694
G
LOSSARY
pre-master secret
A key generated during the handshake process in Transport Layer
Security (TLS) protocol negotiations and used to derive a master secret.
preshared key
See
PSK
.
PRF
Pseudorandom function. A function that produces effectively
unpredictable output. A PRF can use multiple iterations of one or more
hash algorithms to achieve its output. The Transport Layer Security (TLS)
protocol defines a specific PRF for deriving keying material.
Privacy-Enhanced
See
PEM
.
private key
In cryptography, one of a pair of keys, one public and one private, that
are created with the same algorithm for encrypting and decrypting
messages and digital signatures. The private key is provided to only the
requestor and never shared. The requestor uses the private key to
decrypt text that has been encrypted with the public key by someone
else. See also
PKI
;
public key
.
PRNG
Pseudorandom number generator. An algorithm of predictable behavior
that generates a sequence of numbers with little or no discernible
order, except for broad statistical patterns.
Protected Extensible
Authentication
Protocol
See
PEAP
.
Protocol Independent
Multicast protocol
See
PIM
.
pseudorandom
function
See
PRF
.
pseudorandom
number generator
See
PRNG
.
PSK
Preshared key. The IEEE 802.11 term for a shared secret, also known as
a
shared key
. See
shared secret
.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...