throbber
NISTIR 7298
`Revision 2
`
`
`Glossary of Key Information
`Security Terms
`
`
`Richard Kissel, Editor
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CELLSPIN
`EX. 2016, Page 1
`
`

`

`NISTIR 7298
`Revision 2
`
`Glossary of Key Information Security
`Terms
`
`
`Richard Kissel, Editor
` Computer Security Division
`Information Technology Laboratory
`
`
`
`
`
`
`
`
`
`
`
`May 2013
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Department of Commerce
`Rebecca Blank, Acting Secretary
`
`National Institute of Standards and Technology
`Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director
`
`
`
`
`
`
`CELLSPIN
`EX. 2016, Page 2
`
`

`

`National Institute of Standards and Technology Interagency or Internal Report 7298r2
`222 pages (May 2013)
`
`
`
`
`
`Certain commercial entities, equipment, or materials may be identified in this document in order to
`describe an experimental procedure or concept adequately. Such identification is not intended to imply
`
`recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or
`
`
`equipment are necessarily the best available for the purpose.
`
`There may be references in this publication to other publications currently under development by NIST
`in accordance with its assigned statutory responsibilities. The information in this publication, including
`
`concepts and methodologies, may be used by Federal agencies even before the completion of such
`companion publications. Thus, until each publication is completed, current requirements, guidelines,
`
`and procedures, where they exist, remain operative. For planning and transition purposes, Federal
`agencies may wish to closely follow the development of these new publications by NIST.
`
`Organizations are encouraged to review all draft publications during public comment periods and
`provide feedback to NIST. All NIST Computer Security Division publications, other than the ones
`
`noted above, are available at http://csrc.nist.gov/publications.
`
`
`
`National Institute of Standards and Technology
`Attn: Computer Security Division, Information Technology Laboratory
`100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
`Email: secglossary@nist.gov
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ii
`
`
`
`
`
`
`
`
`
`CELLSPIN
`EX. 2016, Page 3
`
`

`

`NIST IR 7298 Revision 2, Glossary of Key Information Security Terms
`
`Cryptographic Alarm –
`
`Cryptographic Algorithm –
`
`Cryptographic Ancillary
`Equipment –
`
`Cryptographic Binding –
`
`Cryptographic Boundary –
`
`Cryptographic Component –
`
`Circuit or device that detects failures or aberrations in the logic or
`operation of crypto-equipment. Crypto-alarm may inhibit
`transmission or may provide a visible and/or audible alarm.
`SOURCE: CNSSI-4009
`
`A well-defined computational procedure that takes variable inputs,
`including a cryptographic key, and produces an output.
`SOURCE: SP 800-21; CNSSI-4009
`
`Equipment designed specifically to facilitate efficient or reliable
`operation of cryptographic equipment, without performing
`cryptographic functions itself.
`SOURCE: CNSSI-4009
`
`Associating two or more related elements of information using
`cryptographic techniques.
`SOURCE: CNSSI-4009
`
`An explicitly defined continuous perimeter that establishes the
`physical bounds of a cryptographic module and contains all the
`hardware, software, and/or firmware components of a cryptographic
`module.
`SOURCE: FIPS 140-2
`
`Hardware or firmware embodiment of the cryptographic logic. A
`cryptographic component may be a modular assembly, a printed
`wiring assembly, a microcircuit, or a combination of these items.
`SOURCE: CNSSI-4009
`
`Cryptographic Equipment –
`
`Equipment that embodies a cryptographic logic.
`SOURCE: CNSSI-4009
`
`Cryptographic Hash Function –
`
`A function that maps a bit string of arbitrary length to a fixed length
`bit string. Approved hash functions satisfy the following properties:
`1) (One-way) It is computationally infeasible to find any input which
`maps to any pre-specified output, and
`2) (Collision resistant) It is computationally infeasible to find any
`two distinct inputs that map to the same output.
`SOURCE: SP 800-21
`
`Cryptographic Ignition Key (CIK) – Device or electronic key used to unlock the secure mode of crypto-
`equipment.
`SOURCE: CNSSI-4009
`
`
`
`53
`
`CELLSPIN
`EX. 2016, Page 4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket