CZ:Security Subgroup: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz No edit summary |
imported>Chris Day No edit summary |
||
Line 1: | Line 1: | ||
{{Security Subgroup}} | {{Security Subgroup}} | ||
==Using R template== | |||
{{R|Government Communications Headquarters}} | |||
{{R|Hash (cryptography)}} | |||
{{R|Hashed message authentication code}} | |||
{{R|Hasty Pudding (cipher)}} | |||
{{R|Hybrid cryptosystem}} | |||
{{R|Information assurance}} | |||
{{R|Signals intelligence}} | |||
{{R|International Data Encryption Algorithm}} | |||
{{R|Internet Protocol security architecture}} | |||
{{R|IPsec}} | |||
==Using Rpl template== | |||
{{Rpl|Government Communications Headquarters}} | |||
{{Rpl|Hash (cryptography)}} | |||
{{Rpl|Hashed message authentication code}} | |||
{{Rpl|Hasty Pudding (cipher)}} | |||
{{Rpl|Hybrid cryptosystem}} | |||
{{Rpl|Information assurance}} | |||
{{Rpl|Signals intelligence}} | |||
{{Rpl|International Data Encryption Algorithm}} | |||
{{Rpl|Internet Protocol security architecture}} | |||
{{Rpl|IPsec}} |
Revision as of 00:38, 2 March 2010
| ||||||||
Main article | Home | Talk | All articles (125) | Citable (2) | Members (2) | Recent changes | ||
Affiliation: Computers (Recent changes)| Military (Recent changes)| Engineering (Recent changes)| [ e ] |
Using R template
- Government Communications Headquarters [r]: Add brief definition or description
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher) [r]: A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence [r]: Add brief definition or description
- International Data Encryption Algorithm [r]: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
Using Rpl template
- Government Communications Headquarters: Add brief definition or description
- Hash (cryptography): An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher): A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence: Add brief definition or description
- International Data Encryption Algorithm: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture: Add brief definition or description
- IPsec: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]