Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
k
K(i)
K0
KAK
KAS
KAS1-basic
KAS1-Party_V-confirmation
KAS2-basic
KAS2-bilateral-confirmation
KAS2-Party_U-confirmation
KAS2-Party_V-confirmation
KB
KBA
kbit/s
KBits
Kbps
KC
KCK
KDC
KDF
KDK
KDM
KECCAK
KECCAK[c]
KECCAK-f [b]
KECCAK-p[b, nr]
KEK
KEM
Kerberized Internet Negotiation Of Keys
Kerberos
Key
Key (plaintext)
Key Administration
Key Agreement
Key And Metadata Management Functions
Key Attribute
Key Bundle
Key Chords
Key Component
Key Confirmation
Key Confirmation Key
Key Custodian
Key De-Registration
Key Derivation
Key Derivation Function
Key Derivation Key
Key Destruction
Key Distribution
Key Distribution Center
Key Encrypting Key
Key Encryption Key
Key Entry
Key Escrow
Key Escrow System
Key Establishment
Key Exchange
Key Expansion
Key Export
Key Format
Key Generation
Key Generation And Distribution
Key Generation Material
Key Generator
Key Hierarchy
Key Holder
Key Label
Key Length
Key Life Cycle
Key Lifecycle State
Key List
Key Loader
Key Logger
Key Management
Key Management Archive
Key Management Device
Key Management Entity
Key Management Facility
Key Management Infrastructure
Key Management Message
Key Management Plan
Key Management Policy
Key Management Practices Statement
Key Management Product
Key Management Service
Key Output
Key Owner
Key Pair
Key Processing Facility
Key Processor
Key Recovery
Key Reference
Key Registration
Key Revocation
Key Rollover
Key Signing Key
Key Size
Key Specification
Key Split
Key Splitting (k of n)
Key State Transition
Key States
Key Stream
Key Stream Generator
Key Strength
Key Tag
Key Tape
Key Transport
Key Type
Key Update
Key Wrapping
Key Wrapping Key
Key/Metadata Recovery
Key-Agreement Primitive
Key-Agreement Scheme
Key-Agreement Transaction
Key-Auto-Key
Keyblock Cipher Key
Key-Confirmation
Key-Confirmation Provider
KeyData
Key-Derivation Function
Key-Derivation Key
Key-Derivation Method
Key-Derivation Procedure
Keyed Hash Algorithm
Keyed Hash-Based Message Authentication Code
Keyed-Hash Message Authentication Code
Keyed-Hash Message Authentication Code (as Specified In Fips 198-1.)
Key-Encapsulation Mechanism
Key-Encrypting Key
Key-Encryption Key
Key-Encryption-Key
Key-Establishment
Key-Establishment Key Pair
Key-Establishment Transaction
Key-Generating Module
Keying Material
Keying Material Installation
Key-Management Archive
Key-Pair Owner
Key-Recovery Agent
Keystroke Monitoring
Key-Transport
Key-Transport Scheme
Key-Transport Transaction
Key-Usage Period
Key-Wrap Algorithm
Key-Wrapping
Key-Wrapping Key
Key-Wrapping Scheme (Symmetric)
KG
KGD
kHz
KI
Kill Command
Kilobit Per Second
Kilobits / Second
Kilobits Per Second
Kilobyte
Kilohertz
KINK
kLen
KM
KME
KMF
KMI
KMI operating account
KMI protected channel
KMI-aware device
KMM
KMP
KMPS
Knowledge Based Authentication
Knowledge Levels
Knowledge, Skills, And Abilities
Knowledge-based authentication
KO
KOA
KOA agent
KOA manager
KOA registration manager
KOAM
Kolmogorov-Smirnov Test
KP
KPC
KPF
KSA
KSG
KSK
Kt
KTS
KTS-KEM-KWS-basic
KTS-KEM-KWS-Party_V-confirmation
KTS-OAEP-basic
KTS-OAEP-Party_V-confirmation
KWK
kwkBits
KWS