Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
March, 2007<br />
Backup A copy of information to facilitate recovery during the cryptoperiod of<br />
the key, if necessary.<br />
Certificate See public key certificate.<br />
Certification authority The entity in a Public Key Infrastructure (PKI) that is responsible for<br />
issuing certificates, and exacting compliance to a PKI policy.<br />
Ciphertext Data in its encrypted form.<br />
Collision Two or more distinct inputs produce the same output. Also see hash<br />
function.<br />
Compromise The unauthorized disclosure, modification, substitution or use of<br />
sensitive data (e.g., keying material and other security related<br />
information).<br />
Confidentiality The property that sensitive information is not disclosed to unauthorized<br />
entities.<br />
Contingency plan A plan that is maintained for disaster response, backup operations, and<br />
post-disaster recovery to ensure the availability of critical resources<br />
and to facilitate the continuity of operations in an emergency situation.<br />
Contingency planning The development of a contingency plan.<br />
Cryptanalysis 1. Operations performed in defeating cryptographic protection without<br />
an initial knowledge of the key employed in providing the<br />
protection.<br />
Cryptographic<br />
Algorithm<br />
Cryptographic<br />
Boundary<br />
Cryptographic Hash<br />
Function<br />
2. The study of mathematical techniques for attempting to defeat<br />
cryptographic techniques and information system security. This<br />
includes the process of looking for errors or weaknesses in the<br />
implementation of an algorithm or of the algorithm itself.<br />
A well-defined computational procedure that takes variable inputs<br />
including a cryptographic key and produces an output.<br />
An explicitly defined continuous perimeter that establishes the physical<br />
bounds of a cryptographic module and contains all hardware, software,<br />
and/or firmware components of a cryptographic module.<br />
See Hash function.<br />
20