23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Challenge-Response Protocol – An authentication protocol where the verifier sends the claimant a<br />

challenge (usually a random value or a nonce) that the claimant<br />

combines with a shared secret (<strong>of</strong>ten by hashing the challenge and<br />

secret together) to generate a response that is sent to the verifier. The<br />

verifier knows the shared secret and can independently compute the<br />

response and compare it with the response generated by the claimant.<br />

If the two are the same, the claimant is considered to have<br />

successfully authenticated himself. When the shared secret is a<br />

cryptographic key, such protocols are generally secure against<br />

eavesdroppers. When the shared secret is a password, an<br />

eavesdropper does not directly intercept the password itself, but the<br />

eavesdropper may be able to find the password with an <strong>of</strong>f-line<br />

password guessing attack.<br />

SOURCE: SP 800-63<br />

Check Word – Cipher text generated by cryptographic logic to detect failures in<br />

cryptography.<br />

SOURCE: CNSSI-4009<br />

Checksum – Value computed on data to detect error or manipulation.<br />

SOURCE: CNSSI-4009<br />

Pg 30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!