| Acronym / Abbreviation / Portmanteau | Meaning |
|---|---|
| 3DES | Triple Data Encryption Standard |
| AE | Authenticated Encryption |
| AEAD | Authenticated Encryption with Associated Data |
| AES | Advanced Encryption Standard |
| ALPN | Application-Layer Protocol Negotiation |
| ANSI | American National Standards Institute |
| BEAST | Browser Exploit Against SSL/TLS |
| CBC | Cipher Block Chaining |
| CCM | Counter with CBC-MAC |
| CCMP | CTR mode with CBC-MAC Protocol |
| CFB | Cipher Feedback |
| CMAC | Cipher-based Message Authentication Code |
| CMC | CBC-mask-CBC |
| CRC | Cyclic Redundancy Ccheck |
| CRL | Certificate Revocation List |
| CTR | Counter |
| CWC | Carter-Wegman + CTR mode |
| DEC | DECypt |
| DES | Data Encryption Standard |
| EAP | Extensible Authentication Protocol |
| EAX | |
| ECB | Electronic Codebook |
| ECC | Elliptic Curve Cryptography |
| EME | ECB-mask-ECB |
| ENC | ENCrypt |
| ESSIV | Encrypted salt-sector initialization vector |
| FDE | Full Disk Encryption |
| FIPS | Federal Information Processing Standard |
| GCM | Galois/Counter Mode |
| GHASH | Galois HASH |
| GMAC | |
| GTK | Group Temporal Key |
| HMAC | keyed-Hash Message Authentication Code |
| HTTPS | Hyper Text Transfer Protocol Secure |
| IAPM | Integrity Aware Parallelizable Mode |
| ICM | Integer Counter Mode |
| IDEA | International Data Encryption Algorithm |
| IEC | International Electrotechnical Commission |
| IEEE | Institute of Electrical and Electronics Engineers |
| IETF | Internet Engineering Task Force |
| IETF | Internet Engineering Task Force |
| ISO | International Organization for Standardization |
| IV | Initialization Vector |
| KEK | Key Encryption Key |
| KPK | Key Production Key |
| KSA | Key-scheduling algorithm |
| LFSR | Linear feedback shift register |
| LRW | Liskov, Rivest, and Wagner |
| LSB | Least Significant Bit |
| MAC | Message Authentication Code |
| MD | Message Digest |
| MD5 | Message Digest 5 |
| MD-MITM | Multi Dimensional-Meet In The Middle |
| MEK | Message Encryption Key |
| MITM | Meet In The Middle |
| MITM | Man In The Middle |
| MPDU | MAC Protocol Data Unit |
| MSB | Most Significant Bit |
| NIST | National Institute of Standards and Technology |
| NOMORE | Numerous Occurrence MOnitoring & Recovery Exploit |
| NPN | Next Protocol Negotiation |
| OCB | Offset CodeBook |
| OFB | Output Feedback |
| OMAC | One-key MAC |
| OTP | One-Time Pad |
| PCBC | Propagating Cipher Block Chaining |
| PGP | Pretty Good Privacy |
| PIN | Personal Identification Number |
| PKC | Public Key Cryptography |
| PKCS | Public Key Cryptography Standards |
| PKI | Public Key Infrastructure |
| PKIX | Public Key Infrastructure X.509 |
| PMAC | Parallelizable MAC |
| PPK | PuTTY Private Key |
| PRG | Pseudo-random generator |
| PRGA | Pseudo-random generation algorithm |
| RC4 | Rivest Cipher 4 |
| RFC | Request For Comments |
| RSA | Rivest, Shamir, Adleman |
| SHA | Secure Hash Algorithm |
| SIC | Segmented Integer Counter |
| SISWG | Security in Storage Working Group |
| SRTP | Secure Real-time Transport Protocol |
| SSH | Secure Shell |
| SSL | Secure Socket Layer |
| SSPI | Security Support Provider Interface |
| SV | Starting Variable |
| TDEA | Triple Data Encryption Algorithm |
| TEA | Tiny Encryption Algorithm |
| TEK | Traffic Encryption Key |
| TKIP | Temporal Key Integrity Protocol |
| TLS | Transport Layer Security |
| TSK | Transmission Security Key |
| VMPC | Variably Modified Permutation Composition |
| WEP | Wired Equivalent Privacy |
| WPA | Wi-Fi Protected Access |
| WPA2 | Wi-Fi Protected Access II |
| WPS | Wi-Fi Protected Setup |
| XCBC | |
| XEX | Xor-Encrypt-Xor |
| XOR | Exclusive OR |
| XTS | XEX Tweakable Block Cipher with Ciphertext Stealing |
Built with
License
Content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0)
https://creativecommons.org/licenses/by/3.0/. In other words, share generously but provide attribution.