List of Telecommunications Encryption Terms


This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.

  • A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
  • Bulk encryption
  • Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States.
  • Cipher
  • Cipher system
  • Cipher text
  • Ciphony
  • Civision
  • Codress message
  • COMSEC equipment
  • Cryptanalysis
  • Cryptographic key
  • CRYPTO (International Cryptology Conference)
  • Crypto phone
  • Data Encryption Standard (DES)
  • Decipher
  • Decode
  • Decrypt
  • DECT Standard Cipher
  • Descrambler
  • Dncipher
  • Encode
  • Encoding law
  • Encrypt
  • End-to-end encryption
  • group
  • IMSI-catcher – an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
  • Key distribution center (KDC)
  • Key management
  • Key stream
  • KSD-64
  • Link encryption
  • MISTY1
  • Multiplex link encryption
  • Net control station (NCS)
  • Null cipher
  • One-time pad
  • Over the Air Rekeying (OTAR)
  • Plaintext
  • PPPoX
  • Protected distribution system (PDS)
  • Protection interval (PI)
  • Pseudorandom number generator
  • Public-key cryptography
  • RED/BLACK concept
  • RED signal
  • Remote rekeying
  • Security management
  • Spoofing
  • STU-III – a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
  • Superencryption
  • Synchronous crypto-operation
  • Transmission security key (TSK)
  • Trunk encryption device (TED)
  • Type 1 encryption
  • Type 2 encryption
  • Type 3 encryption
  • Type 4 encryption
  • Unique key
  • VoIP VPN – combines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
  • ZRTP – a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.

Famous quotes containing the words list of, list and/or terms:

    Modern tourist guides have helped raised tourist expectations. And they have provided the natives—from Kaiser Wilhelm down to the villagers of Chichacestenango—with a detailed and itemized list of what is expected of them and when. These are the up-to- date scripts for actors on the tourists’ stage.
    Daniel J. Boorstin (b. 1914)

    We saw the machinery where murderers are now executed. Seven have been executed. The plan is better than the old one. It is quietly done. Only a few, at the most about thirty or forty, can witness [an execution]. It excites nobody outside of the list permitted to attend. I think the time for capital punishment has passed. I would abolish it. But while it lasts this is the best mode.
    Rutherford Birchard Hayes (1822–1893)

    Of course I’m a black writer.... I’m not just a black writer, but categories like black writer, woman writer and Latin American writer aren’t marginal anymore. We have to acknowledge that the thing we call “literature” is more pluralistic now, just as society ought to be. The melting pot never worked. We ought to be able to accept on equal terms everybody from the Hassidim to Walter Lippmann, from the Rastafarians to Ralph Bunche.
    Toni Morrison (b. 1931)