THALES DATACRYPTOR User Manual

Page 134

Advertising
background image

Appendix J: Glossary of Terms

Datacryptor Ethernet User Manual

Page 134

THALES

Public Key
Cryptography

In public key cryptography different keys are used for encryption
and decryption. The public key is public, but the private key is
known only to its owner. Anyone that possesses the public key can
encrypt a message so that only a single recipient (the owner of the
private key) can decrypt it. The two parties do not need to share
any secret information.

Public Key Data

Consists of a public key algorithm, a public key and a private key.

Public Key encryption

The process of encrypting data using public key data.

Public Key Set

A pair of keys: a public key and a private key.

Replay Prevention

Prevents the replaying of a message or part of a message to
produce an unauthorized effect, such as the capture and replay a
sequence of authentication messages to masquerade as a
legitimate user.

Secret Key

The key used in symmetric encryption. Both participants must
share the same key, and this key must remain secret to protect the
communication.

Secure Hash Algorithm
(SHA)

A US standard for a cryptographically strong hash algorithm,
designed by the National Security Agency and defined by the
National Institute of Standards and Technology (NIST).

SFP

The Small Form-Factor Pluggable device is a compact transceiver
used in data communication applications where fiber optic or
twisted pair networking cable is to be employed.

SNMP

Simple Network Management Protocol is an Internet standard used
to allow monitoring of performance and provide event
notifications.

Transform

A transform defines the transformation applied to the data to
secure it. This includes the encryption algorithm, security
protocols, the key sizes and how they are derived, and the
transformation process

X.509

The ITU-T X.509 recommendation defines the formats for X.509
certificates.



Advertising