Glossary K
KBPS

KBPS

Length in bits of the keying material. See NIST SP 800-56B Rev. 1 under Kbits for more information.  

Read More

Kerberos

Kerberos

An authentication system developed at the Massachusetts Institute of Technology (MIT). Kerberos is designed to enable two parties to exchange private information across a public ...

Read More

Key

Key

A parameter that determines the transformation from plaintext to ciphertext and vice versa. (A DEA key is a 64-bit parameter consisting of 56 independent bits ...

Read More

Key Custodian

Key Custodian

An FCKMS role that is responsible for distributing keys or key splits and/or entering them into a cryptographic module. See  NIST SP 800-152 for more information. 

Read More

Key Distribution

Key Distribution

The transport of a key and other keying material from an entity that either owns or generates the key to another entity that is intended ...

Read More

Key Distribution Center

Key Distribution Center

A key center that generates keys for distribution to subscriber entities. See NIST SP 800-57 Part 2 Rev.1 under Key Distribution Center (KDC) for more information. 

Read More

Key Escrow

Key Escrow

A deposit of the private key of a subscriber and other pertinent information pursuant to an escrow agreement or similar contract binding upon the subscriber, ...

Read More

Key Logger

Key Logger

A program designed to record which keys are pressed on a computer keyboard used to obtain passwords or encryption keys and thus bypass other security ...

Read More

Key owner

Key Owner

A person authorized by an FCKMS service provider or FCKMS service-using organization to use a specific key that is managed by the FCKMS.  See NIST SP 800-152 for ...

Read More

Key Pair

Key Pair

A public key and its corresponding private key; a key pair is used with a public key algorithm. See the following under Key pair for more ...

Read More

Key Recovery

Key Recovery

A function in the lifecycle of keying material; mechanisms and processes that allow authorized entities to retrieve or reconstruct keying material from key backup or ...

Read More

Key Revocation

Key Revocation

A function in the lifecycle of keying material; a process whereby a notice is made available to affected entities that keying material should be removed ...

Read More

Key Rotation

Key Rotation

Changing the key, i.e., replacing it by a new key. The places that use the key or keys derived from it (e.g., authorized keys derived ...

Read More

Key Recovery Agent

Key Recovery Agent

An FCKMS role that assists in the key-recovery/metadata-recovery process.See NIST SP 800-152 for detailed information. A human entity authorized to access stored key information in key ...

Read More

Keystroke Monitoring

Keystroke Monitoring

The process used to view or record both the keystrokes entered by a computer user and the computer’s response during an interactive session. Keystroke monitoring ...

Read More