![]() Such keys are placed on a certificate revocation list or CRL. revoked key - a public key that should no longer be used, typically because its owner is no longer in the role for which it was issued or because it may have been compromised.RED key - (NSA) symmetric key in a format that can be easily copied, e.g.pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill.public key infrastructure - (PKI) a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.Public keys are often distributed in a signed public key certificate. The decryption or private key must be kept secret to maintain confidentiality. The encryption key ( public key) need not be kept secret and can be published. public/private key - in public key cryptography, separate keys are used to encrypt and decrypt a message.poem key - Keys used by OSS agents in World War II in the form of a poem that was easy to remember.paper key - (NSA) keys that are distributed in paper form, such as printed lists of settings for rotor machines, or keys in punched card or paper tape formats.one time password (OTP) - One time password based on a prebuilt single use code list or based on a mathematical formula with a secret seed known to both parties, uses event or time to modify output (see TOTP/HOTP).If truly random and not reused it's the most secure encryption method. one time pad (OTP or OTPad) - keying material that should be as long as the plaintext and should only be used once.For example, an HSM can generate several KEK and wrap them with an MKEK before export to an external DB - such as OpenStack Barbican. master key encryption key (MKEK) - Used to encrypt multiple KEK keys.master encryption key (MEK) - Used to encrypt the DEK/TEK key.Analogous to a physical key that can open all the doors in a building. master key - key from which all other keys (or a large group of keys) can be derived.key fill - (NSA) loading keys into a cryptographic device.key production key (KPK) -Key used to initialize a keystream generator for the production of other electronically generated keys.key encryption key (KEK) - key used to protect MEK keys (or DEK/TEK if MEK is not used).to derive KEK from Diffie-Hellman key exchange. Key derivation function (KDF) - function used to derive a key from a secret value, e.g.FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography.expired key - Key that was issued for a use in a limited time frame ( cryptoperiod in NSA parlance) which has passed and, hence, the key is no longer valid.ephemeral key - A key that only exists within the lifetime of a communication session.electronic key - (NSA) key that is distributed in electronic (as opposed to paper) form.DRM key - A key used in Digital Rights Management to protect media.derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase.data encryption key (DEK) used to encrypt the underlying data.It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key. cryptovariable - NSA calls the output of a stream cipher a key or key stream.crypto ignition key An NSA key storage device ( KSD-64) shaped to look like an ordinary physical key.content-encryption key (CEK) a key that may be further encrypted using a KEK, where the content may be a message, audio, image, video, executable code, etc.benign key - (NSA) a key that has been protected by encryption or other means so that it can be distributed without fear of its being stolen.authentication key - Key used in a keyed-hash message authentication code, or HMAC.See key size for a discussion of this and other lengths. 40-bit key - key with a length of 40 bits, once the upper limit of what could be exported from the U.S. ![]() For classification of keys according to their usage see cryptographic key types. National Security Agency are marked (NSA). ![]() Terms that are primarily used by the U.S. This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Key list for a German World War II Enigma machine ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |