23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

1. See Checksum.<br />

2. A specific ANSI standard for a checksum.<br />

SOURCE: CNSSI-4009<br />

Message Digest – A cryptographic checksum, typically generated for a file that can be<br />

used to detect changes to the file; Secure Hash Algorithm-1 (SHA-1)<br />

is an example <strong>of</strong> a message digest algorithm.<br />

SOURCE: SP 800-61<br />

The result <strong>of</strong> applying a cryptographic hash function to a message.<br />

SOURCE: SP 800-107<br />

A digital signature that uniquely identifies data and has the property<br />

that changing a single bit in the data will cause a completely different<br />

message digest to be generated.<br />

SOURCE: SP 800-92<br />

A cryptographic checksum, typically generated for a file that can be<br />

used to detect changes to the file. Synonymous with hash<br />

value/result.<br />

SOURCE: CNSSI-4009<br />

Message Externals – <strong>Information</strong> outside <strong>of</strong> the message text, such as the header, trailer,<br />

etc.<br />

SOURCE: CNSSI-4009<br />

Message Indicator – Sequence <strong>of</strong> bits transmitted over a communications system for<br />

synchronizing cryptographic equipment.<br />

SOURCE: CNSSI-4009<br />

Metrics – Tools designed to facilitate decisionmaking and improve<br />

performance and accountability through collection, analysis, and<br />

reporting <strong>of</strong> relevant performance-related data.<br />

SOURCE: SP 800-55<br />

MIME – See Multipurpose Internet Mail Extensions.<br />

Mimicking – See Spo<strong>of</strong>ing.<br />

Min-Entropy – A measure <strong>of</strong> the difficulty that an attacker has to guess the most<br />

commonly chosen password used in a system.<br />

SOURCE: SP 800-63<br />

Minimalist Cryptography – Cryptography that can be implemented on devices with very limited<br />

memory and computing capabilities, such as RFID tags.<br />

SOURCE: SP 800-98<br />

Pg 119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!