23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Private <strong>Key</strong> – A cryptographic key, used with a public key cryptographic algorithm,<br />

that is uniquely associated with an entity and is not made public. In<br />

an asymmetric (public) cryptosystem, the private key is associated<br />

with a public key. Depending on the algorithm, the private key may<br />

be used to—<br />

1) Compute the corresponding public key,<br />

2) Compute a digital signature that may be verified by the<br />

corresponding public key,<br />

3) Decrypt data that was encrypted by the corresponding public key,<br />

or<br />

4) Compute a piece <strong>of</strong> common shared data, together with other<br />

information.<br />

SOURCE: SP 800-57<br />

Private <strong>Key</strong> – A cryptographic key used with a public key cryptographic algorithm,<br />

which is uniquely associated with an entity, and not made public; it is<br />

used to generate a digital signature; this key is mathematically linked<br />

with a corresponding public key.<br />

SOURCE: FIPS 196<br />

Private <strong>Key</strong> – A cryptographic key, used with a public key cryptographic algorithm,<br />

that is uniquely associated with an entity and is not made public.<br />

SOURCE: FIPS 140-2<br />

In an asymmetric cryptography scheme, the private or secret key <strong>of</strong> a<br />

key pair which must be kept confidential and is used to decrypt<br />

messages encrypted with the public key or to digitally sign messages,<br />

which can then be validated with the public key.<br />

SOURCE: CNSSI-4009<br />

Privilege – A right granted to an individual, a program, or a process.<br />

SOURCE: CNSSI-4009<br />

Privilege Management – The definition and management <strong>of</strong> policies and processes that define<br />

the ways in which the user is provided access rights to enterprise<br />

systems. It governs the management <strong>of</strong> the data that constitutes the<br />

user’s privileges and other attributes, including the storage,<br />

organization and access to information in directories.<br />

SOURCE: <strong>NISTIR</strong> 7657<br />

Privileged Account – An information system account with approved authorizations <strong>of</strong> a<br />

privileged user.<br />

SOURCE: CNSSI-4009<br />

Pg 143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!