CZ:Security Subgroup: Difference between revisions
Jump to navigation
Jump to search
imported>Chris Day No edit summary |
imported>Chris Day |
||
(One intermediate revision by the same user not shown) | |||
Line 24: | Line 24: | ||
{{Rpl|Internet Protocol security architecture}} | {{Rpl|Internet Protocol security architecture}} | ||
{{Rpl|IPsec}} | {{Rpl|IPsec}} | ||
==Using pl template== | |||
*{{pl|Government Communications Headquarters}} | |||
*{{pl|Hash (cryptography)}} | |||
*{{pl|Hashed message authentication code}} | |||
*{{pl|Hasty Pudding (cipher)}} | |||
*{{pl|Hybrid cryptosystem}} | |||
*{{pl|Information assurance}} | |||
*{{pl|Signals intelligence}} | |||
*{{pl|International Data Encryption Algorithm}} | |||
*{{pl|Internet Protocol security architecture}} | |||
*{{pl|IPsec}} |
Latest revision as of 00:39, 2 March 2010
| ||||||||
Main article | Home | Talk | All articles (125) | Citable (2) | Members (2) | Recent changes | ||
Affiliation: Computers (Recent changes)| Military (Recent changes)| Engineering (Recent changes)| [ e ] |
Using R template
- Government Communications Headquarters [r]: Add brief definition or description
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code [r]: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher) [r]: A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence [r]: Add brief definition or description
- International Data Encryption Algorithm [r]: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
Using Rpl template
- Government Communications Headquarters: Add brief definition or description
- Hash (cryptography): An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Hashed message authentication code: A technique for authenticating a message using a hash function and a secret key. [e]
- Hasty Pudding (cipher): A variable-block-size block cipher designed by Richard Schroeppel, which has its input block size and key length variable, and an input parameter called the 'spice'. [e]
- Hybrid cryptosystem: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Information assurance: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Signals intelligence: Add brief definition or description
- International Data Encryption Algorithm: A block cipher designed by James Massey and Xuejia Lai in 1991, intended as a replacement for the Data Encryption Standard. [e]
- Internet Protocol security architecture: Add brief definition or description
- IPsec: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]