Netgear FVM318 FVM318 Reference Manual - Page 175

Glossary

Page 175 highlights

Glossary 10BASE-T 100BASE-Tx 3DES 802.11b ADSL AES Denial of Service attack DES Diffie-Hellman DHCP IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring. IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring. 3DES (Triple DES) achieves a high level of security by encrypting the data three times using DES with three different, unrelated keys. IEEE specification for wireless networking at 11 Mbps using direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio spectrum at 2.5GHz. See Asymmetric Digital Subscriber Line. Advanced Encryption Standard, a symmetric 128-bit block data encryption technique. It is an iterated block cipher with a variable block length and a variable key length. The block length and the key length can be independently specified to 128, 192 or 256 bits.The U.S government adopted the algorithm as its encryption technique in October 2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously. DoS. A hacker attack designed to prevent your computer or network from operating or communicating. The Data Encryption Standard (DES) processes input data that is 64 bits wide, encrypting these values using a 56 bit key. See also 3DES. Deffie Hellman shared secret algorithm is a method for securely exchanging a shared secret between two parties, in real-time, over an untrusted network. A shared secret allows two parties, who may not have ever communicated previously, to encrypt their communications. As such, it is used by several protocols, including Secure Sockets Layer (SSL) and Internet Protocol Security (IPSec). See Dynamic Host Configuration Protocol. Glossary 1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Glossary
1
Glossary
10BASE-T
IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
100BASE-Tx
IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
3DES
3DES (Triple DES) achieves a high level of security by encrypting the data
three times using DES with three different, unrelated keys.
802.11b
IEEE specification for wireless networking at 11 Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
ADSL
See
Asymmetric Digital Subscriber Line.
AES
Advanced Encryption Standard, a symmetric 128-bit block data encryption
technique. It is an iterated block cipher with a variable block length and a
variable key length. The block length and the key length can be independently
specified to 128, 192 or 256 bits.The U.S government adopted the algorithm
as its encryption technique in October 2000, replacing the DES encryption it
used. AES works at multiple network layers simultaneously.
Denial of Service
attack
DoS. A hacker attack designed to prevent your computer or network from
operating or communicating.
DES
The Data Encryption Standard (DES) processes input data that is 64 bits wide,
encrypting these values using a 56 bit key.
See
also 3DES.
Diffie-Hellman
Deffie Hellman shared secret algorithm is a method for securely exchanging a
shared secret between two parties, in real-time, over an untrusted network. A
shared secret allows two parties, who may not have ever communicated
previously, to encrypt their communications. As such, it is used by several
protocols, including Secure Sockets Layer (SSL) and Internet Protocol
Security (IPSec).
DHCP
See
Dynamic Host Configuration Protocol.