| Asymmetric Encryption |
Encryption were the message is encrypted and decrypted using a pair of keys.
|
| Certificate |
A digitally signed statement that contains information about an entity and the
entity's public key, thus binding these two pieces of information together.
|
| Certificate Authority (CA) |
An entity entrusted to issue certificates asserting that the recipient
individual, machine or organization requesting the certificate fulfills the
conditions of an established policy.
|
| Cipher-Text |
Text which has been encrypted.
|
| Cipher |
A cryptographic system in which units of plain text of regular length, usually
letters, are arbitrarily transposed or substituted according to a predetermined
code.
|
| Cryptography |
A study of techniques and applications of encryption.
|
| Decrypt |
To decipher or decode a message.
|
| Digital Signature |
The digital equivalent of an authentic, handwritten signature.
|
| Encrypt |
To alter (a file, for example) using a secret code so as to be unintelligible
to unauthorized parties.
|
| GCHQ |
Government Communications Headquarters.
http://www.gchq.gov.uk/
|
| MIT |
Massachusetts Institute of Technology.
http://web.mit.edu/
|
| NSE |
Non Secret Encryption.
|
| PKE |
See Public Key Encryption |
| Pretty Good Privacy (PGP) |
A program, developed by Phil Zimmerman, that uses cryptography to protect files
and electronic mail from being read by others.
|
| Private Key |
In Public Key Encryption, this key is kept private.
|
| Public Key |
In Public Key Encryption, this key is made available.
|
| Public Key Encryption |
An asymetric method of encoding data where one of the keys is made public and
the other is kept private.
|
| Quantum Computer |
An immensely powerful computer that exploits quantum theory, in particular the
theory that an object can be in many states at once.
|
| Qubit |
A quantum bit.
|
| RSA |
An encryption and authentication system that uses an algorithm developed in
1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.
|
| Secure Shell |
A completely encrypted shell connection between two machines.
|
| Secure Sockets Layer (SSL) |
The Secure Sockets Layer (SSL) protocol is a strong authentication system which
provides confidentiality, integrity, and optionally authentication at the
transport level.
|
| S-HTTP |
An extension to HTTP which allows secure (encrypted) data transmissions over
the world wide web.
|
| Symmetric Encryption |
Encryption were the message is encrypted and decrypted using the same key.
|
| Verisign |
A leading provider of Public Key Infrastructure.
http://verisign.com/
|