Angenieux 1270A450-005 Switch User Manual


 
Appendix J: Glossary of Terms Datacryptor Ethernet User Manual
Page 134 THALES
Public Key
Cryptography
In public key cryptography different keys are used for encryption
and decryption. The public key is public, but the private key is
known only to its owner. Anyone that possesses the public key can
encrypt a message so that only a single recipient (the owner of the
private key) can decrypt it. The two parties do not need to share
any secret information.
Public Key Data Consists of a public key algorithm, a public key and a private key.
Public Key encryption The process of encrypting data using public key data.
Public Key Set A pair of keys: a public key and a private key.
Replay Prevention Prevents the replaying of a message or part of a message to
produce an unauthorized effect, such as the capture and replay a
sequence of authentication messages to masquerade as a
legitimate user.
Secret Key The key used in symmetric encryption. Both participants must
share the same key, and this key must remain secret to protect the
communication.
Secure Hash Algorithm
(SHA)
A US standard for a cryptographically strong hash algorithm,
designed by the National Security Agency and defined by the
National Institute of Standards and Technology (NIST).
SFP The Small Form-Factor Pluggable device is a compact transceiver
used in data communication applications where fiber optic or
twisted pair networking cable is to be employed.
SNMP Simple Network Management Protocol is an Internet standard used
to allow monitoring of performance and provide event
notifications.
Transform A transform defines the transformation applied to the data to
secure it. This includes the encryption algorithm, security
protocols, the key sizes and how they are derived, and the
transformation process
X.509 The ITU-T X.509 recommendation defines the formats for X.509
certificates.