CZ:Security Subgroup
Jump to navigation
Jump to search
|
| ||||||||
| Main article | Home | Talk | All articles (155) | Citable (2) | Members (2) | Recent changes | ||
| Affiliation: Computers (Recent changes)| Military (Recent changes)| Engineering (Recent changes)| [ e ] | ||||||||
Using R template
- Government Communications Headquarters [r]: The British government agency responsible for signals intelligence and information assurance [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher) [r]: A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence [r]: the practice of acquiring information through monitoring the electromagnetic signals deliberately trasmitted by an opponent, including communications (COMINT) and non-communications electronics such as radar (ELINT). [e]
- International Data Encryption Algorithm [r]: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture [r]: A structure and set of abstract techniques for implementing various security features, according to the requirements of a specific security policy, in Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) [e]
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
Using Rpl template
Government Communications Headquarters: The British government agency responsible for signals intelligence and information assurance [e]
Hash (cryptography): An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
Hashed message authentication code: A technique for authenticating a message using a hash function and a secret key. [e]
Hasty Pudding (cipher): A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
Hybrid cryptosystem: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
Information assurance: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
Signals intelligence: the practice of acquiring information through monitoring the electromagnetic signals deliberately trasmitted by an opponent, including communications (COMINT) and non-communications electronics such as radar (ELINT). [e]
International Data Encryption Algorithm: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
Internet Protocol security architecture: A structure and set of abstract techniques for implementing various security features, according to the requirements of a specific security policy, in Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) [e]
IPsec: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]