23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Cipher Block Chaining-Message<br />

Authentication Code –<br />

(CBC-MAC)<br />

A secret-key block-cipher algorithm used to encrypt data and to<br />

generate a Message Authentication Code (MAC) to provide<br />

assurance that the payload and the associated data are authentic.<br />

SOURCE: SP 800-38C<br />

Cipher Suite – Negotiated algorithm identifiers. Cipher suites are identified in<br />

human-readable form using a pneumonic code.<br />

SOURCE: SP 800-52<br />

Cipher Text Auto-<strong>Key</strong> (CTAK) – Cryptographic logic that uses previous cipher text to generate a key<br />

stream.<br />

SOURCE: CNSSI-4009<br />

Ciphertext – Data output from the Cipher or input to the Inverse Cipher.<br />

SOURCE: FIPS 197<br />

Data in its enciphered form.<br />

SOURCE: SP 800-56B<br />

Ciphertext/Cipher Text – Data in its encrypted form.<br />

SOURCE: SP 800-21; SP 800-57; CNSSI-4009<br />

Ciphony – Process <strong>of</strong> enciphering audio information, resulting in encrypted<br />

speech.<br />

SOURCE: CNSSI-4009<br />

Claimant – A party whose identity is to be verified using an authentication<br />

protocol.<br />

SOURCE: SP 800-63; FIPS 201<br />

Claimant – An entity which is or represents a principal for the purposes <strong>of</strong><br />

authentication, together with the functions involved in an<br />

authentication exchange on behalf <strong>of</strong> that entity. A claimant acting on<br />

behalf <strong>of</strong> a principal must include the functions necessary for<br />

engaging in an authentication exchange. (e.g., a smartcard [claimant]<br />

can act on behalf <strong>of</strong> a human user [principal])<br />

SOURCE: FIPS 196<br />

An entity (user, device or process) whose assertion is to be verified<br />

using an authentication protocol.<br />

SOURCE: CNSSI-4009<br />

Pg 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!