23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Process <strong>of</strong> exchanging public keys (and other information) in order to<br />

establish secure communications.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Expansion – Routine used to generate a series <strong>of</strong> Round <strong>Key</strong>s from the Cipher<br />

<strong>Key</strong>.<br />

SOURCE: FIPS 197<br />

<strong>Key</strong> Generation Material – Random numbers, pseudo-random numbers, and cryptographic<br />

parameters used in generating cryptographic keys.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

<strong>Key</strong> List – Printed series <strong>of</strong> key settings for a specific cryptonet. <strong>Key</strong> lists may<br />

be produced in list, pad, or printed tape format.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Loader – A self-contained unit that is capable <strong>of</strong> storing at least one plaintext<br />

or encrypted cryptographic key or key component that can be<br />

transferred, upon request, into a cryptographic module.<br />

SOURCE: FIPS 140-2<br />

A self-contained unit that is capable <strong>of</strong> storing at least one plaintext<br />

or encrypted cryptographic key or a component <strong>of</strong> a key that can be<br />

transferred, upon request, into a cryptographic module.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Logger – A program designed to record which keys are pressed on a computer<br />

keyboard used to obtain passwords or encryption keys and thus<br />

bypass other security measures.<br />

SOURCE: SP 800-82<br />

<strong>Key</strong> Management – The activities involving the handling <strong>of</strong> cryptographic keys and other<br />

related security parameters (e.g., IVs and passwords) during the<br />

entire life cycle <strong>of</strong> the keys, including their generation, storage,<br />

establishment, entry and output, and zeroization.<br />

SOURCE: FIPS 140-2; CNSSI-4009<br />

<strong>Key</strong> Management Device – A unit that provides for secure electronic distribution <strong>of</strong> encryption<br />

keys to authorized users.<br />

SOURCE: CNSSI-4009<br />

Pg 107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!