23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Cryptographic Initialization – Function used to set the state <strong>of</strong> a cryptographic logic prior to key<br />

generation, encryption, or other operating mode.<br />

SOURCE: CNSSI-4009<br />

Cryptographic <strong>Key</strong> – A value used to control cryptographic operations, such as decryption,<br />

encryption, signature generation, or signature verification.<br />

SOURCE: SP 800-63<br />

A binary string used as a secret parameter by a cryptographic<br />

algorithm.<br />

SOURCE: SP 800-108<br />

Cryptographic <strong>Key</strong> – A parameter used in conjunction with a cryptographic algorithm that<br />

determines the specific operation <strong>of</strong> that algorithm.<br />

SOURCE: FIPS 201; FIPS 198<br />

Cryptographic <strong>Key</strong> – A parameter used in conjunction with a cryptographic algorithm that<br />

determines<br />

the transformation <strong>of</strong> plaintext data into ciphertext data,<br />

the transformation <strong>of</strong> ciphertext data into plaintext data,<br />

a digital signature computed from data,<br />

the verification <strong>of</strong> a digital signature computed from data,<br />

an authentication code computed from data, or<br />

an exchange agreement <strong>of</strong> a shared secret.<br />

SOURCE: FIPS 140-2<br />

Cryptographic Logic – The embodiment <strong>of</strong> one (or more) cryptographic algorithm(s) along<br />

with alarms, checks, and other processes essential to effective and<br />

secure performance <strong>of</strong> the cryptographic process(es).<br />

SOURCE: CNSSI-4009<br />

Cryptographic Material –<br />

(slang CRYPTO)<br />

COMSEC material used to secure or authenticate information.<br />

SOURCE: CNSSI-4009<br />

Cryptographic Module – The set <strong>of</strong> hardware, s<strong>of</strong>tware, firmware, or some combination<br />

there<strong>of</strong> that implements cryptographic logic or processes, including<br />

cryptographic algorithms, and is contained within the cryptographic<br />

boundary <strong>of</strong> the module.<br />

SOURCE: SP 800-32; FIPS 196<br />

Cryptographic Module – The set <strong>of</strong> hardware, s<strong>of</strong>tware, and/or firmware that implements<br />

Approved security functions (including cryptographic algorithms and<br />

key generation) and is contained within the cryptographic boundary.<br />

SOURCE: FIPS 140-2<br />

Pg 53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!