![Public Key](/images/new-backgrounds/124149/124149267x1.webp)
Appendix J: Glossary of Terms | Datacryptor Ethernet User Manual |
Public Key
Cryptography
Public Key Data
Public Key encryption
Public Key Set
Replay Prevention
Secret Key
Secure Hash Algorithm (SHA)
SFP
SNMP
Transform
X.509
In public key cryptography different keys are used for encryption and decryption. The public key is public, but the private key is known only to its owner. Anyone that possesses the public key can encrypt a message so that only a single recipient (the owner of the private key) can decrypt it. The two parties do not need to share any secret information.
Consists of a public key algorithm, a public key and a private key.
The process of encrypting data using public key data.
A pair of keys: a public key and a private key.
Prevents the replaying of a message or part of a message to produce an unauthorized effect, such as the capture and replay a sequence of authentication messages to masquerade as a legitimate user.
The key used in symmetric encryption. Both participants must share the same key, and this key must remain secret to protect the communication.
A US standard for a cryptographically strong hash algorithm, designed by the National Security Agency and defined by the National Institute of Standards and Technology (NIST).
The Small
Simple Network Management Protocol is an Internet standard used to allow monitoring of performance and provide event notifications.
A transform defines the transformation applied to the data to secure it. This includes the encryption algorithm, security protocols, the key sizes and how they are derived, and the transformation process
The
Page 134 | THALES |