31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Initialization vector<br />

(IV)<br />

Integrity (Also<br />

Assurance of Integrity)<br />

Key See cryptographic key.<br />

March, 2007<br />

A vector used in defining the starting point of a cryptographic process.<br />

The property that sensitive data has not been modified or deleted in an<br />

unauthorized and undetected manner.<br />

In this recommendation, the statement that a cryptographic algorithm<br />

"provides integrity" means that the algorithm is used to detect<br />

unauthorized modifications or deletions.<br />

Key agreement A key establishment procedure where resultant keying material is a<br />

function of information contributed by two or more participants, so that<br />

no party can predetermine the value of the keying material independent<br />

of the other party’s contribution.<br />

Key attribute See attribute<br />

Key component See cryptographic key component.<br />

Key confirmation A procedure to provide assurance to one party that another party<br />

actually possesses the same keying material and/or shared secret.<br />

Key de-registration A function in the lifecycle of keying material; the marking of all<br />

keying material records and associations to indicate that the key is no<br />

longer in use.<br />

Key derivation A function in the lifecycle of keying material; the process by which<br />

one or more keys are derived from a shared secret and other<br />

information.<br />

Key distribution The transport of a key and other keying material from an entity that<br />

either owns the key or generates the key to another entity that is<br />

intended to use the key.<br />

Key encrypting key A cryptographic key that is used for the encryption or decryption of<br />

other keys.<br />

Key establishment A function in the lifecycle of keying material; the process by which<br />

cryptographic keys are securely established among cryptographic<br />

modules using manual transport methods (e.g., key loaders), automated<br />

methods (e.g., key transport and/or key agreement protocols), or a<br />

combination of automated and manual methods (consists of key<br />

transport plus key agreement).<br />

Key management The activities involving the handling of cryptographic keys and other<br />

related security parameters (e.g., IVs and passwords) during the entire<br />

life cycle of the keys, including their generation, storage,<br />

establishment, entry and output, and destruction.<br />

Key management<br />

archive<br />

A function in the lifecycle of keying material; a repository containing<br />

keying material of historical interest.<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!