expand for answer #

#
__Session key__

A randomlygenerated key that is used one time, and then discarded. Session keys are symmetric (used for both encryption and decryption). They are sent with the message, protected by encryption with a public key from the intended recipient. A session key consists of a random number of approximately 40 to 2000 bits. Session keys can be derived from hash values.

Similar items:

A number known as a message digest generated from a hash function. Also . See hash function. Producing hash values for accessing data or for security. A hash value (or simply hash), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. Hashing is also a common method of accessing data records. To create an index, called a hash table, for these records, you would apply a formula to each name to produce a unique numeric value.

[view]

[view]

(1) A public key cryptosystem developed by Rivest, Shamir, and Adleman (RSA). The RSA has two different keys: the public encryption key and the secret decryption key. The strength of RSA depends on the difficulty of the prime number factorization. For applications with highlevel security, the number of the decryption key bits should be greater than 512 bits. RSA is used for both encryption and digital signatures. (2) Resource utilization, resource allocation. See Rivest, Shamir, and Adleman (RSA).

[view]

[view]

Advanced Encryption StandardAdvanced Encryption Standard, a new encryption standard, whose development and selection was sponsored by NIST, that will support key lengths of 128, 192, and 256 bits. FIPS approved cryptographic algorithm that is a symmetric block cipher using cryptographic key sizes of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The encryption standard selected in October 2000 by the National Institute of Standards and Technology (NIST) that is based on the Rijndael cipher.

[view]

[view]

In cryptography, a sequence of symbols that controls encryption and decryption. For some encryption mechanisms (symmetric), the same key is used for both encryption and decryption; for other mechanisms (asymmetric), the keys used for encryption and decryption are different.

[view]

[view]

A method for ensuring a recipient that a message truly came from the claimed sender and that the message was not altered while in transit between the sender and recipient. Cryptographic process used to assure message originator authenticity, integrity, and nonrepudiation. Synonymous with electronic signature. The act of electronically affixing an encrypted message digest to a computer file or message in which the originator is then authenticated to the recipient.

[view]

[view]

There are no comments yet.