GL-3
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Glossary
algorithm A logical sequence of steps for solving a problem. Security algorithms pertain
to either data encryption or authentication.
DES and 3DES are two examples of data encryption algorithms.
Examples of encryption-decryption algorithms include block cipher, CBC, null
cipher, and stream cipher.
Authentication algorithms include hashes such as MD5 and SHA.
AMI alternate mark inversion.
ARP Address Resolution Protocol—A low-level TCP/IP protocol that maps a node
hardware address (called a MAC address) to its IP address.
ASA Adaptive Security Algorithm. Allows one-way (inside to outside) connections
without an explicit configuration for each internal system and application.
asymmetric
encryption
Also called public key systems, this approach allows anyone to obtain access to
anyone else's public key and therefore send an encrypted message to that person
using the public key.
asymmetric keys A pair of mathematically related cryptographic keys. The public key encrypts
information that only the private key can decrypt, and vice versa. Additionally,
the private key signs data that only the public key can authenticate.
ATM Asynchronous Transfer Mode. International standard for cell relay in which
multiple service types (such as voice, video, and data) are conveyed in
fixed-length (53-byte) cells. Fixed-length cells allow cell processing to occur in
hardware, thereby reducing transit delays.
authenticate To establish the truth of an identity.
authentication In security, the verification of the identity of a person or process. Authentication
establishes the integrity of a data stream, ensuring that it was not tampered with
in transit, and providing confirmation of the data stream’s origin.