Recently updated
Published entries ordered by most recent updates.
- certificate authorityJan 06, 2026
Synonym for "certification authority".
- ACESJan 06, 2026
See: Access Certificate for Electronic Services.
- certificate renewalJan 06, 2026
The act or process by which the validity of the binding asserted by an existing public key certificate is extended in time by issuing a new certificate. (See: certificate rekey, certificate update.)
- Electronic Key Management SystemJan 06, 2026
"Interoperable collection of systems developed by ... the U.S. Government to automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic keying material and the management of other types of COMSEC material." [C4009]
- B1, B2, or B3 computer systemJan 06, 2026
See: Tutorial under "Trusted Computer System Evaluation Criteria".
- off-line attackJan 06, 2026
See: secondary definition under "attack".
- NSAJan 06, 2026
See: National Security Agency
- MIME Object Security ServicesJan 06, 2026
An Internet protocol [R1848] that applies end to end encryption and digital signature to MIME message content, using symmetric cryptography for encryption and asymmetric cryptography for key distribution and signature. MOSS is based on features and specifications of PEM. (See: S/MIME.)
- cryptanalysisJan 06, 2026
The operations performed in defeating or circumventing cryptographic protection of information by applying mathematical techniques and without an initial knowledge of the key employed in providing the protection.
- CAWJan 06, 2026
See: certification authority workstation.
- ephemeralJan 06, 2026
Refers to a cryptographic key or other cryptographic parameter or data object that is short lived, temporary, or used one time. (See: session key. Compare: static.)
- CSIRTJan 06, 2026
See: computer security incident response team.
- Brewer-Nash modelJan 06, 2026
A security model [BN89] to enforce the Chinese wall policy. (Compare: Bell LaPadula model, Clark Wilson model.)
- discretionary access controlJan 06, 2026
An access control service that (a) enforces a security policy based on the identity of system entities and the authorizations associated with the identities and (b) incorporates a concept of ownership in which access rights for a system resource may be granted and revoked by the entity that owns the resource. (See: access control list, DAC, identity based security policy, mandatory access control.)
- mission essentialJan 06, 2026
Refers to materiel that is authorized and available to combat, combat support, combat service support, and combat readiness training forces to accomplish their assigned missions. [JP1] (Compare: mission critical.)
- cryptoperiodJan 06, 2026
The time span during which a particular key value is authorized to be used in a cryptographic system. (See: key management.)
- operational securityJan 06, 2026
System capabilities, or performance of system functions, that are needed either (a) to securely manage a system or (b) to manage security features of a system. (Compare: operations security (OPSEC).)
- collateral informationJan 06, 2026
Information that is classified but is not required to be protected by an SAP. (See: /U.S. Government/ classified.)
- certificate rekeyJan 06, 2026
The act or process by which an existing public key certificate has its key value changed by issuing a new certificate with a different (usually new) public key. (See: certificate renewal, certificate update, rekey.)
- authorized userJan 06, 2026
A system entity that accesses a system resource for which the entity has received an authorization. (Compare: insider, outsider, unauthorized user.)
- Internet Policy Registration AuthorityJan 06, 2026
An X.509 compliant CA that is the top CA of the Internet certification hierarchy operated under the auspices of the ISOC [R1422]. (See: /PEM/ under "certification hierarchy".)
- Orange BookJan 06, 2026
Synonym for "Trusted Computer System Evaluation Criteria" [CSC1, DoD1].
- CKLJan 06, 2026
See: compromised key list.
- OSI, OSIRMJan 06, 2026
See: Open Systems Interconnection Reference Model.
- AuthorizationJan 06, 2026
Authorization is the process of determining what an authenticated principal is permitted to do.
- DEAJan 06, 2026
See: Data Encryption Algorithm.
- BlowfishJan 06, 2026
A symmetric block cipher with variable length key (32 to 448 bits) designed in 1993 by Bruce Schneier as an unpatented, license free, royalty free replacement for DES or IDEA. [Schn] (See: Twofish.)
- EUCIJan 06, 2026
See: endorsed for unclassified cryptographic item.
- audit trailJan 06, 2026
See: security audit trail.
- Commercial COMSEC Evaluation ProgramJan 06, 2026
"Relationship between NSA and industry in which NSA provides the COMSEC expertise (i.e., standards, algorithms, evaluations, and guidance) and industry provides design, development, and production capabilities to produce a type 1 or type 2 product." [C4009]
- capability tokenJan 06, 2026
A token (usually an unforgeable data object) that gives the bearer or holder the right to access a system resource. Possession of the token is accepted by a system as proof that the holder has been authorized to access the resource indicated by the token. (See: attribute certificate, capability list, credential, digital certificate, ticket, token.)
- intrusion detectionJan 06, 2026
The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
- Basic Encoding RulesJan 06, 2026
A standard for representing ASN.1 data types as strings of octets. [X690] (See: Distinguished Encoding Rules.)
- bindJan 06, 2026
To inseparably associate by applying some security mechanism.
- attackJan 06, 2026
An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- FEALJan 06, 2026
A family of symmetric block ciphers that was developed in Japan; uses a 64 bit block, keys of either 64 or 128 bits, and a variable number of rounds; and has been successfully attacked by cryptanalysts. [Schn]
- EESJan 06, 2026
See: Escrowed Encryption Standard.
- one-time padJan 06, 2026
A manual encryption system in the form of a paper pad for one time use.
- CRCJan 06, 2026
See: cyclic redundancy check.
- key authenticationJan 06, 2026
"The assurance of the legitimate participants in a key agreement [i.e., in a key agreement protocol] that no non legitimate party possesses the shared symmetric key." [A9042]
- dual-use certificateJan 06, 2026
A certificate that is intended for use with both digital signature and data encryption services. [SP32]
- ACLJan 06, 2026
A list of entities, together with their access rights, that are authorized to have access to a resource.
- economy of mechanismJan 06, 2026
The principle that a security mechanism should be designed to be as simple as possible, so that (a) the mechanism can be correctly implemented and (b) it can be verified that the operation of the mechanism enforces the system's security policy. (Compare: economy of alternatives, least privilege.)
- archiveJan 06, 2026
A collection of data that is stored for a relatively long period of time for historical and other purposes, such as to support audit service, availability service, or system integrity service. (Compare: backup, repository.)
- CAPIJan 06, 2026
See: cryptographic application programming interface.
- error detection codeJan 06, 2026
A checksum designed to detect, but not correct, accidental (i.e., unintentional) changes in data.
- Data Encryption StandardJan 06, 2026
A U.S. Government standard [FP046] that specifies the DEA and states policy for using the algorithm to protect unclassified, sensitive data. (See: AES.)
- Coordinated Universal TimeJan 06, 2026
UTC is derived from International Atomic Time (TAI) by adding a number of leap seconds. The International Bureau of Weights and Measures computes TAI once each month by averaging data from many laboratories. (See: GeneralizedTime, UTCTime.)
- livenessJan 06, 2026
A property of a communication association or a feature of a communication protocol that provides assurance to the recipient of data that the data is being freshly transmitted by its originator, i.e., that the data is not being replayed, by either the originator or a third party, from a previous transmission. (See: fresh, nonce, replay attack.)
- control zoneJan 06, 2026
"The space, expressed in feet of radius, surrounding equipment processing sensitive information, that is under sufficient physical and technical control to preclude an unauthorized entry or compromise." [NCSSG] (Compare: inspectable space, TEMPEST zone.)