Glossary

A B C D E F G H I J K L M N Ñ O P Q R S T U V W X Y Z
A
Access Control
Security mechanisms that regulate and restrict user or system access to resources based on predefined policies, ensuring only authorized entities can perform specific actions.
Access Control List (ACL)
A list of permissions attached to an object, specifying which users or systems can access the object and what operations they can perform.
Advanced Encryption Standard (AES)
A symmetric encryption algorithm established by NIST that uses fixed block sizes and key lengths of 128, 192, or 256 bits to encrypt data securely. Widely used in modern cryptography for its efficiency and strong security against brute-force attacks.
Algorithm
A step-by-step procedure or set of rules used to perform a computation or solve a problem, forming the foundation of cryptographic operations like encryption, hashing, and key generation.
Algorithmic Randomness
Randomness produced by an algorithm, such as in PRNGs while appearing random, it is ultimately deterministic.
ANonce
A unique value used once in cryptographic protocols, typically to prevent replay attacks by ensuring that each message or transaction is unique.
Application Specific Integrated Circuit (ASIC)
A custom-designed hardware circuit optimized for a specific application, often used in cryptographic operations for faster processing.
Asymmetric Key (Public Key) Cryptography
A cryptographic system that uses a pair of keys—a public key for encryption or verification and a private key for decryption or signing. The public key can be shared openly, while the private key remains secret, enabling secure communication and authentication without prior key sharing.
Attribute-Based Encryption (ABE)
A form of public-key encryption where the encryption and decryption keys are based on attributes, providing fine-grained access control over encrypted data.
Authenticated Encryption (AE)
A form of encryption that simultaneously provides confidentiality, integrity, and authenticity of the data, preventing unauthorized modifications.
Authentication
The process of verifying the identity of a user, device, or system, typically through credentials such as passwords, biometrics, or cryptographic keys.
Authorization
The process of granting or denying access to resources based on the verified identity and permissions of the user or system.
Availability
The principle that ensures that information and resources are accessible and usable when needed, protecting against disruptions or downtime.
B
Bell Inequality
A concept demonstrating that certain predictions of quantum mechanics are incompatible with local hidden variable theories, validating quantum entanglement.
Bell-LaPadula Model
A security model that focuses on data confidentiality, enforcing rules that prevent unauthorized access by specifying no read up (Simple Security Property) and no write down (Star Property).
Biba Model
A security model focused on data integrity, ensuring that unauthorized users cannot modify data and enforcing rules like no write up and no read down.
Block Cipher
A symmetric encryption algorithm that processes data in fixed-size blocks (e.g., 128 bits), applying a series of transformations using a secret key to encrypt or decrypt each block.
Block Cipher Mode of Operation
Techniques used to apply block ciphers to larger data sets by altering how blocks are chained or processed, such as ECB, CBC, or CTR modes.
Brute Force Attack
A method of cryptanalysis where all possible key combinations are tried until the correct one is found, typically used to break weak encryption systems.
C
CAVS (Cryptographic Algorithm Validation System)
A testing system used to validate cryptographic algorithms against established standards.
Certificate Authority (CA)
An entity responsible for issuing and managing digital certificates, verifying the identity of entities, and ensuring secure communication in a public key infrastructure (PKI).
Certificate Policy (CP)
A document that defines the rules and practices for managing certificates within a specific domain, outlining the scope and security requirements for their use.
Certificate Practice Statement (CPS)
A document that provides detailed information about the practices followed by a certificate authority (CA) in issuing and managing certificates.
Certificate Revocation List (CRL)
A list maintained by a certificate authority (CA) containing the serial numbers of certificates that have been revoked before their expiration date.
Chain of Trust
A hierarchical structure in which each certificate is signed by a trusted entity, starting from a trusted root certificate authority (CA) down to the leaf certificates.
Chief Information Officer
An executive responsible for managing an organization's IT strategy, infrastructure, and technology operations.
Chief Information Security Officer
A senior executive overseeing an organization's information security program, including policies, technologies, and incident response.
Chief Product Security Officer
A role focused on ensuring the security of a company's products, addressing vulnerabilities, and aligning product development with security best practices.
Chosen-Ciphertext Attack (CCA)
A type of attack where the attacker can choose a ciphertext and obtain its corresponding plaintext, attempting to break the encryption scheme.
Chosen-Plaintext Attack (CPA)
A type of attack where the attacker can choose arbitrary plaintexts and obtain their corresponding ciphertexts, aiming to discover weaknesses in the encryption algorithm.
Cipher
A method or algorithm used for encrypting and decrypting data, often involving a key for secure transformation between plaintext and ciphertext.
Cipher Block Chaining (CBC)
A block cipher mode of operation where each ciphertext block is XORed with the next plaintext block before encryption, enhancing security by introducing dependency between blocks.
Cipher Feedback (CFB)
A mode of operation for block ciphers that turns a block cipher into a stream cipher, using previous ciphertext blocks to generate the key for the next encryption.
Ciphertext
The encrypted output produced by applying a cryptographic algorithm to plaintext data, making it unreadable without the decryption key.
Code-Based Cryptography
A type of cryptographic system based on error-correcting codes, offering security against quantum computing attacks by relying on hard problems in coding theory.
Coherence
A property of waves that enables stationary (i.e., temporally and spatially constant) interference patterns, crucial for maintaining quantum states.
Collision Resistance
The property of a cryptographic hash function that ensures it is computationally infeasible to find two different inputs that produce the same hash value.
Common Criteria (CC)
An international standard for evaluating the security of IT products, ensuring they meet a set of agreed-upon security requirements.
Confidentiality
The principle of protecting information from unauthorized access, ensuring that sensitive data is only accessible to authorized entities.
Confusion and Diffusion
Principles in cryptography used to make the relationship between the plaintext and ciphertext more complex and to spread the influence of each input bit over many output bits, enhancing security.
Controlled Cryptographic Item (CCI)
Secure cryptographic hardware or software requiring special handling and access control measures.
Cryptanalysis
The study and practice of breaking cryptographic systems and algorithms to discover weaknesses or retrieve the secret key.
Cryptographic Accelerator
A hardware device designed to speed up cryptographic operations, such as encryption and hashing.
Cryptographic alarm
A security mechanism that signals unauthorized access or tampering with cryptographic processes or systems.
Cryptographic Algorithm
A mathematical procedure used to encrypt or decrypt data, ensuring security functions like confidentiality, authentication, or integrity.
Cryptographic Algorithm Validation Program (CAVP)
A program for testing and validating cryptographic algorithms to ensure compliance with security standards.
Cryptographic ancillary equipment (crypto-ancillary equipment)
Devices or tools that support cryptographic systems without directly performing encryption or decryption.
Cryptographic and Security Testing
A modern cryptographic framework provided by Microsoft for developers to implement cryptographic services.
Cryptographic and Security Testing Laboratory
Facilities authorized to assess the security and compliance of cryptographic modules and applications.
Cryptographic API: Next Generation
A modern cryptographic framework provided by Microsoft for developers to implement cryptographic services.
Cryptographic application
A software or hardware solution implementing cryptographic techniques to secure data and communications.
Cryptographic Application Programming Interface
Interfaces enabling developers to integrate cryptographic functions into software or systems.
Cryptographic Authenticator
A mechanism used to verify the authenticity of an entity using cryptographic techniques.
Cryptographic Binding
The association of two or more cryptographic elements to ensure secure relationships or operations.
Cryptographic Boundary
The defined perimeter within which all cryptographic processes and components operate securely.
Cryptographic Checksum
A value generated using a cryptographic hash function to ensure data integrity and detect tampering.
Cryptographic Component
An individual part of a cryptographic system, such as keys, algorithms, or modules, contributing to secure operations.
Cryptographic Device
Hardware designed to perform cryptographic operations like encryption, decryption, or key management.
Cryptographic equipment (cryptoequipment)
Machines or devices specifically built for secure communication using cryptographic techniques.
Cryptographic Erase
A method of securely deleting data by erasing the cryptographic key used to encrypt it, making the data irrecoverable even if the storage medium remains intact.
Cryptographic function
A mathematical operation used within cryptography to achieve objectives like encryption, hashing, or key generation.
Cryptographic Hash Function
A function that takes an input and produces a fixed-size string of characters, typically a hash, which is difficult to reverse or find collisions for.
Cryptographic Hash Value
The output produced by applying a hash function to data, used for integrity verification and digital signatures.
Cryptographic High Value Product (CHVP)
Critical cryptographic equipment or component with significant security implications, requiring strict protection.
Cryptographic Ignition Key
A physical or logical key used to activate or enable cryptographic functions in a secure system.
Cryptographic incident
An event involving the compromise, misuse, or failure of cryptographic systems or keys.
Cryptographic initialization
The setup process for cryptographic systems, including key generation, system configuration, and protocol activation.
Cryptographic Key
A piece of information that determines the functional output of a cryptographic algorithm, used for encryption and decryption.
Cryptographic key component
A piece of information or a data fragment used to create or reconstruct a cryptographic key.
Cryptographic Key Infrastructure (CKI)
A framework for managing cryptographic keys used in encryption, digital signatures, and other security functions, ensuring proper key generation, storage, and distribution.
Cryptographic Key Management System Practice Statement
A detailed document outlining the operational and procedural controls for managing cryptographic keys within a key management system.
Cryptographic Key Management System Security Policy
A formal policy defining the security measures and requirements for managing cryptographic keys within an organization or system.
Cryptographic keying relationship
The association between cryptographic entities that share or use specific keys to secure communication or operations.
Cryptographic logic
The mathematical and logical operations that underlie cryptographic algorithms and mechanisms.
Cryptographic material (cryptomaterial)
Data or components used in cryptographic operations, including keys, algorithms, and initialization vectors.
Cryptographic mechanism
A tool or protocol that implements cryptographic algorithms to secure information or communication.
Cryptographic Message Syntax
A standard syntax for cryptographically protecting messages, commonly used in secure email and data exchange.
Cryptographic Module
A hardware or software component that implements cryptographic algorithms and functions, ensuring secure key management and data protection.
Cryptographic Module Security Policy
A document specifying the security features, requirements, and operational environment of a cryptographic module.
Cryptographic Module Validation Program
A program that tests and validates cryptographic modules to ensure they meet specific security standards.
Cryptographic Module Validation Program (CMVP)
A program that evaluates and certifies cryptographic modules against security standards, ensuring they meet requirements for data protection.
Cryptographic Modules User Forum
A collaborative platform where users and developers discuss cryptographic modules, standards, and best practices.
Cryptographic net (cryptonet)
A network of users or devices that share a common cryptographic key for secure communication.
Cryptographic Officer
A designated individual responsible for managing cryptographic systems, policies, and keys within an organization.
Cryptographic Operation
An action involving cryptographic techniques, such as encryption, decryption, signing, or hashing.
Cryptographic Period (cryptoperiod)
The time during which a cryptographic key is valid and in use, after which it must be replaced or renewed.
Cryptographic Primitive
A basic building block or function used to develop cryptographic protocols, such as hashing or encryption.
Cryptographic Product
Hardware, software, or firmware that implements cryptographic functions for securing data.
Cryptographic Randomization
The process of introducing randomness into cryptographic operations to strengthen security.
Cryptographic Salt
A random value added to data before hashing to ensure unique hash values even for identical inputs
Cryptographic Security (cryptosecurity)
Measures and practices that ensure the confidentiality, integrity, and authenticity of information through cryptography.
Cryptographic Service
A service provided to perform cryptographic operations like encryption, key management, or authentication.
Cryptographic Solution
A combination of cryptographic methods and tools designed to address specific security challenges.
Cryptographic Synchronization
The process of aligning cryptographic operations between entities to ensure secure communication.
Cryptographic System (cryptosystem)
A structured framework that combines cryptographic algorithms, protocols, and keys to secure information.
Cryptographic system evaluation
A detailed review of a cryptographic system to verify its compliance with security standards and requirements.
Cryptographic System Review
An ongoing process to assess the effectiveness and integrity of cryptographic systems.
Cryptographic System Survey
A comprehensive investigation into cryptographic systems to understand their architecture, use, and security level.
Cryptographic Technology Group
A team or organization specializing in the development and implementation of cryptographic technologies.
Cryptographic token
A physical or virtual object that securely stores cryptographic keys or performs cryptographic operations.
Cryptographic Validation Program
An initiative or system that certifies cryptographic tools and systems for compliance with security standards.
Cryptography
The practice of securing information by transforming it into an unreadable format, only decipherable by those possessing a secret key.
CTR_DRBG (Counter Mode Deterministic Random Bit Generator)
A deterministic random bit generator using counter mode for generating cryptographic-quality randomness.
D
C/C++
Low-level programming languages known for their performance and control over hardware, frequently used for developing cryptographic libraries and systems requiring high efficiency.
Data Encryption Key (DEK)
A key used for encrypting user data, distinct from keys used for encrypting other cryptographic keys, such as a key encryption key.
Read more
Data Encryption Standard (DES)
A symmetric-key block cipher that was widely used for encryption but is now considered insecure due to its short 56-bit key length.
Data Integrity
The assurance that data has not been altered or destroyed in an unauthorized manner, maintaining its accuracy and consistency over its lifecycle.
Read more
Decisional Diffie-Hellman (DDH) Assumption
A computational hardness assumption in cryptography that makes it difficult to distinguish between a Diffie-Hellman tuple and a random tuple, ensuring security in certain cryptographic protocols.
Determinism
The philosophical concept that all events are determined completely by previously existing causes in RNGs, it refers to predictable outputs.
Deterministic Random Bit Generator (DRBG)
A random bit generator that produces a predictable sequence of random numbers based on a seed, commonly used in cryptographic applications requiring reproducible outputs.
Differential Cryptanalysis
A technique of cryptanalysis that studies the effect of specific differences in plaintext pairs on the resulting differences in ciphertext pairs, primarily used on block ciphers.
Diffie-Hellman Key Exchange
A cryptographic method used to securely exchange cryptographic keys over a public channel
Digital Certificate
An electronic document used to prove the ownership of a public key, issued by a certificate authority (CA) to validate identity and enable secure communication.
Digital Signature
A cryptographic value that verifies the authenticity and integrity of a message, software, or digital document, ensuring it was generated by the stated sender and has not been altered.
Digital Signature
A cryptographic technique used to verify the authenticity and integrity of digital messages or documents. It ensures that the message was created by the stated sender and has not been tampered with during transmission.
Digital Signature Algorithm (DSA)
A Federal Information Processing Standard (FIPS) used to generate digital signatures, ensuring the authenticity and integrity of digital messages or documents.
Discrete Logarithm Problem (DLP)
The problem of determining the exponent in an equation of the form gxmodp=yg^x \mod p = ygxmodp=y, considered hard and foundational to the security of various cryptographic algorithms.
Discretionary Access Control (DAC)
An access control model where the owner of the resource has the ability to determine who can access the resource and what actions they can perform.
DRBG mechanism
A system used to generate random numbers or bits in a deterministic manner for cryptographic purposes, ensuring repeatability while maintaining security.
DRBG Mechanism Boundary
The limits or scope within which a deterministic random bit generator operates, often referring to its initialization, state transitions, and output generation.
Dual_EC_DRBG
A deterministic random bit generator based on elliptic curve cryptography, which has been controversial due to concerns of potential backdoors.
E
Electronic Codebook (ECB)
A mode of operation for block ciphers where each block of plaintext is encrypted independently, making it vulnerable to certain attacks like pattern analysis.
Electronic Noise
Unwanted disturbances superimposed on a useful signal in electronic circuits, arising from various sources like thermal agitation.
Elliptic Curve Cryptography (ECC)
A public key cryptography system based on the algebraic structure of elliptic curves over finite fields, offering high security with smaller key sizes compared to other methods like RSA.
Elliptic Curve Diffie-Hellman (ECDH)
A key exchange protocol based on elliptic curve cryptography, allowing two parties to securely share a secret key over an insecure channel.
Elliptic Curve Digital Signature Algorithm (ECDSA)
A digital signature algorithm using elliptic curve cryptography to create and verify signatures, providing strong security with smaller key sizes.
Elliptic Curve Integrated Encryption Scheme (ECIES)
A public key encryption scheme combining elliptic curve cryptography with symmetric encryption to provide both confidentiality and authenticity.
Entropy
A measure of uncertainty or randomness in a system, crucial in cryptography for ensuring the unpredictability of keys.
Read more
Entropy as a Service (EaaS)
A cloud-based service that provides high-quality entropy (randomness) to applications requiring secure, unpredictable random numbers for cryptographic processes, key generation, or other security protocols. By leveraging physical sources of randomness, EaaS ensures that the entropy provided meets stringent standards for cryptographic use, offering a reliable and scalable solution for organizations needing robust randomness without managing their own hardware solutions.
Entropy Input
The source of randomness used to initialize or seed a random bit generator, ensuring that the generated random numbers are unpredictable and secure.
Entropy Rate
The measure of the amount of randomness or uncertainty produced per unit time in a random source, typically quantified in bits per second.
Entropy Source
A physical process or mechanism providing randomness for generating random numbers, essential for cryptographic applications.
F
Federal Cryptographic Key Management System
A system used by U.S. federal agencies for managing cryptographic keys, ensuring the secure generation, storage, and handling of keys in compliance with FIPS and other security standards.
Federal Information Processing Standards (FIPS)
A set of publicly recognized standards developed by the U.S. government for use in federal agencies and contractors. FIPS cover various aspects of computing, including cryptography, security, and data integrity, ensuring compliance with strict security requirements for protecting sensitive data.
Forward Secrecy
A property of secure communication protocols ensuring that session keys used for encryption are not compromised, even if the server's long-term private key is later exposed. This guarantees that past communications remain secure.
Fresh Entropy
Randomness or entropy that is continuously generated from a reliable, unpredictable source to ensure that cryptographic systems maintain secure and unpredictable key material over time.
G
Galois/Counter Mode (GCM)
A mode of operation for symmetric key block ciphers that combines counter-mode encryption with the Galois mode of authentication, offering both confidentiality and integrity. It is widely used in network protocols for secure data transmission due to its efficiency and parallelizable operations.
H
Hardware Random Number Generator (HRNG)
A device that generates random numbers using physical phenomena, such as electronic noise or quantum effects, rather than algorithms.
Hash Function
A mathematical algorithm that maps data of arbitrary size to fixed-size values, often used in randomness extraction to process raw entropy.
Hash_DRBG
A deterministic random bit generator that uses a cryptographic hash function as its core mechanism to produce secure random values for cryptographic applications.
Hash-Based Message Authentication Code (HMAC)
A cryptographic function that combines a hash function with a secret key to provide message integrity and authentication. HMAC ensures the authenticity of both the message and the sender.
Hash-Based Signature
A digital signature scheme based on hash functions, where the signature is generated by applying a hash function to the message and signing the resulting hash, providing a secure way of verifying message authenticity.
Heisenberg Uncertainty Principle
A fundamental theory stating that certain pairs of physical properties, like position and momentum, cannot both be known to arbitrary precision simultaneously.
HMAC_DRBG
A deterministic random bit generator that uses HMAC (Hash-Based Message Authentication Code) as the core mechanism for producing random values, ensuring secure and reliable randomness for cryptographic purposes.
High Frecuency Trading (HFT)
A form of algorithmic trading that executes large volumes of transactions at extremely high speeds, often within microseconds, leveraging advanced technology to capitalize on market inefficiencies.
Read more
Homomorphic Encryption
A form of encryption that allows computations to be performed on ciphertexts, producing encrypted results that, when decrypted, match the result of the operations as if they had been performed on the plaintext. This allows secure processing of encrypted data.
Hybrid Cryptosystem
A cryptographic system that combines both asymmetric and symmetric encryption techniques to take advantage of the benefits of each. Asymmetric encryption is used to exchange symmetric keys, which are then used for encrypting the actual data.
I
Identity-Based Encryption (IBE)
A public key encryption scheme where the public key can be derived from an individual's identity, such as their email address, simplifying key management and avoiding the need for traditional certificates.
Information-Theoretic Security
A level of security where the system is secure against any computational attack, including attacks by quantum computers, based solely on mathematical and statistical principles, not on the hardness of problems.
Initialization Vector (IV)
A random or pseudo-random value used in encryption algorithms to ensure that identical plaintexts produce different ciphertexts each time they are encrypted, preventing patterns from emerging in the ciphertext.
International Cryptographic Module Conference
An event focused on the development, evaluation, and application of cryptographic modules, where cryptographic experts, industry professionals, and regulatory bodies meet to discuss advancements and standards in cryptographic technology.
IPSec
A suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a communication session, providing confidentiality, integrity, and authenticity.
Isogeny-Based Cryptography
A branch of cryptography based on the hardness of solving problems related to elliptic curve isogenies, which are transformations between elliptic curves. It is considered a promising alternative to traditional cryptography in post-quantum settings.
K
Key Agreement
A cryptographic protocol in which two parties exchange information to securely establish a shared secret key, which can then be used for encryption or authentication without directly transmitting the key over the network.
Key Confirmation
A mechanism used to verify that both parties in a cryptographic communication session share the same key, often used in protocols like Diffie-Hellman to prevent man-in-the-middle attacks.
Key Derivation Function (KDF)
A cryptographic function that derives one or more secret keys from a common shared secret or master key
Key Device Cybersecurity Requirement
The standards and guidelines that govern the security of devices used to generate, store, or manage cryptographic keys, ensuring that the devices are resistant to attacks and vulnerabilities.
Key Distribution
The process of securely sharing cryptographic keys between parties to enable encrypted communication. Effective key distribution ensures that only authorized participants have access to the keys, safeguarding the confidentiality and integrity of the communication.
Key Distribution Center (KDC)
A trusted entity that facilitates secure key exchange between communicating parties in a network, typically used in symmetric encryption systems like Kerberos to distribute session keys.
Key Encapsulation Mechanism (KEM)
A cryptographic technique used in public key encryption, where a key is encapsulated in a ciphertext and sent to the recipient. The recipient can then decapsulate it to obtain the key for symmetric encryption, often used in hybrid cryptosystems.
Key Escrow
A system where cryptographic keys are stored by a third party, allowing for recovery if the original key is lost or compromised. Key escrow is typically used in compliance and regulatory scenarios.
Key Establishment
The process of securely generating and agreeing on a cryptographic key between two parties, ensuring the key is secret and cannot be intercepted or compromised by attackers.
Key Expansion
The process of deriving multiple keys from a single secret key or master key, typically used in symmetric encryption algorithms like AES, where a key schedule is created for different rounds of encryption.
Key Generation
The process of creating cryptographic keys, typically involving the use of random or pseudo-random numbers and ensuring that the keys are suitable for secure encryption or authentication operations.
Key Management
The process of generating, storing, distributing, and handling cryptographic keys securely throughout their lifecycle, ensuring their confidentiality, integrity, and availability for cryptographic operations.
Key Pair
A set of two cryptographic keys: a public key, which can be shared openly, and a private key, which is kept secret and used for signing or decrypting data.
Key Recovery
The process of retrieving a lost or compromised cryptographic key, often facilitated by a key escrow system or backup, ensuring access to encrypted data is maintained.
Key Schedule
The procedure in symmetric-key cryptography that generates a series of round keys from a single master key, typically used in block cipher algorithms like AES to prepare for multiple rounds of encryption.
Key Wrapping
A process of encrypting one key (usually a data encryption key) using another key (often a key encryption key), ensuring the security of the encapsulated key during storage or transmission.
L
Lattice-Based Cryptography
A type of post-quantum cryptography relying on the hardness of mathematical problems in lattice structures, offering security against both classical and quantum attacks.
Level 4 Entropy source
The highest standard for entropy generation, ensuring maximum randomness and unpredictability, essential for critical cryptographic applications.
Read more
Level 4 RNG
A random number generator compliant with the highest security standards, ensuring superior randomness and resistance to statistical attacks, often used in quantum-safe cryptography.
Read more
Lightweight Cryptography
Cryptographic algorithms optimized for devices with limited computational resources, such as IoT devices, ensuring secure communication with minimal power and processing requirements.
Live Entropy Source
A continuously available and dynamic entropy source providing real-time randomness for cryptographic operations, ensuring secure key generation and encryption.
M
Machine Learning
A branch of artificial intelligence where algorithms learn patterns from data to make predictions or decisions without being explicitly programmed, improving performance over time with more data.
Read more
Man-in-the-Middle Attack
A cyberattack where a malicious actor intercepts and potentially alters communication between two parties without their knowledge.
Measurement in Quantum Mechanics
The act of observing a quantum system, causing the system to collapse into one of its eigenstates, thereby affecting the system's state.
Message Authentication Code (MAC)
A cryptographic value generated by a secret key and a message, used to verify the authenticity and integrity of the message.
Message Digest
A fixed-length hash value produced from an input message, ensuring data integrity by detecting changes in the original message.
Min-entropy
The measure of the uncertainty of the most predictable outcome in a random variable, often used to evaluate the quality of entropy sources in cryptography.
Monte Carlo Simulation
A computational algorithm that relies on repeated random sampling to obtain numerical results, often used in physical and mathematical problems.
Read more
Multi-Factor Authentication (MFA)
A security measure requiring multiple forms of verification (e.g., password, biometric, and a device) to grant access, increasing resistance to unauthorized access.
Multivariate Polynomial Cryptography
A type of post-quantum cryptography based on the difficulty of solving systems of multivariate polynomial equations, resistant to quantum computing attacks.
N
NIST Tests
A suite of statistical tests developed by the National Institute of Standards and Technology to evaluate the randomness of binary sequences.
No-Cloning Theorem
A principle stating that it is impossible to create an identical copy of an arbitrary unknown quantum state, ensuring security in quantum communication.
Nonce
A unique, one-time-use random or pseudo-random value used in cryptographic protocols to prevent replay attacks.
Non-Determinism
The concept that events are not caused deterministically, allowing for randomness and unpredictability, as observed in quantum phenomena.
Non-Deterministic Random Bit Generator (NDRBG)
A type of RNG that produces unpredictable random bits using a source of entropy, critical for secure cryptographic operations.
O
Observer Effect
The theory that simply observing a situation or phenomenon necessarily changes that phenomenon, especially pertinent in quantum mechanics.
One-Time Pad
An encryption technique where a random key, used only once, is combined with the plaintext, achieving theoretically unbreakable security.
One-Way Function
A function that is easy to compute but infeasible to reverse, forming the basis for many cryptographic algorithms.
OpenSSL
A widely used open-source toolkit for implementing Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, along with cryptographic functions.
P
Password-Based Key Derivation Function (PBKDF)
A method to derive cryptographic keys from passwords, incorporating salts and iterations to resist brute-force attacks.
Phase Diffusion
The random fluctuation of the phase of a quantum system over time, often observed in lasers due to spontaneous emission events, affecting coherence.
Photon Detection
The process of measuring and detecting photons, essential in optical QRNGs to observe quantum events and generate random numbers.
Photonic
Related to the generation, manipulation, and transmission of light (photons), often used in advanced technologies like optical communications, sensors, and quantum computing.
Photonic Integration
The combination of multiple photonic components, such as lasers and modulators, onto a single chip to enable compact, efficient, and high-performance optical systems for communications, sensing, and computing.
Read more
Physical Randomness
Randomness derived from physical processes, considered truly random due to inherent unpredictability at the quantum level.
PKCS#11
A widely used cryptographic standard, also known as Cryptographic Token Interface Standard, defining a platform-independent API for managing cryptographic tokens such as hardware security modules (HSMs) and smart cards. It enables operations like key generation, encryption, decryption, and digital signing.
Platform Root of Trust
The foundation of trust in a platform, typically a secure hardware component that authenticates firmware and ensures system integrity.
Platform Security Architecture
A framework or design blueprint for securing a platform, often incorporating hardware and software mechanisms.
Post-Quantum Cryptography
It's a set of cryptographic algorithms designed to ensure data confidentiality, authenticity, and security against attacks by quantum computers. These algorithms rely on mathematical principles that are resistant to both classical and quantum computing attacks and require high-quality entropy sources to generate unpredictable and robust keys. They are essential for safeguarding global cybersecurity infrastructure against the imminent threat posed by quantum computing to current cryptographic systems.
Read more
Post-quantum Pre-shared Key
A cryptographic key pre-shared between parties, designed to resist quantum computing attacks.
PQCrypto
An abbreviation for post-quantum cryptography, the study and development of cryptographic algorithms secure against quantum attacks.
Private Key
A secret cryptographic key used in asymmetric cryptography to decrypt messages or create digital signatures.
Private Key Infrastructure
A system for managing, distributing, and securing private keys used in cryptographic operations.
Private key/private signature key
A private key specifically used for generating digital signatures in cryptographic systems.
Probability Distribution
A mathematical function that provides the probabilities of occurrence of different possible outcomes in an experiment.
Proof Key for Code Exchange (PKCE)
A security extension for OAuth 2.0 that mitigates interception attacks by binding authorization requests to clients.
ProT
A secure hardware or software anchor that ensures trustworthiness and security in a computing platform.
Protected Storage
A secure area for storing sensitive data, such as cryptographic keys or user credentials, often in a hardware module.
PSA
An acronym that can refer to Platform Security Architecture, often associated with Arm’s security initiatives.
Pseudorandom
Data that appears random but is generated deterministically using an algorithm and a seed value.
Pseudorandom Function (PRF)
A deterministic algorithm that produces pseudorandom outputs based on a secret key and input.
Pseudorandom Key
A key generated using a pseudorandom function, often as part of a key derivation process.
Pseudo-Random Number Generator (PRNG)
An algorithm that generates sequences of numbers that approximate the properties of random numbers but are deterministic.
Read more
Pseudo-Random Permutation
A pseudorandom transformation that maps a set of inputs to outputs, commonly used in symmetric encryption.
Public Key
A cryptographic key that can be shared publicly and is used in asymmetric cryptography for encryption or signature verification.
Public Key Certificate
A digital document issued by a trusted authority that binds a public key to the identity of its owner.
Public Key Certificate Standard
A specification, such as X.509, defining the format and structure of digital certificates for public keys.
Public Key Cryptographic Algorithm
An algorithm that uses asymmetric key pairs for encryption, decryption, or digital signatures.
Public Key Cryptography (PKC)
A cryptographic method that uses key pairs—one public and one private—for secure communication and digital signatures.
Public Key Enabling (PKE)
The process of configuring and using public key cryptography within an organization or system.
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public keys, enabling secure network communication and authentication.
Public Key Infrastructure X.509-Certificate Management Protocol
A standard protocol for managing certificates in a public key infrastructure based on X.509 specifications.
Public key/public signature verification key
A public key used to verify digital signatures in asymmetric cryptographic systems.
Public-Key Cryptography
A cryptographic system using key pairs—one public and one private—for secure communication and digital signatures.
Public-Key Encryption
An encryption method using a public key for encrypting data and a private key for decrypting it.
Python
A high-level, interpreted programming language known for its simplicity, readability, and extensive library support, widely used in cryptography, data analysis, and web development.
Read more
Q
Quantum Algorithm
An algorithm that runs on a quantum computer, exploiting quantum superposition and entanglement to process information in ways classical algorithms cannot.
Quantum Bit (Qubit)
The basic unit of quantum information, analogous to a classical bit but capable of being in superpositions of 0 and 1.
Quantum Circuit
A model for quantum computation where a computation is a sequence of quantum gates, representing the evolution of qubits.
Quantum Computing
A type of computing that utilizes quantum bits (qubits) and quantum phenomena to perform operations on data, potentially solving complex problems more efficiently.
Read more
Quantum Cryptography
The application of quantum mechanics principles to perform cryptographic tasks, offering theoretically unbreakable encryption.
Read more
Quantum Entropy
Randomness derived from quantum processes, such as the behavior of particles at the quantum level, providing a high-quality and truly unpredictable source for cryptographic and security applications.
Read more
Quantum Error Correction
Methods used to protect quantum information from errors due to decoherence and other quantum noise.
Quantum Fluctuations
Temporary changes in the amount of energy at a point in space due to the uncertainty principle, leading to the creation of virtual particles.
Quantum Gate
A basic quantum circuit operating on a small number of qubits, analogous to logic gates in classical computing but utilizing quantum properties.
Quantum Key Distribution (QKD)
A secure communication method using quantum mechanics to produce and distribute cryptographic keys, ensuring security based on physical laws.
Read more
Quantum Mechanics
A fundamental theory in physics describing nature at the smallest scales of energy levels of atoms and subatomic particles. It introduces principles like superposition and entanglement, which are crucial for QRNGs.
Quantum Noise
Random fluctuations inherent in quantum systems, arising from the uncertainty principle. Quantum noise serves as an entropy source in QRNGs.
Quantum Random Number Generator (QRNG)
A device that utilizes quantum mechanical processes to generate truly random numbers. QRNGs harness inherent quantum uncertainties, such as photon behavior or quantum vacuum fluctuations, to produce unpredictable results.
Quantum State
The state of a quantum system, representing all its properties and probabilities, typically described by a wavefunction.
Quantum Technology
A field of technology that leverages the principles of quantum mechanics, such as superposition and entanglement, to develop advanced systems for computing, communication, sensing, and cryptography.
Read more
Quantum Threat
The potential risk posed by quantum computers to current cryptographic systems, as they could break widely used encryption algorithms, compromising data confidentiality and security.
Read more
Quantum Tunneling
A quantum phenomenon where particles can pass through a barrier that they classically should not be able to, due to their wave-like properties.
Quantum Resistant Cryptography
Cryptographic methods designed to remain secure against attacks by both classical and quantum computers.
Read more
R
Random Access Memory (RAM)
A volatile memory used for storing data temporarily while a computer is running, enabling fast read and write operations.
Random Binary Sequence
A sequence of binary values (0s and 1s) that exhibit randomness, used in cryptography for secure key generation and randomization.
Random Bit
A single binary value (0 or 1) generated in a manner that appears unpredictable and unbiased.
Random Bit Generator (RBG)
RBG is a system or algorithm that produces sequences of bits that are unpredictable and unbiased, serving as the foundation for generating cryptographic keys, nonces, and other security-critical values. In cryptography, an RBG relies on high-quality entropy sources to ensure the randomness and security of the output, making it essential for protecting data integrity, confidentiality, and resistance to attacks in modern cybersecurity systems.
Random Excursion Test
A statistical test used to evaluate the randomness of a binary sequence, focusing on the number of visits to a particular state during a random walk.
Random Excursion Variant Test
A variation of the Random Excursion Test, examining multiple states in a binary sequence to assess randomness.
Random Field
A mathematical model representing random values assigned to points in a space, often used in probabilistic and statistical models.
Random Forests
An ensemble machine learning method using multiple decision trees to improve prediction accuracy through randomness in feature selection.
Random nonce
A random or pseudo-random value used once in a cryptographic protocol to prevent replay attacks.
Random Number
A number generated in an unpredictable manner, often used in cryptographic processes and statistical sampling.
Random Number Generator (RNG)
A device or algorithm that generates a sequence of numbers that cannot be reasonably predicted better than by random chance.
Random Oracle Model
A theoretical model in cryptography where a hash function is treated as a random function, ensuring unpredictability.
Random Parameter
A variable with randomly chosen values, often used in cryptographic protocols to ensure variability and security.
Random Sampling
The process of selecting a subset of individuals from a statistical population, where each individual is chosen randomly.
Random Value
An unpredictable value used in cryptographic processes, often to enhance security or prevent determinism.
Random Variable
A variable whose possible values are numerical outcomes of a random phenomenon, used in probability and statistics.
Randomized Hashing
A cryptographic hashing technique incorporating random values (e.g., salt) to produce unique outputs for similar inputs.
Randomized Message
A cryptographic message transformed with random elements to prevent predictability and increase security.
Randomizer
A component or algorithm introducing randomness into a process, such as encryption, shuffling, or decision-making.
Randomness
The lack of any predictable pattern or order in a sequence, crucial for generating cryptographic keys and ensuring secure encryption. High-quality randomness improves the security and reliability of cryptographic systems.
Randomness Certification
The process of validating that a random number generator produces sequences meeting specific randomness criteria, often for compliance.
Randomness Extraction
The process of processing raw random data from an entropy source to produce a uniform and unbiased random output.
Randomness Source
A physical or computational origin for generating randomness, such as electronic noise or a cryptographic function.
Randomness Test
Procedures used to assess the randomness of a sequence, ensuring it meets certain statistical criteria for unpredictability.
Ransomware
A type of malicious software that encrypts a victim's data or systems, demanding a ransom payment to restore access, often targeting individuals, organizations, or governments for financial gain.
Read more
Red Hat Enterprise Linux
A commercial Linux distribution widely used in enterprise environments, offering stability, security, and support.
Replay Attack
A cyberattack where a valid transmission is maliciously repeated or delayed, gaining unauthorized access or disrupting communication.
Resource Public Key Infrastructure
A framework for securing internet routing by validating the association between IP address blocks and autonomous systems.
Rest API
A web API that adheres to Representational State Transfer (REST) principles, enabling stateless and standardized communication between clients and servers, often used for secure data exchange in cryptographic systems.
Rivest-Shamir-Adleman (RSA)
A public-key cryptosystem based on the difficulty of factoring large integers, used for secure data transmission.
Root of Trust for Measurement
A secure foundation that verifies the integrity of software and firmware during system startup.
Root of Trust for Reporting
A component ensuring trustworthy reporting of system states or configurations for security assessments.
Root of Trust for Storage
A secure foundation for storing sensitive data, ensuring confidentiality and integrity.
Root of Trust for Update
A mechanism ensuring secure updates of firmware or software components, protecting against tampering.
Root of Trust for Update verification component
A specific element verifying the authenticity and integrity of updates before installation.
Roots of trust
A set of trusted computing elements providing a secure foundation for a platform’s security functions.
RSA
A widely used public-key cryptographic algorithm relying on the difficulty of factoring large integers.
RSA Secret Value Encapsulation (RSASVE)
A mechanism in which RSA is used to securely encapsulate secret values for transmission.
RSA Signature Scheme with Appendix - Probabilistic Signature Scheme (RSASSA-PSS)
A digital signature scheme providing enhanced security using probabilistic padding.
RSA with Optimal Asymmetric Encryption Padding (RSA-OAEP)
A secure encryption scheme using RSA with padding for message confidentiality.
Rust
A modern programming language focusing on performance, memory safety, and concurrency, often used in system-level programming and cryptographic applications.
Read more
S
Salt
A random value added to input data before hashing to prevent dictionary attacks and ensure unique hash outputs.
Secret Key
A single key used in symmetric cryptography to encrypt and decrypt information, shared privately between communicating parties.
Secret Key (Symmetric) Cryptographic Algorithm
An encryption algorithm where a single secret key is used for both encryption and decryption, ensuring data confidentiality.
Secret Key Information
The data related to a secret key, including its type, length, and usage constraints within a cryptographic system.
Secret Keying Material
The actual data representing a secret key used in cryptographic processes, often requiring protection against unauthorized access.
Secret Seed
An initial random value used to generate keys or other cryptographic parameters, critical to ensuring randomness and security.
Secure Channel
A communication pathway that ensures confidentiality, integrity, and authenticity between two endpoints.
Secure Communication
Methods and practices used to protect information exchange from interception and tampering by unauthorized parties.
Secure Communication Protocol
A set of rules governing the secure exchange of information over a network, protecting against threats like eavesdropping or tampering.
Secure Communications
The practice of transmitting information in a way that prevents unauthorized access or alteration during transit.
Secure Communications Interoperability Protocol (SCIP)
A standard ensuring interoperability between secure communication devices, commonly used in government and military applications.
Secure Computing
Practices and technologies designed to ensure secure data processing, including safeguarding systems from attacks or breaches.
Secure Copy Protocol (SCP)
A protocol enabling secure file transfer over a network using SSH for encryption and authentication.
Secure Digital (SD)
A type of non-volatile memory card used for secure storage of data, commonly found in consumer electronics.
Secure Digital eXtended Capacity (SDXC)
An SD card format supporting capacities up to 2 TB and faster data transfer rates compared to standard SD cards.
Secure Digital Music Initiative (SDMI)
A discontinued initiative aimed at developing standards for secure digital music distribution.
Secure DTD2000 System
A system used for secure distribution of cryptographic keys and information within classified environments.
Secure Element
A hardware component designed to securely store sensitive data, such as cryptographic keys or authentication information.
Secure Entry Point
An access point secured with encryption and authentication to control and monitor entry into a system or network.
Secure Erase Command
A command that irreversibly deletes data on storage devices, ensuring that no sensitive information can be recovered.
Secure File Transfer Protocol (SFTP)
A secure version of the FTP protocol that uses SSH for encryption to protect data during transfer.
Secure FTP
An umbrella term for secure file transfer methods like FTPS and SFTP, providing encryption and authentication.
Secure Hash Algorithm (SHA)
A family of cryptographic hash functions used to ensure data integrity by generating fixed-size hash values.
Secure Hash Algorithm 256 (SHA-256)
A cryptographic hash function producing a 256-bit hash value, widely used in blockchain and digital signatures.
Secure Hash Algorithm 256 (SHA-256)
A cryptographic hash function from the SHA-2 family, producing a 256-bit fixed-length output, widely used for data integrity and digital signatures.
Secure Hash Algorithm 3 (SHA-3)
The latest member of the Secure Hash Algorithm family, based on the Keccak cryptographic function, offering enhanced security.
Secure Hash Algorithm 3 (SHA-3)
A cryptographic hash function based on the Keccak algorithm, offering improved security and a different construction compared to SHA-2.
Secure Hash Algorithm Keccak
A cryptographic function selected as the basis for SHA-3, known for its sponge construction method.
Secure Hash Standard
A NIST standard defining secure hash algorithms, such as SHA-1, SHA-2, and SHA-3, for cryptographic applications.
Secure Inter-Domain Routing
A protocol enhancing the security of Internet routing, preventing hijacking or tampering of routing information.
Secure Inter-Domain Routing Working Group
A group within the IETF focusing on developing secure inter-domain routing solutions.
Secure LDAP
A protocol for securely accessing directory services, typically by encrypting LDAP traffic using SSL/TLS.
Secure Messaging
A communication method ensuring messages are encrypted and authenticated to prevent interception or tampering.
Secure Multipurpose Internet Mail Extensions (S/MIME)
A standard for encrypting and digitally signing email messages to ensure confidentiality and authenticity.
Secure Production Identity Framework for Everyone (SPIFFE)
An open standard for securely identifying services across diverse computing environments.
Secure Shell (SSH)
A protocol for secure remote access and file transfers, using encryption to protect data in transit.
Secure Simple Pairing (SSP)
A Bluetooth feature for secure device pairing, combining authentication and encryption during the setup process.
Secure Socket Tunneling Protocol (SSTP)
A protocol for VPNs, using SSL/TLS to encrypt data and ensure secure communication over the Internet.
Secure Sockets Layer (SSL)
A deprecated protocol for securing communication over the internet, replaced by TLS.
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Protocols providing encryption and authentication for secure communication over the Internet, such as HTTPS.
Secure Software Development Framework (SSDF)
A set of best practices for integrating security throughout the software development lifecycle.
Security Assertion Markup Language (SAML)
An XML-based framework for exchanging authentication and authorization data between parties, commonly used in Single Sign-On (SSO).
Security Concept of Operations (Security CONOP)
A high-level document outlining security objectives, procedures, and implementation strategies for an organization's operations.
Security Configuration Management (SecCM)
The process of maintaining the integrity of systems by controlling and documenting their configurations and changes.
Seed (in RNG)
An initial value used to start a pseudo-random number generation process
Seed Key
A cryptographic key used as a base for generating additional keys, often derived from a secure seed.
Session Key
A temporary cryptographic key used for securing a single communication session.
Shot Noise
A type of electronic noise that occurs due to the discrete nature of electric charge, significant in electronic devices at low currents.
Side-Channel Attack
A method of extracting cryptographic keys by analyzing information leakage, such as timing, power consumption, or electromagnetic emissions.
Side-Channel Attack
A method of exploiting information leaked during cryptographic operations, such as timing, power consumption, or electromagnetic emissions.
Single-Photon Source
A device that emits one photon at a time, used in quantum experiments and QRNGs to ensure quantum-level interactions.
SNonce
A session nonce, typically a random number used during cryptographic operations to ensure freshness and prevent replay attacks.
Software-Defined Data Center (SDDC)
A data center architecture where all infrastructure elements, including storage, networking, and computing, are virtualized and managed through software.
Software-Defined Networking (SDN)
A networking approach that uses software-based controllers to manage network resources, separating the control plane from the data plane.
Software-Defined Storage (SDS)
A storage architecture where the storage hardware is abstracted and managed by software, enabling scalability and flexibility.
Source of Randomness
A mechanism or system generating random values required for cryptographic operations like key generation or RNGs.
SP800-22
A NIST special publication providing statistical tests to evaluate the quality of random number generators used in cryptographic systems.
SP800-90-B
A NIST special publication defining requirements for entropy sources used in random number generators for cryptographic applications.
Read more
Spontaneous Emission
The process by which an excited atom releases a photon and transitions to a lower energy state without external provocation.
Statistical Randomness
The property of a sequence of numbers where the numbers are statistically independent and uniformly distributed, lacking any predictable pattern.
Stochastic Model
A mathematical model incorporating randomness to represent unpredictable processes or phenomena.
Stochastic Processes
A collection of random variables representing the evolution of a system over time in a probabilistic manner.
Stream Cipher
A symmetric encryption algorithm that encrypts plaintext one bit or byte at a time using a pseudo-random key stream.
Strong Key Crypto Engine
A cryptographic engine designed to generate and manage cryptographic keys with high entropy and robustness, ensuring strong security for encryption and other cryptographic operations.
Substitution-Permutation Network (SPN)
A design framework for symmetric block ciphers using layers of substitutions and permutations to ensure confusion and diffusion.
Symmetric Encryption Algorithm
An encryption method using the same key for both encryption and decryption of data.
Symmetric Key
A single cryptographic key used in symmetric encryption algorithms for both encryption and decryption of data.
Symmetric Key Algorithm
An encryption algorithm that relies on a single shared key for both encryption and decryption.
Symmetric Key Cryptography
A cryptographic system where the same key is used for both encryption and decryption.
Symmetric Key Exchange
The process of securely sharing a symmetric key between parties for encryption and decryption purposes.
System on Chip (SoC)
An integrated circuit that combines multiple components of a computer or system, such as a processor, memory, and I/O, on a single chip.
System on Module (SoM)
A modular circuit board containing core components like a processor, memory, and connectivity, designed for integration into a larger system.
T
Thermal Noise
Also known as Johnson-Nyquist noise, it's electronic noise generated by the thermal agitation of electrons inside an electrical conductor.
Three-key Triple Data Encryption Algorithm
An enhanced version of the Data Encryption Standard (DES) using three unique keys for increased security.
Tokenization
The process of substituting sensitive data with unique tokens, which have no exploitable value outside the system.
Traffic Encryption Key (TEK)
A symmetric key used exclusively to encrypt data transmitted between parties in a secure communication session.
Transfer Key Encryption Key (TrKEK)
A cryptographic key used to securely transfer another encryption key between systems or devices.
Transport Layer Security (TLS)
A cryptographic protocol providing secure communication over a network, ensuring data confidentiality, integrity, and authentication.
True Random Number Generator (TRNG)
A hardware-based random number generator that produces randomness from inherently unpredictable physical processes.
Trusted Platform Module (TPM)
A hardware-based cryptographic module used to secure sensitive information, such as keys and passwords, on a device.
Tunnel VPN
A virtual private network configuration that encapsulates data packets within a secure tunnel, protecting them during transmission over the internet.
Two-key Triple Data Encryption Algorithm
A variant of 3TDEA that uses only two unique keys, offering a balance between security and performance.
U
Unpredictability
The inability to foresee the outcome of a process or event, essential in cryptography to ensure secure key generation, randomness, and resistance to attacks.
Read more
Unencrypted key
A cryptographic key stored or transmitted without encryption, posing a security risk as it can be accessed by unauthorized entities.
Uniform Distribution
A type of probability distribution where all outcomes are equally likely, important for ensuring fairness in random number generation.
V
Vacuum Fluctuations
Quantum fluctuations occurring in empty space (the vacuum), which contribute to the randomness used in some QRNGs.
Vertical-Cavity Surface-Emitting Laser (VCSEL)
A semiconductor laser diode that emits light perpendicular to its surface, commonly used in optical communication and sensing applications.
Virtual Machine (VM)
A software-based emulation of a computer system that runs applications and operating systems independently from the physical hardware.
W
Wavefunction
A mathematical function describing the quantum state of a particle or system, containing information about the probabilities of a particle's properties.
White Noise
A random signal having equal intensity at different frequencies, giving it a constant power spectral density
X
XML Encryption
A standard for encrypting XML data to ensure the confidentiality and integrity of the information during transmission or storage.
Z
Zero-Knowledge Proof
A cryptographic protocol enabling one party to prove knowledge of information to another without revealing the actual information.