apsec.de

Website:https://www.apsec.de/de/startseite/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (15)

1

0 Thumbs up   0 Thumbs down

aes


Advanced Encryption Standard. Symmetric encryption algorithm specified by NIST in FIPS 197. As the result of a public evaluation, AES was declared the official encryption standard in the year 2001. It [..]
Source: apsec.de

2

0 Thumbs up   0 Thumbs down

authentication


The term authentication is used to describe a procedure used by the participants of a communication in order to prove to each other that their participation is legitimate. An example for an authentica [..]
Source: apsec.de

3

0 Thumbs up   0 Thumbs down

ca


Certification Authority. Within a PKI, the CA is responsible for issuing digital certificates. See also: wikipedia: Certificate Authority
Source: apsec.de

4

0 Thumbs up   0 Thumbs down

certificate


Digital proof that a certain public key (see asymmetric encryption) belongs to a specified entity, e.g. a person or organization. Certificates are usually issued by a trusted third party, a so-called [..]
Source: apsec.de

5

0 Thumbs up   0 Thumbs down

crl


Certificate Revocation List. Blacklist with the serial numbers of revoked certificates. A CRL is usually generated by a CA and then published. It refers to certificates issued by this CA.
Source: apsec.de

6

0 Thumbs up   0 Thumbs down

data leakage prevention


Collective term for a combination of techniques for the prevention of unwanted data leakage. Among the techniques for Data Leakage Prevention are for example encryption, content filtering, mobile devi [..]
Source: apsec.de

7

0 Thumbs up   0 Thumbs down

fips


Federal Information Processing Standards. Series of publications edited by NIST which US industrial norms concerning information processing and information security are specified. Further information [..]
Source: apsec.de

8

0 Thumbs up   0 Thumbs down

hash algorithm


A hash algorithm resp. a hash function maps blocks of data of arbitrary length to blocks of a fixed length. The result of a hash algorithm using a cryptographic hash function is also called a digital [..]
Source: apsec.de

9

0 Thumbs up   0 Thumbs down

key length


In encryption technology, the bit length of a cryptographic key indicates the size of the so-called key space. The key space of an encryption algorithm with key length n consists of 2n cryptographic k [..]
Source: apsec.de

10

0 Thumbs up   0 Thumbs down

nist


National Institute for Standards and Technology. US American institute responsible for defining industrial standards, comparable to the German DIN institute.
Source: apsec.de


To view all 15 definitions, please sign in.