Symmetricom S100 Network Card User Manual


 
S100 User Guide – Rev. D – June 2005 127
2
5
3
IKE
Internet Key Exchange, a security system that uses a private key and an exchange key that
encrypts private keys. Passwords are delivered over the Internet.
In-band Authentication
When you use PKI—which involves public keys and a private key— for authentication, it is
called in-band authentication.
See also: Out-of-band Authentication
Integrity
Data that has retained its integrity has not been modified or tampered with.
IPSec
Internet Protocol Security describes the IETF protocols that protect the secure exchange of
packets on the IP layer.
IRIG
InteRange Instrumentation Group is an analog standard for serial time formats.
Irrefutable
See Non-repudiation
ITU
International Telecommunications Union, the international organization that sets standards
for data communication.
Key
An alphanumeric string that encrypts and decrypts data.
Key Escrow
A secure storage maintained by a trusted third party, which holds keys.
Key Generation
Creation of a key.
Key Management
The process by which keys are created, authenticated, issued, distributed, stored, recovered,
and revoked.
Key Pair
Two integrated keys: one public, one private.
Key Recovery
The process of recovering a private decryption key from a secure archive for the purposes of
recovering data that has been encrypted with the corresponding encryption key.