- authentication key
- ключ аутентификации
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Authentication key — An ISO term. A cryptographic key used for authentication. When this key and the elements to be authenticated (authentication elements) are applied to the authentication algorithm, the result will be the message authentication code (MAC) or the… … International financial encyclopaedia
authentication key — /ɔθɛntəˈkeɪʃən ki/ (say awthentuh kayshuhn kee) noun a code which is based on a unique set of numbers, data relating to the transaction, etc., which authenticates and secures a data transfer. Also, digital key …
Authentication key identifier — An ISO term. ISO Message Authentication term. ISO Key Management term. The identification of the cryptographic key to be used for authentication. ISO Key Management term. The key identifier of a key to be used in the authentication of a… … International financial encyclopaedia
Identifier of authentication key — An ISO term. See preferred term Authentication key identifier … International financial encyclopaedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Authentication algorithm — An ISO term. An algorithm used, together with an authentication key, and one or more authentication elements, for authentication … International financial encyclopaedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Authentication server — Authentication servers are servers that provide authentication services to users or other systems. Users and other servers authenticate to such a server, and receive cryptographic tickets. These tickets are then exchanged with one another to… … Wikipedia
Key Wrap — constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b)… … Wikipedia