Acronym / Abbreviation / Portmanteau | Meaning |
---|---|
3DES | Triple Data Encryption Standard |
AE | Authenticated Encryption |
AEAD | Authenticated Encryption with Associated Data |
AES | Advanced Encryption Standard |
ALPN | Application-Layer Protocol Negotiation |
ANSI | American National Standards Institute |
BEAST | Browser Exploit Against SSL/TLS |
CBC | Cipher Block Chaining |
CCM | Counter with CBC-MAC |
CCMP | CTR mode with CBC-MAC Protocol |
CFB | Cipher Feedback |
CMAC | Cipher-based Message Authentication Code |
CMC | CBC-mask-CBC |
CRC | Cyclic Redundancy Ccheck |
CRL | Certificate Revocation List |
CTR | Counter |
CWC | Carter-Wegman + CTR mode |
DEC | DECypt |
DES | Data Encryption Standard |
EAP | Extensible Authentication Protocol |
EAX | |
ECB | Electronic Codebook |
ECC | Elliptic Curve Cryptography |
EME | ECB-mask-ECB |
ENC | ENCrypt |
ESSIV | Encrypted salt-sector initialization vector |
FDE | Full Disk Encryption |
FIPS | Federal Information Processing Standard |
GCM | Galois/Counter Mode |
GHASH | Galois HASH |
GMAC | |
GTK | Group Temporal Key |
HMAC | keyed-Hash Message Authentication Code |
HTTPS | Hyper Text Transfer Protocol Secure |
IAPM | Integrity Aware Parallelizable Mode |
ICM | Integer Counter Mode |
IDEA | International Data Encryption Algorithm |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
IETF | Internet Engineering Task Force |
IETF | Internet Engineering Task Force |
ISO | International Organization for Standardization |
IV | Initialization Vector |
KEK | Key Encryption Key |
KPK | Key Production Key |
KSA | Key-scheduling algorithm |
LFSR | Linear feedback shift register |
LRW | Liskov, Rivest, and Wagner |
LSB | Least Significant Bit |
MAC | Message Authentication Code |
MD | Message Digest |
MD5 | Message Digest 5 |
MD-MITM | Multi Dimensional-Meet In The Middle |
MEK | Message Encryption Key |
MITM | Meet In The Middle |
MITM | Man In The Middle |
MPDU | MAC Protocol Data Unit |
MSB | Most Significant Bit |
NIST | National Institute of Standards and Technology |
NOMORE | Numerous Occurrence MOnitoring & Recovery Exploit |
NPN | Next Protocol Negotiation |
OCB | Offset CodeBook |
OFB | Output Feedback |
OMAC | One-key MAC |
OTP | One-Time Pad |
PCBC | Propagating Cipher Block Chaining |
PGP | Pretty Good Privacy |
PIN | Personal Identification Number |
PKC | Public Key Cryptography |
PKCS | Public Key Cryptography Standards |
PKI | Public Key Infrastructure |
PKIX | Public Key Infrastructure X.509 |
PMAC | Parallelizable MAC |
PPK | PuTTY Private Key |
PRG | Pseudo-random generator |
PRGA | Pseudo-random generation algorithm |
RC4 | Rivest Cipher 4 |
RFC | Request For Comments |
RSA | Rivest, Shamir, Adleman |
SHA | Secure Hash Algorithm |
SIC | Segmented Integer Counter |
SISWG | Security in Storage Working Group |
SRTP | Secure Real-time Transport Protocol |
SSH | Secure Shell |
SSL | Secure Socket Layer |
SSPI | Security Support Provider Interface |
SV | Starting Variable |
TDEA | Triple Data Encryption Algorithm |
TEA | Tiny Encryption Algorithm |
TEK | Traffic Encryption Key |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TSK | Transmission Security Key |
VMPC | Variably Modified Permutation Composition |
WEP | Wired Equivalent Privacy |
WPA | Wi-Fi Protected Access |
WPA2 | Wi-Fi Protected Access II |
WPS | Wi-Fi Protected Setup |
XCBC | |
XEX | Xor-Encrypt-Xor |
XOR | Exclusive OR |
XTS | XEX Tweakable Block Cipher with Ciphertext Stealing |
Built with
License
Content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0)
https://creativecommons.org/licenses/by/3.0/. In other words, share generously but provide attribution.