Home Products Store Testimonials About Us Contact


Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7

Glossary of Terms (Page 6)

patent - The sole right, granted by the government, to sell, use, and manufacture an invention or creation.

PKI - Public-Key Infrastructure. PKIs are designed to solve the key management problem. See also key management.

padding - extra bits concatenated with a key, password, or plaintext.

password - A character string used as a key to control access to files or encrypt them.

PKCS - Public-Key Cryptography Standards. A series of cryptographic standards dealing with public-key issues, published by RSA Laboratories.

plaintext - The data to be encrypted.

Pollard p-1 and Pollard p-2 methods - Algorithms that attempt to find a prime factor p of a number N by exploiting properties of p-1 and p+1. See also factoring, prime factor, prime number.

Pollard Rho method - A method for solving the discrete logarithm and elliptic curve discrete logarithm.

precomputation attack - An attack where the adversary precomputes a look-up table of values used to crack encryption or passwords. See also dictionary attack.

primality testing - A test that determines, with varying degree of probability, whether or not a particular number is prime.

prime factor - A prime number that is a factor of another number is called a prime factor of that number.

prime number - Any integer greater than 1 that is divisible only by 1 and itself.

privacy - The state or quality of being secluded from the view and or presence of others.

private exponent - The private key in the RSA public-key cryptosystem.

private key - In public-key cryptography, this key is the secret key. It is primarily used for decryption but is also used for encryption with digital signatures.

proactive security - A property of a cryptographic protocol or structure which minimizes potential security compromises by refreshing a shared key or secret.

probabilistic signature scheme (PSS) - A provably secure way of creating signatures using the RSA algorithm.

protocol - A series of steps that two or more parties agree upon to complete a task.

provably secure - A property of a digital signature scheme stating that it is provably secure if its security can be ties closely to that of the cryptosystem involved. See also digital signature scheme.

pseudorandom number - A number extracted from a pseudorandom sequence.

pseudorandom sequence - A deterministic function which produces a sequence of bits with qualities similar to that of a truly random sequence.

PSS - See probabilistic signature scheme.

public exponent - The public key in the RSA public-key cryptosystem.

public key - The public-key cryptography this key is make public to all, it is primarily used for encryption but can be used for verifying signatures.

public-key cryptography - Cryptography based on methods involving a public key and a private key.

quadratic sieve - A method of factoring an integer, developed by Carl Pomerance.

RSA algorithm - A public-key cryptosystem based on the factoring problem. RSA stands for Rivest, Shamir and Adleman, the developers of the RSA public-key cryptosystem and the founders of RSA Data Security, Inc.

random number - As opposed to a pseudorandom number, a truly random number is a number produced independently of its generating criteria. For cryptographic purposed, numbers based on physical measurements, such as a Geiger counter, are considered random.

reduced keyspace - When using an n bit key, some implementations may only use r <n bits of the key; the result is a smaller (reduced) key space.

relatively prime - Two integers are relatively prime if they have no common factors, e.g., (14, 25).

reverse engineer - To ascertain the functional basis of something by taking it apart and studying how it works.

rounds - The number of times a function, called a round function, is applied to a block in a Feistel cipher.