23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Public <strong>Key</strong> – A cryptographic key that is used with a public key cryptographic<br />

algorithm. The public key is uniquely associated with an entity and<br />

may be made public. In an asymmetric (public) cryptosystem, the<br />

public key is associated with a private key. The public key may be<br />

known by anyone and, depending on the algorithm, may be used to—<br />

1) Verify a digital signature that is signed by the corresponding<br />

private key,<br />

2) Encrypt data that can be decrypted by the corresponding private<br />

key, or<br />

3) Compute a piece <strong>of</strong> shared data.<br />

SOURCE: SP 800-57<br />

Public <strong>Key</strong> – A cryptographic key used with a public key cryptographic algorithm,<br />

uniquely associated with an entity, and which may be made public; it<br />

is used to verify a digital signature; this key is mathematically linked<br />

with a corresponding private key.<br />

SOURCE: FIPS 196<br />

Public <strong>Key</strong> – A cryptographic key used with a public key cryptographic algorithm<br />

that is uniquely associated with an entity and that may be made<br />

public.<br />

SOURCE: FIPS 140-2<br />

A cryptographic key that may be widely published and is used to<br />

enable the operation <strong>of</strong> an asymmetric cryptography scheme. This<br />

key is mathematically linked with a corresponding private key.<br />

Typically, a public key can be used to encrypt, but not decrypt, or to<br />

validate a signature, but not to sign.<br />

SOURCE: CNSSI-4009<br />

Public <strong>Key</strong> Certificate – A digital document issued and digitally signed by the private key <strong>of</strong> a<br />

Certification Authority that binds the name <strong>of</strong> a subscriber to a public<br />

key. The certificate indicates that the subscriber identified in the<br />

certificate has sole control and access to the private key.<br />

SOURCE: SP 800-63<br />

Public <strong>Key</strong> Certificate – A set <strong>of</strong> data that unambiguously identifies an entity, contains the<br />

entity's public key, and is digitally signed by a trusted third party<br />

(certification authority).<br />

SOURCE: FIPS 196<br />

Public <strong>Key</strong> Certificate – A set <strong>of</strong> data that uniquely identifies an entity, contains the entity’s<br />

public key, and is digitally signed by a trusted party, thereby binding<br />

the public key to the entity.<br />

SOURCE: FIPS 140-2<br />

See Also Certificate.<br />

Pg 148

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!