23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Key</strong> Management Infrastructure –<br />

(KMI)<br />

All parts – computer hardware, firmware, s<strong>of</strong>tware, and other<br />

equipment and its documentation; facilities that house the equipment<br />

and related functions; and companion standards, policies, procedures,<br />

and doctrine that form the system that manages and supports the<br />

ordering and delivery <strong>of</strong> cryptographic material and related<br />

information products and services to users.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Pair – Two mathematically related keys having the properties that (1) one<br />

key can be used to encrypt a message that can only be decrypted<br />

using the other key, and 2) even knowing one key, it is<br />

computationally infeasible to discover the other key.<br />

SOURCE: SP 800-32<br />

<strong>Key</strong> Pair – A public key and its corresponding private key; a key pair is used<br />

with a public key algorithm.<br />

SOURCE: SP 800-21; CNSSI-4009<br />

<strong>Key</strong> Production <strong>Key</strong> (KPK) – <strong>Key</strong> used to initialize a keystream generator for the production <strong>of</strong><br />

other electronically generated key.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Recovery – Mechanisms and processes that allow authorized parties to retrieve<br />

the cryptographic key used for data confidentiality.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Stream – Sequence <strong>of</strong> symbols (or their electrical or mechanical equivalents)<br />

produced in a machine or auto-manual cryptosystem to combine with<br />

plain text to produce cipher text, control transmission security<br />

processes, or produce key.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Tag – Identification information associated with certain types <strong>of</strong> electronic<br />

key.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Tape – Punched or magnetic tape containing key. Printed key in tape form<br />

is referred to as a key list.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Transport – The secure transport <strong>of</strong> cryptographic keys from one cryptographic<br />

module to another module.<br />

SOURCE: FIPS 140-2; CNSSI-4009<br />

Pg 108

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!