File:Ksd-64.jpg
KSD-64 "Crypto-ignition keys" on display at the National Cryptologic Museum in 2005
This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.
Template:Div col
- A5/1Template:Spaced ndasha stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
- Bulk encryption
- Cellular Message Encryption AlgorithmTemplate:Spaced ndasha block cipher which was used for securing mobile phones in the United States.
- Cipher
- Cipher device
- Cipher system
- Cipher text
- Ciphony<ref>Template:Cite book</ref>
- Civision
- Codress message
- COMSEC equipment
- Cryptanalysis
- Cryptographic key
- CRYPTO (International Cryptology Conference)
- Crypto phone
- Crypto-shredding
- Data Encryption Standard (DES) <ref>Coppersmith, Don. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243–250.</ref>
- Decipher
- Decode
- Decrypt
- DECT Standard Cipher
- Descrambler
- Dncipher
- Encode
- Encoding law
- Encrypt
- End-to-end encryption
- group
- IMSI-catcherTemplate:Spaced ndashan eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
- Key distribution center (KDC)
- Key management
- Key stream
- KSD-64
- Link encryption
- MISTY1
- Multiplex link encryption
- Net control station (NCS)
- Null cipher
- One-time pad
- Over the Air Rekeying (OTAR)
- Plaintext
- PPPoX
- Protected distribution system (PDS)
- Protection interval (PI)
- Pseudorandom number generator
- Public-key cryptography
- RED/BLACK concept
- RED signal
- Remote rekeying
- Security management
- Spoofing<ref>{{#invoke:citation/CS1|citation
|CitationClass=web }}</ref>
- SquirtTemplate:Spaced ndashto load or transfer code key from an electronic key storage device. See Over the Air Rekeying.
- STU-IIITemplate:Spaced ndasha family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
- Superencryption
- Synchronous crypto-operation
- Transmission security key (TSK)
- Trunk encryption device (TED)
- Types 1, 2, 3, and 4 encryption
- Unique key
- VoIP VPNTemplate:Spaced ndashcombines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
- ZRTPTemplate:Spaced ndasha cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.<ref>{{#invoke:citation/CS1|citation
|CitationClass=web }}</ref> Template:Div col end
See alsoEdit
Template:Portal Template:Div col
- Communications security
- CONDOR secure cell phone
- Cryptography standards
- Secure communication
- Secure telephone
- Telecommunications
ReferencesEdit
Further readingEdit
- Rutenbeck, Jeff (2006). Tech terms: what every telecommunications and digital media person should know. Elsevier, Inc. Template:ISBN
- Kissel, Richard (editor). (February, 2011). Glossary of Key Information Security Terms (NIST IR 7298 Revision 1). National Institute of Standards and Technology.
External linksEdit
- "Federal Standard 1037C."Template:Spaced ndashTelecommunications: Glossary of Telecommunication Terms
- Embedding Security into Handsets Would Boost Data Usage - Report (2005) from Cellular-news.com
- Wireless, Telecom and Computer Glossary from Cellular Network Perspectives