Appendix J: Glossary of Terms
Public Key
Cryptography
Public Key Data
Public Key encryption
Public Key Set
Replay Prevention
Secret Key
Secure Hash Algorithm
(SHA)
SFP
SNMP
Transform
X.509
Page 134
All manuals and user guides at all-guides.com
In public key cryptography different keys are used for encryption
and decryption. The public key is public, but the private key is
known only to its owner. Anyone that possesses the public key can
encrypt a message so that only a single recipient (the owner of the
private key) can decrypt it. The two parties do not need to share
any secret information.
Consists of a public key algorithm, a public key and a private key.
The process of encrypting data using public key data.
A pair of keys: a public key and a private key.
Prevents the replaying of a message or part of a message to
produce an unauthorized effect, such as the capture and replay a
sequence of authentication messages to masquerade as a
legitimate user.
The key used in symmetric encryption. Both participants must
share the same key, and this key must remain secret to protect the
communication.
A US standard for a cryptographically strong hash algorithm,
designed by the National Security Agency and defined by the
National Institute of Standards and Technology (NIST).
The Small Form-Factor Pluggable device is a compact transceiver
used in data communication applications where fiber optic or
twisted pair networking cable is to be employed.
Simple Network Management Protocol is an Internet standard used
to allow monitoring of performance and provide event
notifications.
A transform defines the transformation applied to the data to
secure it. This includes the encryption algorithm, security
protocols, the key sizes and how they are derived, and the
transformation process
The ITU-T X.509 recommendation defines the formats for X.509
certificates.
Datacryptor Ethernet User Manual
THALES
Need help?
Do you have a question about the Datacryptor Ethernet and is the answer not in the manual?
Questions and answers