Angenieux 1270A450-005 user manual Public Key Cryptography Public Key Data Public Key encryption

Models: 1270A450-005

1 134
Download 134 pages 58.04 Kb
Page 134
Image 134
Public Key

Appendix J: Glossary of Terms

Datacryptor Ethernet User Manual

Public Key

Cryptography

Public Key Data

Public Key encryption

Public Key Set

Replay Prevention

Secret Key

Secure Hash Algorithm (SHA)

SFP

SNMP

Transform

X.509

In public key cryptography different keys are used for encryption and decryption. The public key is public, but the private key is known only to its owner. Anyone that possesses the public key can encrypt a message so that only a single recipient (the owner of the private key) can decrypt it. The two parties do not need to share any secret information.

Consists of a public key algorithm, a public key and a private key.

The process of encrypting data using public key data.

A pair of keys: a public key and a private key.

Prevents the replaying of a message or part of a message to produce an unauthorized effect, such as the capture and replay a sequence of authentication messages to masquerade as a legitimate user.

The key used in symmetric encryption. Both participants must share the same key, and this key must remain secret to protect the communication.

A US standard for a cryptographically strong hash algorithm, designed by the National Security Agency and defined by the National Institute of Standards and Technology (NIST).

The Small Form-Factor Pluggable device is a compact transceiver used in data communication applications where fiber optic or twisted pair networking cable is to be employed.

Simple Network Management Protocol is an Internet standard used to allow monitoring of performance and provide event notifications.

A transform defines the transformation applied to the data to secure it. This includes the encryption algorithm, security protocols, the key sizes and how they are derived, and the transformation process

The ITU-T X.509 recommendation defines the formats for X.509 certificates.

Page 134

THALES

Page 134
Image 134
Angenieux 1270A450-005 user manual Public Key Cryptography Public Key Data Public Key encryption, SFP SNMP Transform X.509