23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Online Attack – An attack against an authentication protocol where the attacker either<br />

assumes the role <strong>of</strong> a claimant with a genuine verifier or actively<br />

alters the authentication channel. The goal <strong>of</strong> the attack may be to<br />

gain authenticated access or learn authentication secrets.<br />

Online Certificate Status<br />

Protocol (OCSP) –<br />

SOURCE: SP 800-63<br />

An online protocol used to determine the status <strong>of</strong> a public key<br />

certificate.<br />

SOURCE: SP 800-63; FIPS 201<br />

Online Cryptosystem – Cryptographic system in which encryption and decryption are<br />

performed in association with the transmitting and receiving<br />

functions.<br />

SOURCE: CNSSI-4009<br />

One-part Code – Code in which plain text elements and their accompanying code<br />

groups are arranged in alphabetical, numerical, or other systematic<br />

order, so one listing serves for both encoding and decoding. One-part<br />

codes are normally small codes used to pass small volumes <strong>of</strong> lowsensitivity<br />

information.<br />

SOURCE: CNSSI-4009<br />

One-time Cryptosystem – Cryptosystem employing key used only once.<br />

SOURCE: CNSSI-4009<br />

One-time Pad – Manual one-time cryptosystem produced in pad form.<br />

SOURCE: CNSSI-4009<br />

One-time Tape – Punched paper tape used to provide key streams on a one-time basis<br />

in certain machine cryptosystems.<br />

SOURCE: CNSSI-4009<br />

One-Way Hash Algorithm – Hash algorithms which map arbitrarily long inputs into a fixed-size<br />

output such that it is very difficult (computationally infeasible) to<br />

find two different hash inputs that produce the same output. Such<br />

algorithms are an essential part <strong>of</strong> the process <strong>of</strong> producing fixed-size<br />

digital signatures that can both authenticate the signer and provide for<br />

data integrity checking (detection <strong>of</strong> input modification after<br />

signature).<br />

SOURCE: SP 800-49; CNSSI-4009<br />

Pg 130

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!