All > Technology > Security
A widely used authentication protocol developed at the Massachusetts Institute of Technology (MIT). In classic Kerberos, users share a secret password with a Key Distribution Center (KDC). The user, Alice, who wishes to communicate with another user, Bob, authenticates to the KDC and is furnished a ticket by the KDC to use to authenticate with Bob. When Kerberos authentication is based on passwords, the protocol is known to be vulnerable to off-line dictionary attacks by eavesdroppers who capture the initial user-to-KDC exchange.
- Browse Related Terms: authenticity, Entity, Kerberos, Man-in-the-middle Attack (MitM), Off-line Attack, On-line Attack, Passive Attack, password, Personal Identification Number (PIN), Practice Statement, Proof of Possession Protocol (PoP Protocol), Protocol Run, Secure Communication Protocol, Shared Secret, Subscriber, Token, Transport Layer Security (TLS), Tunneled Password Protocol, Verifier Impersonation Attack
Also listed in:
All > Technology > Security
A value used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification.
- Browse Related Terms: Asymmetric Keys, Cryptography, key, Link Encryption, Plaintext, Public (Asymmetric) Key Encryption, Secret (Symmetric) Key Encryption, Secret Key (symmetric) Cryptographic Algorithm, Symmetric Encryption Algorithm
Also listed in:
All > Technology > Security
The three cryptographic keys (Key1, Key2, Key3) that are used with a Triple Data Encryption Algorithm mode.
- Browse Related Terms: Ciphertext, Cryptology, Data Encryption Algorithm (DEA), Data Encryption Standard (DES), Encrypted Key, Encrypted Network, Encryption Certificate, end-to-end encryption, Escrow, Initialization Vector (IV), Key Bundle, Key Wrap, Payload, Rijndael, Secure Socket Layer and Transport Layer Security (SSL and TSL), Triple DES
All > Technology > Security
The processes of managing (e.g., generating, storing, transferring, auditing) the two components of a cryptographic key by two key component holders.
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization
All > Technology > Security
A system that entrusts the two components comprising a cryptographic key (e.g., a device unique key) to two key component holders (also called "escrow agents").
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization
All > Technology > Security
The process by which cryptographic keys are securely distributed among cryptographic modules using manual transport methods (e.g., key loaders), automated methods (e.g., key transport and/or key agreement protocols), or a combination of automated and manual methods (consists of key transport plus key agreement).
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization
All > Technology > Security
The process of exchanging public keys in order to establish secure communications.
- Browse Related Terms: Authentication Token, Claimant, Distinguishing Identifier, Initiator, Key Exchange, mutual authentication, Non-repudiation, Object, Principal, Protocol Entity, Responder, Spoofing, steganography, verifier
All > Technology > Security
Routine used to generate a series of Round Keys from the Cipher Key.
- Browse Related Terms: Block, Cipher, Cipher Key, Digital Evidence, Digital Signature, Encryption, Inverse Cipher, Key Expansion, Round Key, S-box, state
All > Technology > Security
Random numbers, pseudo-random numbers, and cryptographic parameters used in generating cryptographic keys.
- Browse Related Terms: Approved Security Function, Authentication protocol, Automated Password Generator, Compromise, Cryptographic Key, Cryptographic Module, Cryptoperiod, Decryption, FIPS Approved Security Method, Key Generation Material, Key Management, Secret Seed, User Initialization
All > Technology > Security
A self-contained unit that is capable of storing at least one plaintext or encrypted cryptographic key or key component that can be transferred, upon request, into a cryptographic module.
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization
All > Technology > Security
The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and zeroization.
- Browse Related Terms: Approved Security Function, Authentication protocol, Automated Password Generator, Compromise, Cryptographic Key, Cryptographic Module, Cryptoperiod, Decryption, FIPS Approved Security Method, Key Generation Material, Key Management, Secret Seed, User Initialization
All > Technology > Security
A public key and its corresponding private key; a key pair is used with a public key algorithm.
- Browse Related Terms: Cryptographic Token, Entropy, Ephemeral Keys, key pair, Plaintext Key, private key, public key, Public Key (Asymmetric) Cryptographic Algorithm, Salt, Secret Key, Static Keys, Symmetric Key
Also listed in:
All > Technology > Security
The secure transport of cryptographic keys from one cryptographic module to another module.
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization
All > Technology > Security
A method of encrypting keys (along with associated integrity information) that provides both confidentiality and integrity protection using a symmetric key algorithm.
- Browse Related Terms: Ciphertext, Cryptology, Data Encryption Algorithm (DEA), Data Encryption Standard (DES), Encrypted Key, Encrypted Network, Encryption Certificate, end-to-end encryption, Escrow, Initialization Vector (IV), Key Bundle, Key Wrap, Payload, Rijndael, Secure Socket Layer and Transport Layer Security (SSL and TSL), Triple DES
All > Technology > Security
A message authentication code that uses a cryptographic key in conjunction with a hash function.
- Browse Related Terms: Authentication Code, Challenge-Response Protocol, File Integrity Checker, Hash-based Message Authentication Code (HMAC), IP address, Keyed-hash based message authentication code (HMAC), Message Authentication Code (MAC), Message Digest, nonce, Secure Hash Algorithm (SHA-1), SHA-1, Traffic Analysis, Virus Hoax
All > Technology > Security > Biometrics
A biometric modality that uses the cadence of an individual's typing pattern for recognition.
- Browse Related Terms: Behavioral Biometric Characteristic, Biological Biometric Characteristic, Biometrics, Face Recognition, Gait, Hand Geometry Recognition, Iris Recognition, Keystroke Dynamics, Palm Print Recognition, Signature Dynamics, Speaker Recognition
All > Technology > Security
The process used to view or record both the keystrokes entered by a computer user and the computers response during an interactive session. Keystroke monitoring is usually considered a special case of audit trails.
- Browse Related Terms: Buffer Overflow, Cracking (also Crackers), Hacker, IDS Host-Based, Keystroke Monitoring, Min-Entropy, Password Protected, Rootkit, scanning, script kiddie, Signature, Victim
Also listed in:
- All > Law > E-Discovery