Cisco OL-4015-08 User Manual page 645

Cisco router and security device manager user's guide
Table of Contents

Advertisement

asymmetric
encryption
asymmetric keys
ATM
authenticate
authentication
B
block
block cipher
BOOTP
C
CA
OL-4015-08
Also called public key systems, this approach allows anyone to obtain access to
anyone else's public key and therefore send an encrypted message to that person
using the public key.
A pair of mathematically related cryptographic keys. The public key encrypts
information that only the private key can decrypt, and vice versa. Additionally,
the private key signs data that only the public key can authenticate.
Asynchronous Transfer Mode. International standard for cell relay in which
multiple service types (such as voice, video, and data) are conveyed in
fixed-length (53-byte) cells. Fixed-length cells allow cell processing to occur in
hardware, thereby reducing transit delays.
To establish the truth of an identity.
In security, the verification of the identity of a person or process. Authentication
establishes the integrity of a data stream, ensuring that it was not tampered with
in transit, and providing confirmation of the data stream's origin.
A fixed-length sequence of bits.
An encryption algorithm that uses a 64-bit symmetric cipher to operate on data
blocks of a fixed size. See cipher.
Bootstrap Protocol. The protocol used by a network node to determine the IP
address of its Ethernet interfaces to affect network booting.
certification authority. A trusted third-party entity that issues and/or revokes
digital certificates. Sometimes referred to as a notary or a certifying authority.
Within a given CA's domain, each device needs only its own certificate and the
CA's public key to authenticate every other device in that domain.
Cisco Router and Security Device Manager Version 2.2 User's Guide
Glossary
GL-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents