23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Hash Function – A mathematical function that maps a string <strong>of</strong> arbitrary length (up to<br />

a predetermined maximum size) to a fixed length string.<br />

SOURCE: FIPS 198<br />

A function that maps a bit string <strong>of</strong> arbitrary length to a fixed length<br />

bit string. Approved hash functions are specified in FIPS 180 and are<br />

designed to satisfy the following properties:<br />

1. (One-way) It is computationally infeasible to find any input that<br />

maps to any new prespecified output, and<br />

2. (Collision resistant) It is computationally infeasible to find any two<br />

distinct inputs that map to the same output.<br />

SOURCE: FIPS 186<br />

Hash Total – Value computed on data to detect error or manipulation. See<br />

checksum.<br />

SOURCE: CNSSI-4009<br />

Hash Value – The result <strong>of</strong> applying a cryptographic hash function to data (e.g., a<br />

message).<br />

SOURCE: SP 800-106<br />

Hash Value/Result – See Message Digest.<br />

SOURCE: FIPS 186; CNSSI-4009<br />

Hash-based Message Authentication<br />

Code (HMAC) –<br />

Hash-based Message Authentication<br />

Code –<br />

(HMAC)<br />

A symmetric key authentication method using hash functions.<br />

SOURCE: SP 800-63<br />

A message authentication code that uses a cryptographic key in<br />

conjunction with a hash function.<br />

SOURCE: FIPS 201; CNSSI-4009<br />

Hash-based Message Authentication A message authentication code that utilizes a keyed hash.<br />

Code –<br />

SOURCE: FIPS 140-2<br />

(HMAC)<br />

Hashing – The process <strong>of</strong> using a mathematical algorithm against data to<br />

produce a numeric value that is representative <strong>of</strong> that data.<br />

SOURCE: SP 800-72; CNSSI-4009<br />

Hashword – Memory address containing hash total.<br />

SOURCE: CNSSI-4009<br />

Pg 83

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!