Function

An algorithm that computes a short digest of a longer message.
The digest is usually of a fixed size.

Hash Message
Authentication Code
(HMAC)

A secret-key authentication algorithm. If only the source and
destination know the HMAC key, the algorithm provides data origin
authentication and data integrity for packets sent between the two
parties. If the HMAC is correct, it proves that it must have been
added by the source.

Integrity

Integrity assures that the content of a message has not been
altered.

IP

Internet Protocol, this is the protocol that is used to transport data
across the Internet.

Key

Secret information used to decrypt or encrypt data

MAC

An abbreviation for Message Authentication Code, a digital
signature used to authenticate individual messages.

MAC address

Media Access Control This is the hardware address of an interface
card built in during manufacture.

Message Digest #5
(MD-5)

A message-digest algorithm that computes a secure, irreversible,
cryptographically strong 128-bit hash value for a document.

Netmask

Used in combination with an IP address to define the network
portion of an IP address.

Peer

The Datacryptor device that participates in a connection.

Plaintext

The opposite of encrypted. Plaintext is an intelligible form of data
such as the text on this page.

Private Key

See Public Key

Public Key

A key that is available to anyone. It is usually the other key to a
pair, which consists of a public key and a private key.

Public Key Algorithm

An algorithm that is used in conjunction with a public key set to
encrypt and decrypt data.

Advertising