23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Public <strong>Key</strong> (Asymmetric)<br />

Cryptographic Algorithm –<br />

A cryptographic algorithm that uses two related keys, a public key<br />

and a private key. The two keys have the property that deriving the<br />

private key from the public key is computationally infeasible.<br />

SOURCE: FIPS 140-2<br />

Public <strong>Key</strong> Cryptography – Encryption system that uses a public-private key pair for encryption<br />

and/or digital signature.<br />

SOURCE: CNSSI-4009<br />

Public <strong>Key</strong> Enabling (PKE) – The incorporation <strong>of</strong> the use <strong>of</strong> certificates for security services such<br />

as authentication, confidentiality, data integrity, and non-repudiation.<br />

SOURCE: CNSSI-4009<br />

Public <strong>Key</strong> Infrastructure (PKI) –<br />

A set <strong>of</strong> policies, processes, server platforms, s<strong>of</strong>tware, and<br />

workstations used for the purpose <strong>of</strong> administering certificates and<br />

public-private key pairs, including the ability to issue, maintain, and<br />

revoke public key certificates.<br />

SOURCE: SP 800-32<br />

Public <strong>Key</strong> Infrastructure – An architecture which is used to bind public keys to entities, enable<br />

other entities to verify public key bindings, revoke such bindings, and<br />

provide other services critical to managing public keys.<br />

SOURCE: FIPS 196<br />

A Framework that is established to issue, maintain, and revoke public<br />

key certificates.<br />

SOURCE: FIPS 186<br />

A support service to the PIV system that provides the cryptographic<br />

keys needed to perform digital signature-based identity verification<br />

and to protect communications and storage <strong>of</strong> sensitive verification<br />

system data within identity cards and the verification system.<br />

SOURCE: FIPS 201<br />

The framework and services that provide for the generation,<br />

production, distribution, control, accounting, and destruction <strong>of</strong><br />

public key certificates. Components include the personnel, policies,<br />

processes, server platforms, s<strong>of</strong>tware, and workstations used for the<br />

purpose <strong>of</strong> administering certificates and public-private key pairs,<br />

including the ability to issue, maintain, recover, and revoke public<br />

key certificates.<br />

SOURCE: CNSSI-4009<br />

Pg 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!