Public Key –
The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data. A cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity,
Public Key Certificate –
A set of data that unambiguously identifies an entity, contains the entity's public key, and is digitally signed by a trusted third party (certification authority).
Public Key Certificate –
A set of data that uniquely identifies an entity, contains the entity’s public key, and is digitally signed by a trusted party, thereby binding the public key to the entity.
Public Key (Asymmetric) Cryptographic Algorithm –
A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible.
Public Key Cryptography –
Encryption system that uses a public-private key pair for encryption and/or digital signature.
Public Key Enabling (PKE) –
The incorporation of the use of certificates for security services such as authentication, confidentiality, data integrity, and non-repudiation.
Public Key Infrastructure (PKI) –
A set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
Public Seed –
A starting value for a pseudorandom number generator. The value produced by the random number generator may be made public. The public seed is often called a “salt.”
Public Key Infrastructure 1 –
An architecture which is used to bind public keys to entities, enable other entities to verify public key bindings, revoke such bindings, and provide other services critical to managing public keys. A Framework that is established to issue, maintain, and revoke public key certificates.
Public Key Infrastructure 2 –
A support service to the PIV system that provides the cryptographic keys needed to perform digital signature-based identity verification and to protect communications and storage of sensitive verification system data within identity cards and the verification system.
Public Key Infrastructure 3 –
The framework and services that provide for the generation, production, distribution, control, accounting, and destruction of public key certificates. Components include the personnel, policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, recover, and revoke public key certificates.
Secret Key 1 –
A cryptographic key that is used with a secret-key (symmetric) cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Secret Key 2 –
A cryptographic key that must be protected from unauthorized disclosure to protect data encrypted with the key. The use of the term “secret” in this context does not imply a classification level; rather, the term implies the need to protect the key from disclosure or substitution.
Secret Key 3 –
A cryptographic key that is uniquely associated with one or more entities. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure or substitution.
Secret Key 4 –
A cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public.
Secret Key (symmetric) Cryptographic Algorithm –
A cryptographic algorithm that uses a single secret key for both encryption and decryption. A cryptographic algorithm that uses a single key (i.e., a secret key) for both encryption and decryption.
Secret Seed –
A secret value used to initialize a pseudorandom number generator.
Secure/Multipurpose Internet Mail Extensions (S/MIME) –
A set of specifications for securing electronic mail. S/MIME is based upon the widely used MIME standard [MIME] and describes a protocol for adding cryptographic security services through MIME encapsulation of digitally signed and encrypted objects. The basic security services offered by S/MIME are authentication, non-repudiation of origin, message integrity, and message privacy. Optional security services include signed receipts, security labels, secure mailing lists, and an extended method of identifying the signer’s certificate(s).
Rules of Engagement (ROE) –
Detailed guidelines and constraints regarding the execution of information security testing. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.
Ruleset –
A table of instructions used by a controlled interface to determine what data is allowable and how the data is handled between interconnected systems. A set of directives that govern the access control functionality of a firewall. The firewall uses these directives to determine how packets should be routed between its interfaces.