23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Cryptographic Synchronization – Process by which a receiving decrypting cryptographic logic attains<br />

the same internal state as the transmitting encrypting logic.<br />

SOURCE: CNSSI-4009<br />

Cryptographic System – Associated information assurance items interacting to provide a<br />

single means <strong>of</strong> encryption or decryption.<br />

SOURCE: CNSSI-4009<br />

Cryptographic System Analysis – Process <strong>of</strong> establishing the exploitability <strong>of</strong> a cryptographic system,<br />

normally by reviewing transmitted traffic protected or secured by the<br />

system under study.<br />

SOURCE: CNSSI-4009<br />

Cryptographic System Evaluation – Process <strong>of</strong> determining vulnerabilities <strong>of</strong> a cryptographic system and<br />

recommending countermeasures.<br />

SOURCE: CNSSI-4009<br />

Cryptographic System Review – Examination <strong>of</strong> a cryptographic system by the controlling authority<br />

ensuring its adequacy <strong>of</strong> design and content, continued need, and<br />

proper distribution.<br />

SOURCE: CNSSI-4009<br />

Cryptographic System Survey – Management technique in which actual holders <strong>of</strong> a cryptographic<br />

system express opinions on the system's suitability and provide usage<br />

information for technical evaluations.<br />

SOURCE: CNSSI-4009<br />

Cryptographic Token – A token where the secret is a cryptographic key.<br />

SOURCE: SP 800-63<br />

A portable, user-controlled physical device (e.g., smart card or<br />

PCMCIA card) used to store cryptographic information and possibly<br />

also perform cryptographic functions.<br />

SOURCE: CNSSI-4009<br />

Cryptography – The discipline that embodies the principles, means, and methods for<br />

the transformation <strong>of</strong> data in order to hide their semantic content,<br />

prevent their unauthorized use, or prevent their undetected<br />

modification.<br />

SOURCE: SP 800-59<br />

Cryptography – The discipline that embodies principles, means, and methods for<br />

providing information security, including confidentiality, data<br />

integrity, non-repudiation, and authenticity.<br />

SOURCE: SP 800-21<br />

Pg 55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!