23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

An attack that attempts to interfere with the reception <strong>of</strong> broadcast<br />

communications.<br />

SOURCE: CNSSI-4009<br />

Joint Authorization – <strong>Security</strong> authorization involving multiple authorizing <strong>of</strong>ficials.<br />

SOURCE: SP 800-37<br />

Kerberos – A widely used authentication protocol developed at the<br />

Massachusetts Institute <strong>of</strong> Technology (MIT). In “classic” Kerberos,<br />

users share a secret password with a <strong>Key</strong> Distribution Center (KDC).<br />

The user, Alice, who wishes to communicate with another user, Bob,<br />

authenticates to the KDC and is furnished a “ticket” by the KDC to<br />

use to authenticate with Bob. When Kerberos authentication is based<br />

on passwords, the protocol is known to be vulnerable to <strong>of</strong>f-line<br />

dictionary attacks by eavesdroppers who capture the initial user-to-<br />

KDC exchange.<br />

SOURCE: SP 800-63<br />

A means <strong>of</strong> verifying the identities <strong>of</strong> principals on an open network.<br />

It accomplishes this without relying on the authentication,<br />

trustworthiness, or physical security <strong>of</strong> hosts while assuming all<br />

packets can be read, modified and inserted at will. It uses a trust<br />

broker model and symmetric cryptography to provide authentication<br />

and authorization <strong>of</strong> users and systems on the network.<br />

SOURCE: SP 800-95<br />

<strong>Key</strong> – A value used to control cryptographic operations, such as decryption,<br />

encryption, signature generation, or signature verification.<br />

SOURCE: SP 800-63<br />

A numerical value used to control cryptographic operations, such as<br />

decryption, encryption, signature generation, or signature<br />

verification.<br />

SOURCE: CNSSI-4009<br />

A parameter used in conjunction with a cryptographic algorithm that<br />

determines its operation.<br />

Examples applicable to this Standard include:<br />

1. The computation <strong>of</strong> a digital signature from data, and<br />

2. The verification <strong>of</strong> a digital signature.<br />

SOURCE: FIPS 186<br />

<strong>Key</strong> Bundle – The three cryptographic keys (<strong>Key</strong>1, <strong>Key</strong>2, <strong>Key</strong>3) that are used with<br />

a Triple Data Encryption Algorithm mode.<br />

SOURCE: SP 800-67<br />

Pg 105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!