National Academies Press: OpenBook

Cryptography and the Intelligence Community: The Future of Encryption (2022)

Chapter: Appendix E: Acronyms and Abbreviations

« Previous: Appendix D: Global Trends 2040
Suggested Citation:"Appendix E: Acronyms and Abbreviations." National Academies of Sciences, Engineering, and Medicine. 2022. Cryptography and the Intelligence Community: The Future of Encryption. Washington, DC: The National Academies Press. doi: 10.17226/26168.
×

E

Acronyms and Abbreviations

AES Advanced Encryption Standard
AI artificial intelligence
ANSI American National Standards Institute
BSI Bundesamt für Sicherheit in der Informationstechnik (German Federal Office for Information Security)
C-RAN Cloud Radio Access Network
CAC Common Access Card
CFIUS Committee on Foreign Investment in the United States
CPU central processing unit
CRQC Cryptographically Relevant Quantum Computer
DES Data Encryption Standard
DevOps Software development (Dev) and IT operations (Ops)
DHS Department of Homeland Security
ECDH Elliptic Curve Diffie-Hellman
ECDSA Elliptic Curve Digital Signature Algorithm
FHE fully homomorphic encryption
FIPS Federal Information Processing Standard
FSS Function Secret Sharing
GCHQ Government Communications Headquarters
GDPR Union General Data Protection Regulation
GPU graphics processing unit
GSM Global System for Mobile Communications
Suggested Citation:"Appendix E: Acronyms and Abbreviations." National Academies of Sciences, Engineering, and Medicine. 2022. Cryptography and the Intelligence Community: The Future of Encryption. Washington, DC: The National Academies Press. doi: 10.17226/26168.
×
HTTPS Hypertext Transfer Protocol Secure
IEC International Electrotechnical Commission
IETF Internet Engineering Task Force
IoT Internet of Things
IP Internet protocol
IPsec Internet protocol security
ISO International Organization for Standardization
IT information technology
KDC key distribution center
LTE Long Term Evolution (usually called 4G LTE)
MAC method authentication code
MPC multi-party computation
NFV Network Functions Virtualization
NISQ noisy, intermediate-scale quantum
NIST National Institute of Standards and Technology
NSA National Security Agency
ODNI Office of the Director of National Intelligence
OPM Office of Personnel Management
ORAM Oblivious Random Access Memory
PIR Private Information Retrieval
PKI public-key infrastructure
PQC post-quantum cryptography
PRNG pseudo-random number generator
PSI private set intersection
PSU private set union
QKD quantum key distribution
RFC request for comments
RSA Rivest-Shamir-Adleman (the developers)
SCADA Supervisory Control and Data Acquisition
SDN Software-Defined Networks
SGX software guard extensions
SHA Secure Hash Algorithm
SIKE Supersingular Isogeny Key Encapsulation
SSL Secure Sockets Layer
TLS Transport Layer Security
Suggested Citation:"Appendix E: Acronyms and Abbreviations." National Academies of Sciences, Engineering, and Medicine. 2022. Cryptography and the Intelligence Community: The Future of Encryption. Washington, DC: The National Academies Press. doi: 10.17226/26168.
×
VCAT Visiting Committee on Advanced Technology
VPN virtual private network
WG working group
ZK zero knowledge
Suggested Citation:"Appendix E: Acronyms and Abbreviations." National Academies of Sciences, Engineering, and Medicine. 2022. Cryptography and the Intelligence Community: The Future of Encryption. Washington, DC: The National Academies Press. doi: 10.17226/26168.
×
Page 122
Suggested Citation:"Appendix E: Acronyms and Abbreviations." National Academies of Sciences, Engineering, and Medicine. 2022. Cryptography and the Intelligence Community: The Future of Encryption. Washington, DC: The National Academies Press. doi: 10.17226/26168.
×
Page 123
Suggested Citation:"Appendix E: Acronyms and Abbreviations." National Academies of Sciences, Engineering, and Medicine. 2022. Cryptography and the Intelligence Community: The Future of Encryption. Washington, DC: The National Academies Press. doi: 10.17226/26168.
×
Page 124
Next: Appendix F: Committee Member Biographical Information »
Cryptography and the Intelligence Community: The Future of Encryption Get This Book
×
 Cryptography and the Intelligence Community: The Future of Encryption
Buy Paperback | $30.00 Buy Ebook | $24.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Encryption is a process for making information unreadable by an adversary who does not possess a specific key that is required to make the encrypted information readable. The inverse process, making information that has been encrypted readable, is referred to as decryption. Cryptography has become widespread and is used by private as well as governmental actors. It also enables authentication and underlies the safe use of the Internet and computer systems by individuals and organizations worldwide. Emerging cryptographic technologies offer capabilities such as the ability to process encrypted information without first decrypting it.

At the request of the Office of the Director of National Intelligence, this report identifies potential scenarios that would describe the balance between encryption and decryption over the next 10 to 20 years and assesses the national security and intelligence implications of each scenario. For each of these scenarios, Cryptography and the Intelligence Community identifies risks, opportunities, and actions. Attention to the findings should enable the Intelligence Community to prepare for the future and to recognize emerging trends and developments and respond appropriately.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!