Cisco ROUTER-SDM-CD User Manual page 951

User guide
Table of Contents

Advertisement

algorithm
AMI
ARP
ASA
asymmetric
encryption
asymmetric keys
ATM
authenticate
authentication
OL-4015-12
A logical sequence of steps for solving a problem. Security algorithms pertain
to either data encryption or authentication.
DES and 3DES are two examples of data encryption algorithms.
Examples of encryption-decryption algorithms include block cipher, CBC, null
cipher, and stream cipher.
Authentication algorithms include hashes such as MD5 and SHA.
alternate mark inversion.
Address Resolution Protocol—A low-level TCP/IP protocol that maps a node
hardware address (called a MAC address) to its IP address.
Adaptive Security Algorithm. Allows one-way (inside to outside) connections
without an explicit configuration for each internal system and application.
Also called public key systems, this approach allows anyone to obtain access to
anyone else's public key and therefore send an encrypted message to that person
using the public key.
A pair of mathematically related cryptographic keys. The public key encrypts
information that only the private key can decrypt, and vice versa. Additionally,
the private key signs data that only the public key can authenticate.
Asynchronous Transfer Mode. International standard for cell relay in which
multiple service types (such as voice, video, and data) are conveyed in
fixed-length (53-byte) cells. Fixed-length cells allow cell processing to occur in
hardware, thereby reducing transit delays.
To establish the truth of an identity.
In security, the verification of the identity of a person or process. Authentication
establishes the integrity of a data stream, ensuring that it was not tampered with
in transit, and providing confirmation of the data stream's origin.
Cisco Router and Security Device Manager 2.5 User's Guide
Glossary
GL-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents