Dictionary · FIPS PUB 191
L2 — definitions grouped by regulatory framework.
Nouns
6 senses- Cryptography
Is categorized as either secret key or public key. Secret key cryptography is based on the use of a single cryptographic key shared between two parties. The same key is used to encrypt and decrypt data. This key is kept secret by the two parties. Public key cryptography is a form of cryptography which makes use of two keys: a public key and a private key. The two keys are related but have the property that, given the public key, it is computationally infeasible to derive the private key [FIPS 140-1]. In a public key cryptosystem, each party has its own public/private key pair. The public key can be known by anyone; the private key is kept secret.
- Discretionary access control
The basis of this kind of security is that an individual user, or program operating on the user’s behalf, is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the user’s control.
- Mandatory access control
Access controls (which) are driven by the results of a comparison between the user’s trust level or clearance and the sensitivity designation of the information.
- non-repudiation
Is the security service by which the entities involved in a communication cannot deny having participated. Specifically, the sending entity cannot deny having sent a message (non-repudiation with proof of origin), and the receiving entity cannot deny having received a message (non-repudiation with proof of delivery).
- Spoofing
Involves— 1) the ability to receive a message by masquerading as the legitimate receiving destination, or 2) masquerading as the sending machine and sending a message to a destination.
- unauthorized access
Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.