31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

Backup A copy of information to facilitate recovery during the cryptoperiod of<br />

the key, if necessary.<br />

Certificate See public key certificate.<br />

Certification authority The entity in a Public Key Infrastructure (PKI) that is responsible for<br />

issuing certificates, and exacting compliance to a PKI policy.<br />

Ciphertext Data in its encrypted form.<br />

Collision Two or more distinct inputs produce the same output. Also see hash<br />

function.<br />

Compromise The unauthorized disclosure, modification, substitution or use of<br />

sensitive data (e.g., keying material and other security related<br />

information).<br />

Confidentiality The property that sensitive information is not disclosed to unauthorized<br />

entities.<br />

Contingency plan A plan that is maintained for disaster response, backup operations, and<br />

post-disaster recovery to ensure the availability of critical resources<br />

and to facilitate the continuity of operations in an emergency situation.<br />

Contingency planning The development of a contingency plan.<br />

Cryptanalysis 1. Operations performed in defeating cryptographic protection without<br />

an initial knowledge of the key employed in providing the<br />

protection.<br />

Cryptographic<br />

Algorithm<br />

Cryptographic<br />

Boundary<br />

Cryptographic Hash<br />

Function<br />

2. The study of mathematical techniques for attempting to defeat<br />

cryptographic techniques and information system security. This<br />

includes the process of looking for errors or weaknesses in the<br />

implementation of an algorithm or of the algorithm itself.<br />

A well-defined computational procedure that takes variable inputs<br />

including a cryptographic key and produces an output.<br />

An explicitly defined continuous perimeter that establishes the physical<br />

bounds of a cryptographic module and contains all hardware, software,<br />

and/or firmware components of a cryptographic module.<br />

See Hash function.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!