Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

Algorithm

Acronym(s):

None

Definition(s):

  A clearly specified mathematical process for computation; a set of rules that, if followed, will give a prescribed result.
Source(s): NIST SP 800-107 (Superceded by Rev. 1)
NIST SP 800-135 Rev. 1
NIST SP 800-90A Rev. 1
NIST SP 800-56B Rev. 1

Synonym(s):

None

See Also:
Algorithm Identifier
Algorithm Originator-Usage Period
Algorithm Security Lifetime
Algorithm Transition
Approved Hash Algorithms
Asymmetric Cryptographic Algorithm
Asymmetric Key Algorithm
Asymmetric-Key Algorithm
Block Cipher Algorithm
Control Algorithm
Counter Mode For A Block Cipher Algorithm
crypto-algorithm
Cryptographic Algorithm
Cryptographic Algorithm
Cryptographic Algorithm Validation Program
Data Encryption Algorithm
Deterministic Algorithm
Diffie-Hellmana Key Establishment Algorithm
Digital Signature Algorithm
Elliptic Curve Digital Signature Algorithm
Encryption Algorithm
Hash Algorithm
Hashing Algorithm
International Data Encryption Algorithm
Keyed Hash Algorithm
Key-Wrap Algorithm
MAC algorithm
Message Authentication Codemac Algorithm
Message-Digest Algorithm 5
One-Way Hash Algorithm
Public Key Cryptographic Algorithm
Public Key Cryptographic Algorithm (asymmetric)
Public-Key Algorithm
Public-Key Cryptographic Algorithm
Rivest, Shamir, Adleman Cryptographic Algorithm
Rivest, Shamir, Adlemanan Algorithm
Rivest-Shamir-Adleman Algorithm
secret key cryptographic algorithm
Secure Hash Algorithm
Secure Hash Algorithm 1
Secure Hash Algorithm KECCAK
Secure Hash Algorithm Version 1
Secure Hash Algorithm version 2 (SHA-224, SHA-256, SHA-384, SHA-512)
Secure Hash Algorithm, Version 1
Secure Hash Algorithm-3
Secure Hashing Algorithm
Stateless IP/ICMP Translation Algorithm
Symmetric Algorithm (secret key)
Symmetric Cryptographic Algorithm
Symmetric Encryption Algorithm
Symmetric Key Algorithm
Symmetric-Key Algorithm
Three-Key Triple Data Encryption Algorithm
Triple Data Encryption Algorithm
Two-Key Triple Data Encryption Algorithm