This glossary contains important terms used in key and policy management, encryption, and quantum cyber-security. It is regularly updated with the latest terminology and usage. Your participation and feedback are most welcome. Please contact us to submit comments, new entries, or suggestions.
Also called public key cryptography (or asymmetric cryptography). Asymmetric cryptography uses two keys. One key is called a public key and the other is called a private key. Asymmetric cryptography solves the secret key transport problem encountered during initial attempts to communicate securely using symmetric encryption.
Common Criteria EAL2
Encryption is the process of converting data, also known as plaintext, to another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. It is commonly used to protect sensitive information – this includes files and storage devices, as well as data transferred over wireless networks and the Internet. The information is transformed from plaintext into ciphertext through encryption and then transformed back from ciphertext to plaintext via decryption.
encryption key management
The management of cryptographic keys used for encryption, This includes generating, exchanging, protecting, storing, using and replacing encryption keys throughout their full life cycle. Encryption key management is one of the most complex problems of encryption and is critical to the security of a cryptosystem.