-
1 session key
The key used for encrypting data during a communication session. -
2 Key Distribution Center
A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS). -
3 master key
"The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs." -
4 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
5 public key
"The nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key." -
6 public key algorithm
"An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message." -
7 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
8 hash algorithm
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1." -
9 hash function
"An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1."
См. также в других словарях:
Session key — A session key is a single use symmetric key used for encrypting all messages in one communication session. A closely related term is traffic encryption key or TEK, which refers to any key used to encrypt messages as opposed to different uses,… … Wikipedia
Session Key — Ein Session Key ist ein einmal verwendeter, zufällig generierter Schlüssel. Er wird zum Beispiel in der hybriden Verschlüsselung verwendet, um die Nutzdaten symmetrisch zu verschlüsseln. Der Session Key selbst wird zufällig erzeugt, danach werden … Deutsch Wikipedia
session key — seanso raktas statusas T sritis informatika apibrėžtis Laikinas, vienkartinis ↑raktas (3), paprastai galiojantis tik vieną seansą ar į jį panašų laikotarpį. atitikmenys: angl. session key ryšiai: dar žiūrėk – raktas … Enciklopedinis kompiuterijos žodynas
Session key — An ISO term. A data key used for the session … International financial encyclopaedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia
Session hijacking — The term session hijacking refers to the exploitation of a valid computer session sometimes also called a session key to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of… … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Session Description Protocol — (SDP) is a format for describing streaming media initialization parameters in an ASCII string. The IETF published the original specification as an IETF Proposed Standard in April 1998 [ cite web|url=http://tools.ietf.org/html/rfc2327 |title=SDP:… … Wikipedia
Session Manager Subsystem — Session Manager Subsystem, or smss.exe, is a component of the Microsoft Windows NT operating system. It is executed during the startup process of Windows 2000, XP, 2003 and Vista. At this time it: *Creates environment variables *Starts the kernel … Wikipedia
Session Description Protocol — SDP (Session Description Protocol) Familie: Internetprotokollfamilie Einsatzgebiet: Beschreibung von Multimedia Sitzungen im Rahmen der Aushandlung von Medienformaten SDP im TCP/IP‑Protokollstapel: Anwendung SDP Transport … Deutsch Wikipedia
Session Border Controller — A Session Border Controller is a device used in some VoIP networks to exert control over the signaling and usually also the media streams involved in setting up, conducting, and tearing down calls. Within the context of VoIP, the word Session in… … Wikipedia