-
1 key
"In encryption, authentication, and digital signatures, a value used in combination with an algorithm to encrypt or decrypt information." -
2 Pairwise Master Key
A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process. -
3 Windows Keyring
A Windows feature that creates an authentication key that contains user name and password to the Windows user account. -
4 multileg
"Pertaining to an authentication protocol whereby the client and server mutually authenticate one another by exchanging certificates, keys or tickets. Kerberos and public key infrastructure are examples of multileg authentication protocols." -
5 PMK
A 256-bit key derived from the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) or Protected EAP (PEAP) authentication process. -
6 Authenticated Internet Protocol
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements.English-Arabic terms dictionary > Authenticated Internet Protocol
-
7 Authenticated IP
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements. -
8 AuthIP
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements. -
9 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
10 certificate
"A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service." -
11 digital certificate
"A digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service." -
12 digital signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
13 Secure Sockets Layer
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
14 SSL
"The protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation." -
15 signature
"Data that binds a sender's identity to the information being sent. A digital signature may be bundled with any message, file, or other digitally encoded information, or transmitted separately. Digital signatures are used in public key environments and provide authentication and integrity services." -
16 certificate issuance policy
A set of rules that defines all the security-relevant requirements (such as key management and authentication levels) that must be met when certificates are issued to users.English-Arabic terms dictionary > certificate issuance policy
См. также в других словарях:
Authentication key — An ISO term. A cryptographic key used for authentication. When this key and the elements to be authenticated (authentication elements) are applied to the authentication algorithm, the result will be the message authentication code (MAC) or the… … International financial encyclopaedia
authentication key — /ɔθɛntəˈkeɪʃən ki/ (say awthentuh kayshuhn kee) noun a code which is based on a unique set of numbers, data relating to the transaction, etc., which authenticates and secures a data transfer. Also, digital key …
Authentication key identifier — An ISO term. ISO Message Authentication term. ISO Key Management term. The identification of the cryptographic key to be used for authentication. ISO Key Management term. The key identifier of a key to be used in the authentication of a… … International financial encyclopaedia
Identifier of authentication key — An ISO term. See preferred term Authentication key identifier … International financial encyclopaedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Authentication algorithm — An ISO term. An algorithm used, together with an authentication key, and one or more authentication elements, for authentication … International financial encyclopaedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Authentication server — Authentication servers are servers that provide authentication services to users or other systems. Users and other servers authenticate to such a server, and receive cryptographic tickets. These tickets are then exchanged with one another to… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia