Datacryptor Ethernet User Manual
Appendix J: Glossary of Terms
1270A450-005 - June 2008
Page 133
Element Manager (EM)
Application used to manage Datacryptor Ethernet devices and is
used to launch the Front Panel Viewer (FPV) application.
Encrypted data
Transformed plaintext data to ciphertext.
Encryption
Data encryption scrambles and unscrambles data between two
communication endpoints. The encryption process turns an
original plaintext message that anyone can read into an encrypted
ciphertext message that can be read only by an authorized
recipient.
Framing
Method of distinguishing digital channels that have been
multiplexed together
Front Panel Viewer (FPV)
Is the application that authenticates the administrator with a
Datacryptor Ethernet and allows it to be commissioned and
managed.
Hash Function
An algorithm that computes a short digest of a longer message.
The digest is usually of a fixed size.
Hash Message
Authentication Code
(HMAC)
A secret-key authentication algorithm. If only the source and
destination know the HMAC key, the algorithm provides data origin
authentication and data integrity for packets sent between the two
parties. If the HMAC is correct, it proves that it must have been
added by the source.
Integrity
Integrity assures that the content of a message has not been
altered.
IP
Internet Protocol, this is the protocol that is used to transport data
across the Internet.
Key
Secret information used to decrypt or encrypt data
MAC
An abbreviation for Message Authentication Code, a digital
signature used to authenticate individual messages.
MAC address
Media Access Control This is the hardware address of an interface
card built in during manufacture.
Message Digest #5
(MD-5)
A message-digest algorithm that computes a secure, irreversible,
cryptographically strong 128-bit hash value for a document.
Netmask
Used in combination with an IP address to define the network
portion of an IP address.
Peer
The Datacryptor device that participates in a connection.
Plaintext
The opposite of encrypted. Plaintext is an intelligible form of data
such as the text on this page.
Private Key
See
Public Key
Public Key
A key that is available to anyone. It is usually the other key to a
pair, which consists of a public key and a private key.
Public Key Algorithm
An algorithm that is used in conjunction with a public key set to
encrypt and decrypt data.
All manuals and user guides at all-guides.com