Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

CA

Abbreviation(s) and Synonym(s): Definition(s):

  A trusted entity that issues and revokes public key certificates.
Source(s):
FIPS 201 under Certification Authority [Withdrawn]
NISTIR 7711 under Certification Authority

  1. Operations performed to defeat cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Cryptanalysis

  2. The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Cryptanalysis

  Operations performed in defeating cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Cryptanalysis [Superseded]

  The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Cryptanalysis [Superseded]