Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Initialization vector<br />
(IV)<br />
Integrity (Also<br />
Assurance of Integrity)<br />
Key See cryptographic key.<br />
March, 2007<br />
A vector used in defining the starting point of a cryptographic process.<br />
The property that sensitive data has not been modified or deleted in an<br />
unauthorized and undetected manner.<br />
In this recommendation, the statement that a cryptographic algorithm<br />
"provides integrity" means that the algorithm is used to detect<br />
unauthorized modifications or deletions.<br />
Key agreement A key establishment procedure where resultant keying material is a<br />
function of information contributed by two or more participants, so that<br />
no party can predetermine the value of the keying material independent<br />
of the other party’s contribution.<br />
Key attribute See attribute<br />
Key component See cryptographic key component.<br />
Key confirmation A procedure to provide assurance to one party that another party<br />
actually possesses the same keying material and/or shared secret.<br />
Key de-registration A function in the lifecycle of keying material; the marking of all<br />
keying material records and associations to indicate that the key is no<br />
longer in use.<br />
Key derivation A function in the lifecycle of keying material; the process by which<br />
one or more keys are derived from a shared secret and other<br />
information.<br />
Key distribution The transport of a key and other keying material from an entity that<br />
either owns the key or generates the key to another entity that is<br />
intended to use the key.<br />
Key encrypting key A cryptographic key that is used for the encryption or decryption of<br />
other keys.<br />
Key establishment A function in the lifecycle of keying material; the process by which<br />
cryptographic keys are securely established among cryptographic<br />
modules using manual transport methods (e.g., key loaders), automated<br />
methods (e.g., key transport and/or key agreement protocols), or a<br />
combination of automated and manual methods (consists of key<br />
transport plus key agreement).<br />
Key management The activities involving the handling of cryptographic keys and other<br />
related security parameters (e.g., IVs and passwords) during the entire<br />
life cycle of the keys, including their generation, storage,<br />
establishment, entry and output, and destruction.<br />
Key management<br />
archive<br />
A function in the lifecycle of keying material; a repository containing<br />
keying material of historical interest.<br />
23