23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Short Title – Identifying combination <strong>of</strong> letters and numbers assigned to certain<br />

COMSEC materials to facilitate handling, accounting, and<br />

controlling.<br />

SOURCE: CNSSI-4009<br />

Signature – A recognizable, distinguishing pattern associated with an attack, such<br />

as a binary string in a virus or a particular set <strong>of</strong> keystrokes used to<br />

gain unauthorized access to a system.<br />

SOURCE: SP 800-61<br />

A recognizable, distinguishing pattern. See also attack signature or<br />

digital signature.<br />

SOURCE: CNSSI-4009<br />

Signature Certificate – A public key certificate that contains a public key intended for<br />

verifying digital signatures rather than encrypting data or performing<br />

any other cryptographic functions.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Signature Generation – Uses a digital signature algorithm and a private key to generate a<br />

digital signature on data.<br />

SOURCE: SP 800-57<br />

The process <strong>of</strong> using a digital signature algorithm and a private key<br />

to generate a digital signature on data.<br />

SOURCE: FIPS 186<br />

Signature Validation – The (mathematical) verification <strong>of</strong> the digital signature and obtaining<br />

the appropriate assurances (e.g., public key validity, private key<br />

possession, etc.).<br />

SOURCE: FIPS 186<br />

Signature Verification – Uses a digital signature algorithm and a public key to verify a digital<br />

signature.<br />

SOURCE: SP 800-57<br />

The process <strong>of</strong> using a digital signature algorithm and a public key to<br />

verify a digital signature on data.<br />

SOURCE: SP 800-89; FIPS 186<br />

Signed Data – Data on which a digital signature is generated.<br />

SOURCE: FIPS 196<br />

Pg 178

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!