23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Key</strong> Updating – Irreversible cryptographic process for modifying key.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong> Wrap – A method <strong>of</strong> encrypting keying material (along with associated<br />

integrity information) that provides both confidentiality and integrity<br />

protection using a symmetric key algorithm.<br />

SOURCE: SP 800-56A<br />

<strong>Key</strong>-Auto-<strong>Key</strong> (KAK) – Cryptographic logic using previous key to produce key.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong>-Encryption-<strong>Key</strong> (KEK) – <strong>Key</strong> that encrypts or decrypts other key for transmission or storage.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong>ed-hash based message<br />

authentication code (HMAC) –<br />

A message authentication code that uses a cryptographic key in<br />

conjunction with a hash function.<br />

SOURCE: FIPS 198; CNSSI-4009<br />

<strong>Key</strong>ing Material – <strong>Key</strong>, code, or authentication information in physical, electronic, or<br />

magnetic form.<br />

SOURCE: CNSSI-4009<br />

<strong>Key</strong>stroke Monitoring – The process used to view or record both the keystrokes entered by a<br />

computer user and the computer’s response during an interactive<br />

session. <strong>Key</strong>stroke monitoring is usually considered a special case <strong>of</strong><br />

audit trails.<br />

SOURCE: SP 800-12; CNSSI-4009<br />

KMI Operating Account (KOA) – A KMI business relationship that is established 1) to manage the set<br />

<strong>of</strong> user devices that are under the control <strong>of</strong> a specific KMI customer<br />

organization, and 2) to control the distribution <strong>of</strong> KMI products to<br />

those devices.<br />

SOURCE: CNSSI-4009<br />

KMI Protected Channel (KPC) – A KMI Communication Channel that provides 1) <strong>Information</strong><br />

Integrity Service; 2) either Data Origin Authentication Service or<br />

Peer Entity Authentication Service, as is appropriate to the mode <strong>of</strong><br />

communications; and 3) optionally, <strong>Information</strong> Confidentiality<br />

Service.<br />

SOURCE: CNSSI-4009<br />

Pg 109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!