Appendix J: Glossary of Terms | Datacryptor Ethernet User Manual |
Appendix J: Glossary of Terms
Advanced Encryption Standard (AES)
Bits per Sec (bps)
Block cipher
Certificate
Certification Authority (CA)
Cipher block chaining (CBC)
Ciphertext
Ciphertext Stealing (CTS)
Command Line Interface (CLI)
Diffie-Hellman
Digital Signature
Digital Signature
Standard (DSS)
DSA
DSA public parameters
A symmetric algorithm (same key for encryption and decryption) using block encryption of 128 bits in size, supporting key sizes of 128, 192 and 256 bits.
The number of bits passing a point every second; the transmission rate for digital information.
A type of symmetric
A digital document which helps to prevent someone impersonating someone else. Each certificate contains a certified public key and other information such as issuer’s name and algorithms used in encryption and decryption.
A certificate authority is a trusted organization that accepts certificate applications, authenticates applications, issues certificates, and maintains status information about certificates.
A method of using a block cipher in which two identical plaintext blocks encrypt to different ciphertexts.
An unintelligible form of data that can only be read if specific operations are performed on it using a key and decrypting algorithm.
CTS mode is a Datacryptor mode of operation that minimizes the latency caused by the encryption of the Ethernet packets passing through the Datacryptor unit.
The CLI is the
A protocol which allows two users to agree a secret key over an insecure medium without any prior secret keys.
A digital signature must be difficult to repudiate, and must protect the integrity of the information being signed. By encrypting a digest of a message with the private key, authentication can later be performed by applying the public key to an encrypted digest (digital signature) and comparing the result to the digest of the message.
A standard for digital signatures using the DSA public key algorithm and the
An abbreviation for Digital Signature Algorithm. It is an algorithm used for authentication only.
Parameters used to generate and check DSA digital signatures.
Page 132 | THALES |