Home Products Store Testimonials About Us Contact


Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7

Glossary of Terms (Page 3)

Data Encryption Standard - See DES.

decryption - The inverse (reverse) of encryption.

DES - Data Encryption Standard, a block cipher developed by IBM and the U.S. government in the 1970's as an official standard. See also block cipher.

dictionary attack - A brute force attack that tries passwords and or keys from a precompiled list of values. This is often done as a precomputation attack.

Diffie-Hellman key exchange - A key exchange protocol allowing the participants to agree on a key over an insecure channel.

differential cryptanalysis - A chosen plaintext attack relying on the analysis of the evolution of the differences between two plaintexts.

digest - Commonly used to refer to the output of a hash function, e.g. message digest refers to the hash of a message.

digital envelope - A key exchange protocol that uses a public-key cryptosystem to encrypt a secret key for a secret-key cryptosystem.

digital fingerprint - See digital signature.

digital signature - The encryption of a message digest with a private key.

digital timestamp - A record mathematically linking a document to a time and date.

discrete logarithm - Given two elements d, g, in a group such that there is an integer r satisfying g ** r = d, r is called the discrete logarithm.

discrete logarithm problem - The problem of given d and g in a group, to find r such that g ** r = d. For some groups, the discrete log problem is a hard problem that can be used in public-key cryptography.

distributed key - A key that is split up into many parts and shared (distributed) among different participants. See also secret sharing.

DMS - Defense Messaging Service.

DOD - Department of Defense.

DSA - Digital Signature Algorithm. DSA is a public-key method based on the discrete log problem.

DSS - Digital Signature Standard. DSA is the Digital Signature Standard.

ECC - Elliptic Curve Cryptosystem; A public-key cryptosystem based on the properties of elliptic curves.

ECDL - See elliptic curve discrete logarithm.

EDI - Electronic (business) Data Interchange.

electronic commerce (e-commerce) - Business transactions conducted over the Internet.

electronic mail (e-mail) - Messages sent electronically form one person to another via the Internet.

elliptic curve - The set of points (x,y) satisfying an equation of the form y ** 2 = x ** 3 + ax + b, for variables x, y and constants a, b.

elliptic curve cryptosystem - See ECC.

elliptic curve discrete logarithm (ECDL) problem - The problem of given two points P and Q on an elliptic curve, to find m satisfying mP = Q, assuming such and m exists.

elliptic curve (factoring) method - A special-purpose factoring algorithm that attempts to find a prime factor p of an integer n my finding an elliptic curve shows number of points modulo p is divisible by only small primes.

encryption - The transformation of plaintext into an apparently less readable form (called ciphertext) through a mathematical process. The ciphertext may be read by anyone who has the key that decrypts (undoes the encryption) the ciphertext.

exclusive or - See XOR.

exhaustive search - Checking every possibility individually till the right value is found. See also attack.

expiration date - Certificates and keys may have a limited lifetime; expiration dates are used to monitor this.

exponential function - A function where the variable is in the exponent of some base, for example, b ** N where N is the variable, and b is some constant.

export encryption - Encryption, in any form, which leaves its country of origin. For example, encrypted information or a computer disk holding encryption algorithms that is sent out of the country.