List of telecommunications encryption terms information
This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.
A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
Bulk encryption
Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States.
Cipher
Cipher system
Cipher text
Ciphony[1]
Civision
Codress message
COMSEC equipment
Cryptanalysis
Cryptographic key
CRYPTO (International Cryptology Conference)
Crypto phone
Crypto-shredding
Data Encryption Standard (DES) [2]
Decipher
Decode
Decrypt
DECT Standard Cipher
Descrambler
Dncipher
Encode
Encoding law
Encrypt
End-to-end encryption
group
IMSI-catcher – an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
Key distribution center (KDC)
Key management
Key stream
KSD-64
Link encryption
MISTY1
Multiplex link encryption
Net control station (NCS)
Null cipher
One-time pad
Over the Air Rekeying (OTAR)
Plaintext
PPPoX
Protected distribution system (PDS)
Protection interval (PI)
Pseudorandom number generator
Public-key cryptography
RED/BLACK concept
RED signal
Remote rekeying
Security management
Spoofing[3]
Squirt – to load or transfer code key from an electronic key storage device. See Over the Air Rekeying.
STU-III – a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
Superencryption
Synchronous crypto-operation
Transmission security key (TSK)
Trunk encryption device (TED)
Type 1 encryption
Type 2 encryption
Type 3 encryption
Type 4 encryption
Unique key
VoIP VPN – combines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
ZRTP – a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.[4]
^Owens, F. J. (1993). Signal Processing of Speech. Houndmills: MacMillan Press. ISBN 0-333-51922-1.
^Coppersmith, Don. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243–250.
^Schneier, Bruce (3 March 2006). "Caller ID Spoofing". schneier.com. Retrieved 16 January 2011.
^Zimmermann, Phil (2010-06-17). "Internet-Draft. ZRTP: Media Path Key Agreement for Unicast Secure RTP". Retrieved 2010-06-17.
and 23 Related for: List of telecommunications encryption terms information
This is a listoftelecommunicationsencryptionterms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard...
management Federal Standard 1037C Listoftelecommunicationsencryptionterms Outline of telecommunication Telecommunications "http://www.its.bldrdoc.gov/fs-1037/fs-1037c...
International Teletraffic Congress Listoftelecommunicationsencryptionterms Military communication Nanonetwork New media Outline of telecommunication Power failure...
This glossary ofterms used in broadcasting is a listof definitions ofterms and concepts related to both radio and television broadcasting, along with...
conferences • Listoftelecommunicationsencryptionterms • Listof people associated with Bletchley Park • Listof SFTP clients • Listof SFTP server software...
European Union's NESSIE project and to the Advanced Encryption Standard process run by National Institute of Standards and Technology in the U.S. There is some...
Digital Enhanced Cordless Telecommunications (DECT) is a cordless telephony standard maintained by ETSI. It originated in Europe, where it is the common...
Human rights and encryption are often viewed as interlinked. Encryption can be a technology that helps implement basic human rights. In the digital age...
2013 headquartered in Plan-les-Ouates, Switzerland. It uses client-side encryption to protect email content and user data before they are sent to Proton...
did not approve the new terms. On October 15, 2021, WhatsApp announced that it would begin offering an end-to-end encryption service for chat backups...
analog-to-information conversion, but also in encryption, simulation, correlation technique and time-of-flight spectroscopy. The most common example is...
information such as login details or users cookies (depending on any content encryption methods that may be in use) Reverse engineer proprietary protocols used...
mobile telecommunications providers verify the identity of individuals before providing service. Google's transparency report shows a consistent trend of growth...
and network request monitoring were common. Widevine Cypher used DES-X encryption to prevent these techniques. Widevine Technologies partnered with Bellevue-based...
multiplexing, voice encryption or voice transformation. The vocoder was invented in 1938 by Homer Dudley at Bell Labs as a means of synthesizing human...
Subscriber Line ADT—Abstract Data Type AE—Adaptive Equalizer AES—Advanced Encryption Standard AF—Anisotropic Filtering AFP—Apple Filing Protocol AGP—Accelerated...
and for encryptionof data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that...
noticed that new updates of WhatsApp sent messages with encryption, but described the cryptographic method used as "broken." In August of the same year, the...
transfer over a telecommunications network. Protocols for shared file systems—such as 9P and the Network File System—are beyond the scope of this article...