Key management | Cryptography lists and comparisons

Glossary of cryptographic keys

This glossary lists types of keys as the term is used in cryptography, as opposed to door locks. Terms that are primarily used by the U.S. National Security Agency are marked (NSA). For classification of keys according to their usage see cryptographic key types. * 40-bit key - key with a length of 40 bits, once the upper limit of what could be exported from the U.S. and other countries without a license. Considered very insecure. See key size for a discussion of this and other lengths. * authentication key - Key used in a keyed-hash message authentication code, or HMAC. * benign key - (NSA) a key that has been protected by encryption or other means so that it can be distributed without fear of its being stolen. Also called BLACK key. * content-encryption key (CEK) a key that may be further encrypted using a KEK, where the content may be a message, audio, image, video, executable code, etc. * crypto ignition key An NSA key storage device (KSD-64) shaped to look like an ordinary physical key. * cryptovariable - NSA calls the output of a stream cipher a key or key stream. It often uses the term cryptovariable for the bits that control the stream cipher, what the public cryptographic community calls a key. * data encryption key (DEK) used to encrypt the underlying data. * derived key - keys computed by applying a predetermined hash algorithm or key derivation function to a password or, better, a passphrase. * DRM key - A key used in Digital Rights Management to protect media * electronic key - (NSA) key that is distributed in electronic (as opposed to paper) form. See EKMS. * ephemeral key - A key that only exists within the lifetime of a communication session. * expired key - Key that was issued for a use in a limited time frame (cryptoperiod in NSA parlance) which has passed and, hence, the key is no longer valid. * FIREFLY key - (NSA) keys used in an NSA system based on public key cryptography. * Key derivation function (KDF) - function used to derive a key from a secret value, e.g. to derive KEK from Diffie-Hellman key exchange. * key encryption key (KEK) - key used to protect MEK keys (or DEK/TEK if MEK is not used). * key production key (KPK) -Key used to initialize a keystream generator for the production of other electronically generated keys. * key fill - (NSA) loading keys into a cryptographic device. See fill device. * master key - key from which all other keys (or a large group of keys) can be derived. Analogous to a physical key that can open all the doors in a building. * master encryption key (MEK) - Used to encrypt the DEK/TEK key. * master key encryption key (MKEK) - Used to encrypt multiple KEK keys. For example, an HSM can generate several KEK and wrap them with an MKEK before export to an external DB - such as OpenStack Barbican. * one time pad (OTP or OTPad) - keying material that should be as long as the plaintext and should only be used once. If truly random and not reused it's the most secure encryption method. See one-time pad article. * one time password (OTP) - One time password based on a prebuilt single use code list or based on a mathematical formula with a secret seed known to both parties, uses event or time to modify output (see TOTP/HOTP). * paper key - (NSA) keys that are distributed in paper form, such as printed lists of settings for rotor machines, or keys in punched card or paper tape formats. Paper keys are easily copied. See Walker spy ring, RED key. * poem key - Keys used by OSS agents in World War II in the form of a poem that was easy to remember. See Leo Marks. * Public/private key - in public key cryptography, separate keys are used to encrypt and decrypt a message. The encryption key (public key) need not be kept secret and can be published. The decryption or private key must be kept secret to maintain confidentiality. Public keys are often distributed in a signed public key certificate. * pre-placed key - (NSA) large numbers of keys (perhaps a year's supply) that are loaded into an encryption device allowing frequent key change without refill. * RED key - (NSA) symmetric key in a format that can be easily copied, e.g. paper key or unencrypted electronic key. Opposite of BLACK or benign key. * revoked key - a public key that should no longer be used, typically because its owner is no longer in the role for which it was issued or because it may have been compromised. Such keys are placed on a certificate revocation list or CRL. * session key - key used for one message or an entire communications session. See traffic encryption key. * symmetric key - a key that is used both to encrypt and decrypt a message. Symmetric keys are typically used with a cipher and must be kept secret to maintain confidentiality. * traffic encryption key (TEK)/data encryption key (DEK) - a symmetric key that is used to encrypt messages. TEKs are typically changed frequently, in some systems daily and in others for every message. See session key. DEK is used to specify any data form type (in communication payloads or anywhere else). * transmission security key (TSK) - (NSA) seed for a pseudorandom number generator that is used to control a radio in frequency hopping or direct-sequence spread spectrum modes. See HAVE QUICK, SINCGARS, electronic warfare. * seed key - (NSA) a key used to initialize a cryptographic device so it can accept operational keys using benign transfer techniques. Also a key used to initialize a pseudorandom number generator to generate other keys. * signature key - public key cryptography can also be used to electronically sign messages. The private key is used to create the electronic signature, the public key is used to verify the signature. Separate public/private key pairs must be used for signing and encryption. The former is called signature keys. * stream key - the output of a stream cipher as opposed to the key (or cryptovariable in NSA parlance) that controls the cipher * training key - (NSA) unclassified key used for instruction and practice exercises. * Type 1 key - (NSA) keys used to protect classified information. See Type 1 product. * Type 2 key - (NSA) keys used to protect sensitive but unclassified (SBU) information. See Type 2 product. * Vernam key - Type of key invented by Gilbert Vernam in 1918. See stream key. * zeroized key - key that has been erased (see zeroisation.) (Wikipedia).

Glossary of cryptographic keys
Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

22C3: RFID - overview of protocols, librfid implementation and passive sniffing

Speakers: Harald Welte, Milosch Meriac ISO14443, ISO15693, their GPL librfid implementation and passive sniffing hardware The presentation will cover an introduction into the two popular RFID Standards, ISO14443 and ISO15693, as well as the author's Free Software implementation "librfid"

From playlist 22C3: Private Investigations

Video thumbnail

Symmetric Key Cryptography: Cryptographic Techniques

This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical operation can be used to encrypt at the bit level in symmetric key cryptography, then shows how this can be combined with permutation step

From playlist Cryptography

Video thumbnail

DEFCON 13: Forensic Data Acquisition Tools

Speaker: RS Proper recovery of evidence can be critical to a successful investigation or prosecution. This talk focuses on the different tools and techniques that are used by US Law Enforcement to get an uncontaminated copy of digital evidence from a suspect machine. The goal of this pres

From playlist DEFCON 13

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

EMV 101: Fundamentals of EMV Chip Payment

Commonly used globally in place of magnetic stripe, EMV chip technology helps to reduce card fraud in a face-to-face card-present environment; provides global interoperability; and enables safer and smarter transactions across contact and contactless channels. EMV implementation was initia

From playlist Payments

Video thumbnail

Indices Glossary | GCSE & IGCSE Maths | AQA, Edexcel, CIE, OCR

Hazel talks you through all the key definitions related to indices in this handy glossary. These videos are designed to help with your GCSE and IGCSE maths revision. To keep up to date with my Science with Hazel videos and support: Visit my website: https://sciencewithhazel.co.uk/ Follow

From playlist GCSE & IGCSE Maths //

Video thumbnail

Bad Math Glossary, or Soviet Propaganda?

A review of "The Algebra Tutor, Algebra 1 and Algebra 2, Volume 1". A textbook/workbook by Willie L. Thomas. It has a great propaganda-esque cover design, and a very finicky glossary to put it nicely. #mathbook #math 00:00 Rest of the Review 19:33 The Bad Glossary 23:00 End Buy a copy o

From playlist The Math Library

Video thumbnail

Lesson 1.2 The MATLAB Environment

A video segment from the Coursera MOOC on introductory computer programming with MATLAB by Vanderbilt. Lead instructor: Mike Fitzpatrick. Check out the companion website and textbook: http://cs103.net

From playlist Vanderbilt: Introduction to Computer Programming with MATLAB (CosmoLearning Computer Programming)

Video thumbnail

Overview on Modern Cryptography

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

CS105: Introduction to Computers | 2021 | Lecture 8.1 Introduction to CSS

Patrick Young Computer Science, PhD This course is a survey of Internet technology and the basics of computer hardware. You will learn what computers are and how they work and gain practical experience in the development of websites and an introduction to programming. To follow along wi

From playlist Stanford CS105 - Introduction to Computers Full Course

Video thumbnail

Basic Principle

A brief description of the "Basic Principle" and how it can be used to test for primality.

From playlist Cryptography and Coding Theory

Video thumbnail

Indicies Glossary | GCSE & IGCSE Maths | AQA, Edexcel, CIE, OCR

In this video SwH goes through the key terms in the indicies topic for IGCSE and GCSE maths, giving you all the technical terms you need when answering questions on powers. These videos are designed to help with your GCSE and IGCSE maths revision. To keep up to date with my Science with

From playlist GCSE & IGCSE Maths //

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

Side Channel Analysis of Cryptographic Implementations

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Related pages

Stream cipher | Cryptographic key types | Zeroisation | Session key | One-time pad | Key (cryptography) | Cryptography | Pretty Good Privacy | Public key certificate | Cryptoperiod | KSD-64 | Fill device | RC4 | Passphrase | Key derivation function | Key size | HMAC | Plaintext | Pseudorandom number generator | SINCGARS | 40-bit encryption | Ephemeral key | Kerberos (protocol) | Certificate revocation list | Gilbert Vernam | BATON | Advanced Encryption Standard | Data Encryption Standard