| Acronym / Abbreviation / Portmanteau | Meaning | 
|---|---|
| 3DES | Triple Data Encryption Standard | 
| AE | Authenticated Encryption | 
| AEAD | Authenticated Encryption with Associated Data | 
| AES | Advanced Encryption Standard | 
| ALPN | Application-Layer Protocol Negotiation | 
| ANSI | American National Standards Institute | 
| BEAST | Browser Exploit Against SSL/TLS | 
| CBC | Cipher Block Chaining | 
| CCM | Counter with CBC-MAC | 
| CCMP | CTR mode with CBC-MAC Protocol | 
| CFB | Cipher Feedback | 
| CMAC | Cipher-based Message Authentication Code | 
| CMC | CBC-mask-CBC | 
| CRC | Cyclic Redundancy Ccheck | 
| CRL | Certificate Revocation List | 
| CTR | Counter | 
| CWC | Carter-Wegman + CTR mode | 
| DEC | DECypt | 
| DES | Data Encryption Standard | 
| EAP | Extensible Authentication Protocol | 
| EAX | |
| ECB | Electronic Codebook | 
| ECC | Elliptic Curve Cryptography | 
| EME | ECB-mask-ECB | 
| ENC | ENCrypt | 
| ESSIV | Encrypted salt-sector initialization vector | 
| FDE | Full Disk Encryption | 
| FIPS | Federal Information Processing Standard | 
| GCM | Galois/Counter Mode | 
| GHASH | Galois HASH | 
| GMAC | |
| GTK | Group Temporal Key | 
| HMAC | keyed-Hash Message Authentication Code | 
| HTTPS | Hyper Text Transfer Protocol Secure | 
| IAPM | Integrity Aware Parallelizable Mode | 
| ICM | Integer Counter Mode | 
| IDEA | International Data Encryption Algorithm | 
| IEC | International Electrotechnical Commission | 
| IEEE | Institute of Electrical and Electronics Engineers | 
| IETF | Internet Engineering Task Force | 
| IETF | Internet Engineering Task Force | 
| ISO | International Organization for Standardization | 
| IV | Initialization Vector | 
| KEK | Key Encryption Key | 
| KPK | Key Production Key | 
| KSA | Key-scheduling algorithm | 
| LFSR | Linear feedback shift register | 
| LRW | Liskov, Rivest, and Wagner | 
| LSB | Least Significant Bit | 
| MAC | Message Authentication Code | 
| MD | Message Digest | 
| MD5 | Message Digest 5 | 
| MD-MITM | Multi Dimensional-Meet In The Middle | 
| MEK | Message Encryption Key | 
| MITM | Meet In The Middle | 
| MITM | Man In The Middle | 
| MPDU | MAC Protocol Data Unit | 
| MSB | Most Significant Bit | 
| NIST | National Institute of Standards and Technology | 
| NOMORE | Numerous Occurrence MOnitoring & Recovery Exploit | 
| NPN | Next Protocol Negotiation | 
| OCB | Offset CodeBook | 
| OFB | Output Feedback | 
| OMAC | One-key MAC | 
| OTP | One-Time Pad | 
| PCBC | Propagating Cipher Block Chaining | 
| PGP | Pretty Good Privacy | 
| PIN | Personal Identification Number | 
| PKC | Public Key Cryptography | 
| PKCS | Public Key Cryptography Standards | 
| PKI | Public Key Infrastructure | 
| PKIX | Public Key Infrastructure X.509 | 
| PMAC | Parallelizable MAC | 
| PPK | PuTTY Private Key | 
| PRG | Pseudo-random generator | 
| PRGA | Pseudo-random generation algorithm | 
| RC4 | Rivest Cipher 4 | 
| RFC | Request For Comments | 
| RSA | Rivest, Shamir, Adleman | 
| SHA | Secure Hash Algorithm | 
| SIC | Segmented Integer Counter | 
| SISWG | Security in Storage Working Group | 
| SRTP | Secure Real-time Transport Protocol | 
| SSH | Secure Shell | 
| SSL | Secure Socket Layer | 
| SSPI | Security Support Provider Interface | 
| SV | Starting Variable | 
| TDEA | Triple Data Encryption Algorithm | 
| TEA | Tiny Encryption Algorithm | 
| TEK | Traffic Encryption Key | 
| TKIP | Temporal Key Integrity Protocol | 
| TLS | Transport Layer Security | 
| TSK | Transmission Security Key | 
| VMPC | Variably Modified Permutation Composition | 
| WEP | Wired Equivalent Privacy | 
| WPA | Wi-Fi Protected Access | 
| WPA2 | Wi-Fi Protected Access II | 
| WPS | Wi-Fi Protected Setup | 
| XCBC | |
| XEX | Xor-Encrypt-Xor | 
| XOR | Exclusive OR | 
| XTS | XEX Tweakable Block Cipher with Ciphertext Stealing | 
Built with
License
Content on this page is available under a Creative Commons Attribution 3.0 Unported License (CC BY 3.0)
https://creativecommons.org/licenses/by/3.0/. In other words, share generously but provide attribution.