Dell PowerVault TL4000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 117

Glossary, This glossary defines the special terms, abbreviations, and acronyms used in

Page 117 highlights

Glossary This glossary defines the special terms, abbreviations, and acronyms used in this publication and other related publications. AES. Advanced Encryption Standard. A block cipher adopted as an encryption standard by the US government. alias. See key label. certificate. A digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. certificate label. See key label. certificate store. See keystore. DK. Data Key. An alphanumeric string used to encrypt data. EEDK. Externally Encrypted Data Key. A Data Key that has been encrypted (wrapped) by a Key Encryption Key prior to being stored in the data cartridge. See KEK. encryption. The conversion of data into a cipher. A key is required to encrypt and decrypt the data. Encryption provides protection from persons or software that attempt to access the data without the key. KEK. Key Encrypting Key. An alphanumeric, asymmetric key used to encrypt the Data Key. See EEDK. key label. A unique identifier used to match the EEDK with the private key (KEK) required to unwrap the protected symmetric data key. Also called alias or certificate label depending on which keystore is used. key ring. See keystore. keystore. A database of private keys and their associated X.509 digital certificate chains used to authenticate the corresponding public keys. Also called certificate store or key ring in some environments. PKDS. Public Key Data Set. Also PKA cryptographic Key Data Set. private key. One key in an asymmetric key pair, typically used for decryption. The Encryption Key Manager uses private keys to unwrap protected AES data keys prior to decryption. public key. One key in an asymmetric key pair, typically used for encryption. The Encryption Key Manager uses public keys to wrap (protect) AES data keys prior to storing them on the tape cartridge. rekey. The process of changing the asymmetric Key Encrypting Key (KEK) that protects the Data Key (DK) stored on an already encrypted tape, thereby allowing different entities access to the data. RSA. Rivest-Shamir-Adleman algorithm. A system for asymmetric, public-key cryptography used for encryption and authentication. It was invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The security of the system depends on the difficulty of factoring the product of two large prime numbers. E-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Glossary
This glossary defines the special terms,
abbreviations, and acronyms used in this
publication and other related publications.
AES.
Advanced Encryption Standard. A block cipher
adopted as an encryption standard by the US
government.
alias.
See key label.
certificate.
A digital document that binds a public key
to the identity of the certificate owner, thereby enabling
the certificate owner to be authenticated.
certificate label.
See key label.
certificate store.
See keystore.
DK.
Data Key. An alphanumeric string used to
encrypt data.
EEDK.
Externally Encrypted Data Key. A Data Key
that has been encrypted (wrapped) by a Key
Encryption Key prior to being stored in the data
cartridge. See KEK.
encryption.
The conversion of data into a cipher. A
key is required to encrypt and decrypt the data.
Encryption provides protection from persons or
software that attempt to access the data without the
key.
KEK.
Key Encrypting Key. An alphanumeric,
asymmetric key used to encrypt the Data Key. See
EEDK.
key label.
A unique identifier used to match the
EEDK with the private key (KEK) required to unwrap
the protected symmetric data key. Also called alias or
certificate label depending on which keystore is used.
key ring.
See keystore.
keystore.
A database of private keys and their
associated X.509 digital certificate chains used to
authenticate the corresponding public keys. Also called
certificate store or key ring in some environments.
PKDS.
Public Key Data Set. Also PKA cryptographic
Key Data Set.
private key.
One key in an asymmetric key pair,
typically used for decryption. The Encryption Key
Manager uses private keys to unwrap protected AES
data keys prior to decryption.
public key.
One key in an asymmetric key pair,
typically used for encryption. The Encryption Key
Manager uses public keys to wrap (protect) AES data
keys prior to storing them on the tape cartridge.
rekey.
The process of changing the asymmetric Key
Encrypting Key (KEK) that protects the Data Key (DK)
stored on an already encrypted tape, thereby allowing
different entities access to the data.
RSA.
Rivest-Shamir-Adleman algorithm. A system for
asymmetric, public-key cryptography used for
encryption and authentication. It was invented in 1977
by Ron Rivest, Adi Shamir, and Leonard Adleman. The
security of the system depends on the difficulty of
factoring the product of two large prime numbers.
E-1