23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Authentication Code – A cryptographic checksum based on an Approved security function<br />

(also known as a Message Authentication Code [MAC]).<br />

SOURCE: FIPS 140-2<br />

Authentication, Electronic – The process <strong>of</strong> establishing confidence in user identities<br />

electronically presented to an information system.<br />

SOURCE: SP 800-63<br />

Authentication Mechanism – Hardware-or s<strong>of</strong>tware-based mechanisms that force users to prove<br />

their identity before accessing data on a device.<br />

SOURCE: SP 800-72; SP 800-124<br />

Hardware or s<strong>of</strong>tware-based mechanisms that forces users, devices,<br />

or processes to prove their identity before accessing data on an<br />

information system.<br />

SOURCE: CNSSI-4009<br />

Authentication Mode – A block cipher mode <strong>of</strong> operation that can provide assurance <strong>of</strong> the<br />

authenticity and, therefore, the integrity <strong>of</strong> data.<br />

SOURCE: SP 800-38B<br />

Authentication Period – The maximum acceptable period between any initial authentication<br />

process and subsequent reauthentication processes during a single<br />

terminal session or during the period data is being accessed.<br />

SOURCE: CNSSI-4009<br />

Authentication Protocol – A well-specified message exchange process that verifies possession<br />

<strong>of</strong> a token to remotely authenticate a claimant. Some authentication<br />

protocols also generate cryptographic keys that are used to protect an<br />

entire session, so that the data transferred in the session is<br />

cryptographically protected.<br />

SOURCE: SP 800-63<br />

A well-specified message exchange process between a claimant and a<br />

verifier that enables the verifier to confirm the claimant’s identity.<br />

SOURCE: CNSSI-4009<br />

Authentication Tag – A pair <strong>of</strong> bit strings associated to data to provide assurance <strong>of</strong> its<br />

authenticity.<br />

SOURCE: SP 800-38B<br />

Authentication Token – Authentication information conveyed during an authentication<br />

exchange.<br />

SOURCE: FIPS 196<br />

Pg 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!