Glossary - Dell PowerVault ML6000 User Manual

Dell powervault ml6000 encryption key manager user's guide
Hide thumbs Also See for PowerVault ML6000:
Table of Contents

Advertisement

Glossary

This glossary defines the special terms,
abbreviations, and acronyms used in this
publication and other related publications.
AES. Advanced Encryption Standard. A block cipher
adopted as an encryption standard by the US
government.
alias. See key label.
certificate. A digital document that binds a public key
to the identity of the certificate owner, thereby enabling
the certificate owner to be authenticated.
certificate label. See key label.
certificate store. See keystore.
DK. Data Key. An alphanumeric string used to
encrypt data.
EEDK. Externally Encrypted Data Key. A Data Key
that has been encrypted (wrapped) by a Key
Encryption Key prior to being stored in the data
cartridge. See KEK.
encryption. The conversion of data into a cipher. A
key is required to encrypt and decrypt the data.
Encryption provides protection from persons or
software that attempt to access the data without the
key.
KEK. Key Encrypting Key. An alphanumeric,
asymmetric key used to encrypt the Data Key. See
EEDK.
key label. A unique identifier used to match the
EEDK with the private key (KEK) required to unwrap
the protected symmetric data key. Also called alias or
certificate label depending on which keystore is used.
key ring. See keystore.
keystore. A database of private keys and their
associated X.509 digital certificate chains used to
authenticate the corresponding public keys. Also called
certificate store or key ring in some environments.
PKDS. Public Key Data Set. Also PKA cryptographic
Key Data Set.
private key. One key in an asymmetric key pair,
typically used for decryption. The Encryption Key
Manager uses private keys to unwrap protected AES
data keys prior to decryption.
public key. One key in an asymmetric key pair,
typically used for encryption. The Encryption Key
Manager uses public keys to wrap (protect) AES data
keys prior to storing them on the tape cartridge.
rekey. The process of changing the asymmetric Key
Encrypting Key (KEK) that protects the Data Key (DK)
stored on an already encrypted tape, thereby allowing
different entities access to the data.
RSA. Rivest-Shamir-Adleman algorithm. A system for
asymmetric, public-key cryptography used for
encryption and authentication. It was invented in 1977
by Ron Rivest, Adi Shamir, and Leonard Adleman. The
security of the system depends on the difficulty of
factoring the product of two large prime numbers.
E-1

Advertisement

Table of Contents
loading

Table of Contents