Vocabulary

A

AA
Access Authorization
Asymmetric Cryptography
Cryptography in which two keys are used: the other one encrypts and the other one decrypts. What's more is that it is also vice versa. Moreover, something that has veen encrypted with one of the keys can be decrypted only with the other one.

D

DEK
Data Encryption Key. A single (symmetric) key used to encrypt the document. This key is then encrypted using Public Key Cryptography.

H

HTTP
HyperText Transfer Protocol.

P

PEM
Privacy Enhanced Mail.
Private Key
The secret component of the two keys used in public key encryption.
Public Key
The public component of the two keys used in public key encryption.
Public Key Cryptography
See Asymmetric Cryptography.

S

Secret Key
The single key used in symmetric cryptography.
Symmetric Cryptography
Encryption and decryption done by the same (secret) key.

U

URL
Uniform Resource Locator.

AL 12 December 1993