Cryptography Acronyms / Abbreviations / Portmanteaus

Acronym / Abbreviation / Portmanteau Meaning
3DES Triple Data Encryption Standard
AE Authenticated Encryption
AEAD Authenticated Encryption with Associated Data
AES Advanced Encryption Standard
ALPN Application-Layer Protocol Negotiation
ANSI American National Standards Institute
BEAST Browser Exploit Against SSL/TLS
CBC Cipher Block Chaining
CCM Counter with CBC-MAC
CCMP CTR mode with CBC-MAC Protocol
CFB Cipher Feedback
CMAC Cipher-based Message Authentication Code
CMC CBC-mask-CBC
CRC Cyclic Redundancy Ccheck
CRL Certificate Revocation List
CTR Counter
CWC Carter-Wegman + CTR mode
DEC DECypt
DES Data Encryption Standard
EAP Extensible Authentication Protocol
EAX
ECB Electronic Codebook
ECC Elliptic Curve Cryptography
EME ECB-mask-ECB
ENC ENCrypt
ESSIV Encrypted salt-sector initialization vector
FDE Full Disk Encryption
FIPS Federal Information Processing Standard
GCM Galois/Counter Mode
GHASH Galois HASH
GMAC
GTK Group Temporal Key
HMAC keyed-Hash Message Authentication Code
HTTPS Hyper Text Transfer Protocol Secure
IAPM Integrity Aware Parallelizable Mode
ICM Integer Counter Mode
IDEA International Data Encryption Algorithm
IEC International Electrotechnical Commission
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IETF Internet Engineering Task Force
ISO International Organization for Standardization
IV Initialization Vector
KEK Key Encryption Key
KPK Key Production Key
KSA Key-scheduling algorithm
LFSR Linear feedback shift register
LRW Liskov, Rivest, and Wagner
LSB Least Significant Bit
MAC Message Authentication Code
MD Message Digest
MD5 Message Digest 5
MD-MITM Multi Dimensional-Meet In The Middle
MEK Message Encryption Key
MITM Meet In The Middle
MITM Man In The Middle
MPDU MAC Protocol Data Unit
MSB Most Significant Bit
NIST National Institute of Standards and Technology
NOMORE Numerous Occurrence MOnitoring & Recovery Exploit
NPN Next Protocol Negotiation
OCB Offset CodeBook
OFB Output Feedback
OMAC One-key MAC
OTP One-Time Pad
PCBC Propagating Cipher Block Chaining
PGP Pretty Good Privacy
PIN Personal Identification Number
PKC Public Key Cryptography
PKCS Public Key Cryptography Standards
PKI Public Key Infrastructure
PKIX Public Key Infrastructure X.509
PMAC Parallelizable MAC
PPK PuTTY Private Key
PRG Pseudo-random generator
PRGA Pseudo-random generation algorithm
RC4 Rivest Cipher 4
RFC Request For Comments
RSA Rivest, Shamir, Adleman
SHA Secure Hash Algorithm
SIC Segmented Integer Counter
SISWG Security in Storage Working Group
SRTP Secure Real-time Transport Protocol
SSH Secure Shell
SSL Secure Socket Layer
SSPI Security Support Provider Interface
SV Starting Variable
TDEA Triple Data Encryption Algorithm
TEA Tiny Encryption Algorithm
TEK Traffic Encryption Key
TKIP Temporal Key Integrity Protocol
TLS Transport Layer Security
TSK Transmission Security Key
VMPC Variably Modified Permutation Composition
WEP Wired Equivalent Privacy
WPA Wi-Fi Protected Access
WPA2 Wi-Fi Protected Access II
WPS Wi-Fi Protected Setup
XCBC
XEX Xor-Encrypt-Xor
XOR Exclusive OR
XTS XEX Tweakable Block Cipher with Ciphertext Stealing

Download “list-of-cryptography-terms.csv” list-of-cryptography-terms.csv – Downloaded 636 times – 3 KB

Built with

License

Content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0)
https://creativecommons.org/licenses/by/3.0/. In other words, share generously but provide attribution.