`Revision 2
`
`
`Glossary of Key Information
`Security Terms
`
`
`Richard Kissel, Editor
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CELLSPIN
`EX. 2016, Page 1
`
`
`
`NISTIR 7298
`Revision 2
`
`Glossary of Key Information Security
`Terms
`
`
`Richard Kissel, Editor
` Computer Security Division
`Information Technology Laboratory
`
`
`
`
`
`
`
`
`
`
`
`May 2013
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Department of Commerce
`Rebecca Blank, Acting Secretary
`
`National Institute of Standards and Technology
`Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director
`
`
`
`
`
`
`CELLSPIN
`EX. 2016, Page 2
`
`
`
`National Institute of Standards and Technology Interagency or Internal Report 7298r2
`222 pages (May 2013)
`
`
`
`
`
`Certain commercial entities, equipment, or materials may be identified in this document in order to
`describe an experimental procedure or concept adequately. Such identification is not intended to imply
`
`recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or
`
`
`equipment are necessarily the best available for the purpose.
`
`There may be references in this publication to other publications currently under development by NIST
`in accordance with its assigned statutory responsibilities. The information in this publication, including
`
`concepts and methodologies, may be used by Federal agencies even before the completion of such
`companion publications. Thus, until each publication is completed, current requirements, guidelines,
`
`and procedures, where they exist, remain operative. For planning and transition purposes, Federal
`agencies may wish to closely follow the development of these new publications by NIST.
`
`Organizations are encouraged to review all draft publications during public comment periods and
`provide feedback to NIST. All NIST Computer Security Division publications, other than the ones
`
`noted above, are available at http://csrc.nist.gov/publications.
`
`
`
`National Institute of Standards and Technology
`Attn: Computer Security Division, Information Technology Laboratory
`100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
`Email: secglossary@nist.gov
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ii
`
`
`
`
`
`
`
`
`
`CELLSPIN
`EX. 2016, Page 3
`
`
`
`NIST IR 7298 Revision 2, Glossary of Key Information Security Terms
`
`Cryptographic Alarm –
`
`Cryptographic Algorithm –
`
`Cryptographic Ancillary
`Equipment –
`
`Cryptographic Binding –
`
`Cryptographic Boundary –
`
`Cryptographic Component –
`
`Circuit or device that detects failures or aberrations in the logic or
`operation of crypto-equipment. Crypto-alarm may inhibit
`transmission or may provide a visible and/or audible alarm.
`SOURCE: CNSSI-4009
`
`A well-defined computational procedure that takes variable inputs,
`including a cryptographic key, and produces an output.
`SOURCE: SP 800-21; CNSSI-4009
`
`Equipment designed specifically to facilitate efficient or reliable
`operation of cryptographic equipment, without performing
`cryptographic functions itself.
`SOURCE: CNSSI-4009
`
`Associating two or more related elements of information using
`cryptographic techniques.
`SOURCE: CNSSI-4009
`
`An explicitly defined continuous perimeter that establishes the
`physical bounds of a cryptographic module and contains all the
`hardware, software, and/or firmware components of a cryptographic
`module.
`SOURCE: FIPS 140-2
`
`Hardware or firmware embodiment of the cryptographic logic. A
`cryptographic component may be a modular assembly, a printed
`wiring assembly, a microcircuit, or a combination of these items.
`SOURCE: CNSSI-4009
`
`Cryptographic Equipment –
`
`Equipment that embodies a cryptographic logic.
`SOURCE: CNSSI-4009
`
`Cryptographic Hash Function –
`
`A function that maps a bit string of arbitrary length to a fixed length
`bit string. Approved hash functions satisfy the following properties:
`1) (One-way) It is computationally infeasible to find any input which
`maps to any pre-specified output, and
`2) (Collision resistant) It is computationally infeasible to find any
`two distinct inputs that map to the same output.
`SOURCE: SP 800-21
`
`Cryptographic Ignition Key (CIK) – Device or electronic key used to unlock the secure mode of crypto-
`equipment.
`SOURCE: CNSSI-4009
`
`
`
`53
`
`CELLSPIN
`EX. 2016, Page 4
`
`