There is currently no text in this page. You can search for this page title in other pages, or search the related logs, but you do not have permission to create this page.
Category:NIST SP 800-57P1 Terms
Pages in category "NIST SP 800-57P1 Terms"
The following 200 pages are in this category, out of 242 total.
(previous page) (next page)A
B
C
- Certificate
- Certification Authority
- Ciphertext
- Collision
- Compromise
- Confidentiality
- Contingency Plan
- Contingency Planning
- Cryptanalysis
- Cryptographic Algorithm
- Cryptographic Boundary
- Cryptographic Hash Function
- Cryptographic Key (Key)
- Cryptographic Key Component (Key Component)
- Cryptographic Module
- Cryptomodule
- Cryptoperiod
D
K
- Key
- Key Agreement
- Key Attribute
- Key Component
- Key Confirmation
- Key De-Registration
- Key Derivation
- Key Distribution
- Key Encrypting Key
- Key Establishment
- Key Management
- Key Management Archive
- Key Management Policy
- Key Management Practices Statement
- Key Pair
- Key Recovery
- Key Registration
- Key Revocation
- Key Transport
- Key Update
- Key Usage Period
- Key Wrapping
- Key Wrapping Key
- Keying Material
L
P
S
- Secret Key
- Secure Communication Protocol
- Security Domain
- Security Life of Data
- Security Services
- Security Strength (Also "Bits Of Security")
- Self-Signed Certificate
- Shall
- Shared Secret
- Should
- Signature Generation
- Signature Verification
- Split Knowledge
- Static Key
- Symmetric Key
- Symmetric Key Algorithm
- System Initialization
T
- Term:Access Control
- Term:Accountability
- Term:Algorithm Originator Usage Period
- Term:Algorithm Security Lifetime
- Term:Approved
- Term:Archive
- Term:Association
- Term:Assurance of (Private Key) Possession
- Term:Assurance of Validity
- Term:Asymmetric Key Algorithm
- Term:Attribute
- Term:Authentication
- Term:Authentication Code
- Term:Authorization
- Term:Availability
- Term:Backup
- Term:Certificate
- Term:Certification Authority
- Term:Ciphertext
- Term:Collision
- Term:Compromise
- Term:Confidentiality
- Term:Contingency Plan
- Term:Contingency Planning
- Term:Cryptanalysis
- Term:Cryptographic Algorithm
- Term:Cryptographic Boundary
- Term:Cryptographic Hash Function
- Term:Cryptographic Key (Key)
- Term:Cryptographic Key Component (Key Component)
- Term:Cryptographic Module
- Term:Cryptomodule
- Term:Cryptoperiod
- Term:Data Integrity
- Term:Decryption
- Term:Deterministic Random Bit Generator
- Term:Digital Signature
- Term:Distribution
- Term:Domain Parameter
- Term:Encrypted Key
- Term:Encryption
- Term:Entity
- Term:Ephemeral Key
- Term:Hash Function
- Term:Hash Value
- Term:Hash-Based Message Authentication Code
- Term:Identifier
- Term:Identity
- Term:Initialization Vector
- Term:Integrity
- Term:Key
- Term:Key Agreement
- Term:Key Attribute
- Term:Key Component
- Term:Key Confirmation
- Term:Key De-Registration
- Term:Key Derivation
- Term:Key Distribution
- Term:Key Encrypting Key
- Term:Key Establishment
- Term:Key Management
- Term:Key Management Archive
- Term:Key Management Policy
- Term:Key Management Practices Statement
- Term:Key Pair
- Term:Key Recovery
- Term:Key Registration
- Term:Key Revocation
- Term:Key Transport
- Term:Key Update
- Term:Key Usage Period
- Term:Key Wrapping
- Term:Key Wrapping Key
- Term:Keying Material
- Term:Label
- Term:Manual Key Transport
- Term:Message Authentication Code
- Term:Non-Repudiation
- Term:Operational Phase (Operational Use)
- Term:Operational Storage
- Term:Originator Usage Period
- Term:Owner
- Term:Password
- Term:Period of Protection
- Term:Plaintext
- Term:Private Key