Irig – Symmetricom S100 User Manual

Page 135

Advertising
background image

S100 User Guide – Rev. D – June 2005

127

2

5

3

IKE

Internet Key Exchange, a security system that uses a private key and an exchange key that
encrypts private keys. Passwords are delivered over the Internet.

In-band Authentication

When you use PKI—which involves public keys and a private key— for authentication, it is
called in-band authentication.

See also:

Out-of-band Authentication

Integrity

Data that has retained its integrity has not been modified or tampered with.

IPSec

Internet Protocol Security describes the IETF protocols that protect the secure exchange of
packets on the IP layer.

IRIG

InteRange Instrumentation Group is an analog standard for serial time formats.

Irrefutable

See

Non-repudiation

ITU

International Telecommunications Union, the international organization that sets standards
for data communication.

Key

An alphanumeric string that encrypts and decrypts data.

Key Escrow

A secure storage maintained by a trusted third party, which holds keys.

Key Generation

Creation of a key.

Key Management

The process by which keys are created, authenticated, issued, distributed, stored, recovered,
and revoked.

Key Pair

Two integrated keys: one public, one private.

Key Recovery

The process of recovering a private decryption key from a secure archive for the purposes of
recovering data that has been encrypted with the corresponding encryption key.

Advertising