Datacryptor Ethernet User Manual | Appendix J: Glossary of Terms |
Element Manager (EM)
Encrypted data
Encryption
Framing
Front Panel Viewer (FPV)
Hash Function
Hash Message Authentication Code (HMAC)
Integrity
IP
Key
MAC
MAC address
Message Digest #5
Netmask
Peer
Plaintext
Private Key
Public Key
Public Key Algorithm
Application used to manage Datacryptor Ethernet devices and is used to launch the Front Panel Viewer (FPV) application.
Transformed plaintext data to ciphertext.
Data encryption scrambles and unscrambles data between two communication endpoints. The encryption process turns an original plaintext message that anyone can read into an encrypted ciphertext message that can be read only by an authorized recipient.
Method of distinguishing digital channels that have been multiplexed together
Is the application that authenticates the administrator with a Datacryptor Ethernet and allows it to be commissioned and managed.
An algorithm that computes a short digest of a longer message. The digest is usually of a fixed size.
A
Integrity assures that the content of a message has not been altered.
Internet Protocol, this is the protocol that is used to transport data across the Internet.
Secret information used to decrypt or encrypt data
An abbreviation for Message Authentication Code, a digital signature used to authenticate individual messages.
Media Access Control This is the hardware address of an interface card built in during manufacture.
A
Used in combination with an IP address to define the network portion of an IP address.
The Datacryptor device that participates in a connection.
The opposite of encrypted. Plaintext is an intelligible form of data such as the text on this page.
See Public Key
A key that is available to anyone. It is usually the other key to a pair, which consists of a public key and a private key.
An algorithm that is used in conjunction with a public key set to encrypt and decrypt data.
Page 133 |