Skip to main content

Currently Skimming:

B - Glossary
Pages 353-363

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 353...
... In a computer context, entry granted to a software path that establishes the right to use a system and its resources; to read, write, modify, or delete data; and/or to use software processes with various capabilities.
From page 354...
... " and would be an example of an integrity lock. AUTHENTICITY -- a security service that provides a user with a means of verifying the identity of the sender of a message, a file, a computer system, a software process, or even a database or individual software component.
From page 355...
... CAPSTONE CHIP -- an integrated circuit chip that implements the Skipjack algorithm and also includes the Digital Signature Algorithm, the Secure Hash Standard, the classified Key Exchange Algorithm, circuitry for efficient exponentiation of large numbers, and a random number generator using a pure noise source. CAPSTONE/FORTEZZA INITIATIVE -- a government initiative to promote and support escrowed encryption for data storage and communications.
From page 356...
... CRYPTOGRAPHIC ALGORITHM -- a mathematical procedure, used in conjunction with a closely guarded secret key, that transforms original input into a form that is unintelligible without special knowledge of the secret information and the algorithm. Such algorithms are also the basis for digital signatures and key exchange.
From page 357...
... DECOMPILING -- a process through which object code consisting of ones and zeros can be converted into source code in a high-level computer language such as C or Pascal. DECRYPTION -- the cryptographic procedure of transforming ciphertext into the original message cleartext.
From page 358...
... the results of that process. EXCEPTIONAL ACCESS -- access to encrypted data granted to a recipient other than the originally intended recipient.
From page 359...
... KEY ESCROW ENCRYPTION (also escrowed encryption) -- an encryption system that enables exceptional access to encrypted data through special data recovery keys held by a trusted party.
From page 360...
... PCMCIA CARD -- the industry-standard Personal Computer Memory Card Industry Association card and associated electrical interface for various computer components (e.g., memory, hard disks, and cryptographic processes)
From page 361...
... include collateral information such as mailing address, organizational affiliation, and telephone number. RC2/RC4 ALGORITHMS -- two variable-key-length cryptographic algorithms designed by Ronald Rivest of the Massachusetts Institute of Technology.
From page 362...
... Hence, security safeguards impose appropriate access rules for computer information.
From page 363...
... TROJAN HORSE -- a computer program whose execution would result in undesired side effects, generally unanticipated by the user. A Trojan horse program may otherwise give the appearance of providing normal functionality.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.