Open as PDF
GMK Group master key. A cryptographic key used to derive a group transient
key (GTK) for the Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption Standard (AES).
greenfield network An original deployment of a telecommunications network.
GRE tunnel A virtual link between two remote points on a network, created by
means of the Generic Routing Encapsulation (GRE) tunneling protocol.
GRE encapsulates packets within a transport protocol supported by the
GTK Group transient key. A cryptographic key used to encrypt broadcast and
multicast packets for transmissions using the Temporal Key Integrity
Protocol (TKIP) and Advanced Encryption Standard (AES).
group master key See GMK.
group transient key See GTK.
H.323 A set of International Telecommunications Union Telecommunication
Standardization Sector (ITU-T) standards that define a framework for
the transmission of real-time voice signals over IP packet-switched
hash A one-way algorithm from whose output the input is computationally
infeasible to determine. With a good hashing algorithm you can
produce identical output from two identical inputs, but finding two
different inputs that produce the same output is computationally
infeasible. Hash functions are used widely in authentication algorithms
and for key derivation procedures.
HiperLAN High-performance radio local area network. A set of wireless LAN
(WLAN) communication standards used primarily in European countries
and adopted by the European Telecommunications Standards Institute
HMAC Hashed message authentication code. A function, defined in RFC 2104,
for keyed hashing for message authentication. HMAC is used with
MD5 and the secure hash algorithm (SHA).