List of Telecommunications Encryption Terms


This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.

  • A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
  • Bulk encryption
  • Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States.
  • Cipher
  • Cipher system
  • Cipher text
  • Ciphony
  • Civision
  • Codress message
  • COMSEC equipment
  • Cryptanalysis
  • Cryptographic key
  • CRYPTO (International Cryptology Conference)
  • Crypto phone
  • Data Encryption Standard (DES)
  • Decipher
  • Decode
  • Decrypt
  • DECT Standard Cipher
  • Descrambler
  • Dncipher
  • Encode
  • Encoding law
  • Encrypt
  • End-to-end encryption
  • group
  • IMSI-catcher – an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
  • Key distribution center (KDC)
  • Key management
  • Key stream
  • KSD-64
  • Link encryption
  • MISTY1
  • Multiplex link encryption
  • Net control station (NCS)
  • Null cipher
  • One-time pad
  • Over the Air Rekeying (OTAR)
  • Plaintext
  • PPPoX
  • Protected distribution system (PDS)
  • Protection interval (PI)
  • Pseudorandom number generator
  • Public-key cryptography
  • RED/BLACK concept
  • RED signal
  • Remote rekeying
  • Security management
  • Spoofing
  • STU-III – a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
  • Superencryption
  • Synchronous crypto-operation
  • Transmission security key (TSK)
  • Trunk encryption device (TED)
  • Type 1 encryption
  • Type 2 encryption
  • Type 3 encryption
  • Type 4 encryption
  • Unique key
  • VoIP VPN – combines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
  • ZRTP – a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.

Famous quotes containing the words list of, list and/or terms:

    Every morning I woke in dread, waiting for the day nurse to go on her rounds and announce from the list of names in her hand whether or not I was for shock treatment, the new and fashionable means of quieting people and of making them realize that orders are to be obeyed and floors are to be polished without anyone protesting and faces are to be made to be fixed into smiles and weeping is a crime.
    Janet Frame (b. 1924)

    Every morning I woke in dread, waiting for the day nurse to go on her rounds and announce from the list of names in her hand whether or not I was for shock treatment, the new and fashionable means of quieting people and of making them realize that orders are to be obeyed and floors are to be polished without anyone protesting and faces are to be made to be fixed into smiles and weeping is a crime.
    Janet Frame (b. 1924)

    The nineteenth century was completely lacking in logic, it had cosmic terms and hopes, and aspirations, and discoveries, and ideals but it had no logic.
    Gertrude Stein (1874–1946)