Digital certificates Definitions

Browse Definitions
Search Definitions
  • A

    authentication server

    An authentication server is an application that facilitates authentication of an entity that attempts to access a network...(Continued)

  • C

    certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues electronic documents that verify a digital entity’s identity on the Internet.

  • Certificate Revocation List (CRL)

    A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority and should not be trusted. Web browsers use CRLs to determine whether a website's digital certificate is still valid and trustworthy.

  • conditional access (CA)

    Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.

  • cryptology

    Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.

  • D

    digital certificate

    A digital certificate is an electronic "passport" allowing people, computers or organizations to exchange secure information over the Internet using the public key infrastructure (PKI).

  • digital signature

    A digital signature (not to be confused with a digital certificate) is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.

  • Digital Signature Standard (DSS)

    Digital Signature Standard (DSS) is the digital signature algorithm(DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authenticationof electronic documents.

  • E

    Electronic Signatures in Global and National Commerce Act (e-signature bill)

    The Electronic Signatures in Global and National Commerce Act (often referred to as the e-signature bill) specifies that in the United States, the use of a digital signature is as legally valid as a traditional signature written in ink on paper.

  • H

    HDCP (High-bandwidth Digital Content Protection)

    HDCP (High-bandwidth Digital Content Protection) is a specified method from Intel for protecting copyrighted digital entertainment content that uses the Digital Video Interface (DVI) by encrypting its transmission between the video source and the digital display (receiver).

  • hijacking

    Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.

  • K

    key

    In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text.

  • M

    MD2

    MD2 is an earlier, 8-bit version of MD5, an algorithm used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specific individual.

  • MD4

    MD4 is an earlier version of MD5, an algorithm used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specific individual.

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close