GL-3
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Glossary
asymmetric
encryption
Also called public key systems, this approach allows anyone to obtain access to
anyone else's public key and therefore send an encrypted message to that person
using the public key.
asymmetric keys A pair of mathematically related cryptographic keys. The public key encrypts
information that only the private key can decrypt, and vice versa. Additionally,
the private key signs data that only the public key can authenticate.
ATM Asynchronous Transfer Mode. International standard for cell relay in which
multiple service types (such as voice, video, and data) are conveyed in
fixed-length (53-byte) cells. Fixed-length cells allow cell processing to occur in
hardware, thereby reducing transit delays.
authenticate To establish the truth of an identity.
authentication In security, the verification of the identity of a person or process. Authentication
establishes the integrity of a data stream, ensuring that it was not tampered with
in transit, and providing confirmation of the data streams origin.
B
block A fixed-length sequence of bits.
block cipher An encryption algorithm that uses a 64-bit symmetric cipher to ope rate on data
blocks of a fixed size. See cipher.
BOOTP Bootstrap Protocol. The protocol used by a network node to det ermine the IP
address of its Ethernet interfaces to affect network booting.
C
CA certification authority. A trusted third-party entity that issues and/or revokes
digital certificates. Sometimes referred to as a notary or a certifying authority.
Within a g iven CAs domain, each device needs only its own certificate and the
CAs public key to authenticate every other device in that domain.