「[[マイクロソフト系技術情報 Wiki>http://techinfoofmicrosofttech.osscons.jp/]]」は、「[[Open棟梁Project>https://github.com/OpenTouryoProject/]]」,「[[OSSコンソーシアム .NET開発基盤部会>https://www.osscons.jp/dotNetDevelopmentInfrastructure/]]」によって運営されています。 -[[戻る>暗号化アルゴリズム]] * 目次 [#wa45e5f5] #contents *概要 [#u7df7499] -Internet Security Glossary, Version 2(2007)~ (インターネットセキュリティ用語集、バージョン2) -FC 2828(2000)のセキュリティ用語集に大幅な改訂と大幅な拡張をしている。 -インターネット・スタンダードではなく、著者の意見のみを表した用語集の勧告。 -IDOCのセキュリティ関連コンテンツの理解度を向上させることを目的としている。~ IDOC:インターネット標準プロセス(RFC2026:インターネット標準化過程など)で生成された文書 **エントリーのフォーマット [#j1c7360d] ***エントリーの順序 [#rb1999da] 大文字と小文字を区別せず、辞書順にソートされる。 -数字:先行するアルファベット文字として扱われる。 -特殊文字:先行する数字として扱われる。 -ブランク:先行する非空白文字として扱われる。~ ただし、区切り文字はブランクとして扱われる。 -エントリに複数の定義がある場合、~ 「1」で始まる番号が付けられ、提示される。 -定義が密接に関連している場合、~ 「1a」や「1b」などの文字を追加して提示される。 ***大文字と略語 [#c14d6d58] -固有名詞であるエントリは大文字。 -他のすべてのエントリは大文字ではない。 -略語が、この用語集に定義されています。 --aka --eg --etc. --ie --vol --pp --US ***自動検索のサポート [#o3062d05] -各エントリの前にはドル記号($)とスペースがある。 -「$ X」を検索することで文中ではなく定義項目自体を検索可。 ***定義タイプとコンテキスト [#m5371ffd] -各エントリの前には、括弧で囲まれた文字で[[定義のタイプ>#s25e1ae8]]を示す -コンテキスト・品詞が定義タイプの直後に示され、スラッシュ記号(/)で囲まれる。 --定義が特定のコンテキストにおいてのみ有効である場合、 --定義が特定の品詞に対してのみ有効である場合、 ***, etc. [#zde56018] **定義タイプ [#s25e1ae8] I、N、O、またはDとしてマークされる。 ***タイプ "I" [#rd350fe8] インターネット起源の推奨用語または定義 -十分に一般的な用語。 -または、インターネット標準プロセスまたはインターネットコミュニティ~ が定義した権威あるものであることを意味する。 ***タイプ "N" [#p4d8bb73] インターネット起源でない推奨用語または定義 -用語と定義をIDOCで使用することを推奨する。 -多くの場合、固有名詞(例えば、「インターネットプロトコル」)など。 -ただし、一部に、制限(「証明」など)を示す「使用」注記が付随する場合がある。 -また、限定されたコンテキスト外で定義された用語を使用しない。 ***タイプ "O" [#x49425bc] IDOCでの使用は推奨されないが、インターネット文書の作成者が知っておくべき用語または定義 -エントリーがインターネット起源でないことを意味する。 -IDOCで必要とされる場合は、用語と定義をIDOCで使用することを推奨する。 -また、限定されたコンテキスト・制限を示す注釈を伴い、~ コンテキスト・制限の外に定義された用語を使用してはならない。 ***タイプ "D" [#eae1f1f6] インターネット文書で廃止され、推奨されない用語と定義で、注釈が提供される。 -廃止予定の用語 -推奨されない略語 -廃止予定の定義 -廃止された使用法 ***定義の置換 [#h6f31ef7] -一部の用語は、インターネット以外の機関によって発行された定義を持っている。~ この定義を「N」とマークし、インターネット文書での使用を推奨している。 -その他の用語には、IDOCには不適切または不適切な定義がある。 --例えば、定義が古くなったり狭すぎたりする場合。 --この場合、 ---より慎重な表現に置き換えるか、説明を明確にする。 ---「O」という項目をマークし、先行する「I」または「N」の項目を提供する。 *詳細(定義) [#zfdf82ae] ** [#r01a79ed] -$ *-property -$ 3DES **A English [#re33635e] -$ A1 computer system -$ AA -$ ABA Guidelines -$ Abstract Syntax Notation One (ASN.1) -$ ACC -$ acceptable risk -$ access -$ Access Certificate for Electronic Services (ACES) -$ access control -$ access control center (ACC) -$ access control list (ACL) -$ access control matrix -$ access control service -$ access level -$ access list -$ access mode -$ access policy -$ access profile -$ access right -$ accountability -$ accounting -$ accounting legend code (ALC) -$ accreditation -$ accreditation boundary -$ accreditor -$ ACES -$ ACL -$ acquirer -$ activation data -$ active attack -$ active content -$ active user -$ active wiretapping -$ add-on security -$ adequate security -$ administrative security -$ administrator -$ Advanced Encryption Standard (AES) -$ adversary -$ AES -$ Affirm -$ aggregation -$ AH -$ air gap -$ ALC -$ algorithm -$ alias -$ Alice and Bob -$ American National Standards Institute (ANSI) -$ American Standard Code for Information Interchange (ASCII) -$ Anderson report -$ anomaly detection -$ anonymity -$ anonymizer -$ anonymous credential -$ anonymous login -$ ANSI -$ anti-jam -$ apex trust anchor -$ API -$ APOP -$ Application Layer -$ application program -$ architecture -$ archive -$ ARPANET -$ ASCII -$ ASN.1 -$ asset -$ association -$ assurance -$ assurance level -$ asymmetric cryptography -$ asymmetric key -$ ATIS -$ attack -$ attack potential -$ attack sensing, warning, and response -$ attack tree -$ attribute -$ attribute authority (AA) -$ attribute certificate -$ audit -$ audit log -$ audit service -$ audit trail -$ AUTH -$ authenticate -$ authentication -$ authentication code~ (D)暗号に基づくチェックサムの同義語。~ インターネット標準文書は、...、この用語を使ってはいけない(SHOULD NOT)。~ (Compare: Data Authentication Code, Message Authentication Code.) -$ authentication exchange -$ Authentication Header (AH) -$ authentication information -$ authentication service -$ authenticity -$ authority -$ authority certificate -$ Authority Information Access extension -$ authorization -$ authorization credential -$ authorize -$ authorized user -$ automated information system -$ availability -$ availability service -$ avoidance **B English [#u872f2f2] -$ B1, B2, or B3 computer system -$ back door -$ back up -$ backup -$ bagbiter -$ baggage -$ baked-in security -$ bandwidth -$ bank identification number (BIN) -$ Basic Encoding Rules (BER) -$ Basic Security Option -$ bastion host -$ BBN Technologies Corp. (BBN) -$ BCA -$ BCR -$ BCI -$ Bell-LaPadula model -$ benign -$ benign fill -$ BER -$ beyond A1 -$ Biba integrity -$ Biba model -$ billet -$ BIN -$ bind -$ biometric authentication -$ birthday attack -$ bit -$ bit string -$ BLACK -$ BLACK/Crypto/RED (BCR) -$ BLACK key -$ BLACKER -$ blind attack -$ block -$ block cipher -$ Blowfish -$ brain-damaged -$ brand -$ brand certification authority (BCA) -$ brand CRL identifier (BCI) -$ break -$ Brewer-Nash model -$ bridge -$ bridge CA -$ British Standard 7799 -$ browser -$ brute force -$ BS7799 -$ buffer overflow -$ buffer zone -$ bulk encryption -$ bulk key -$ bulk keying material -$ bump-in-the-stack -$ bump-in-the-wire -$ business-case analysis -$ byte **C English [#c8b3780f] -$ C field -$ C1 or C2 computer system -$ CA -$ CA certificate -$ CA domain -$ Caesar cipher -$ call back -$ CAM -$ CANEWARE -$ capability list -$ capability token -$ Capability Maturity Model (CMM) -$ CAPI -$ CAPSTONE -$ card -$ card backup -$ card copy -$ card restore -$ cardholder -$ cardholder certificate -$ cardholder certification authority (CCA) -$ CAST -$ category -$ CAW -$ CBC -$ CCA -$ CCEP -$ CCI -$ CCITT -$ CCM -$ CERIAS -$ CERT -$ certificate -$ Certificate Arbitrator Module (CAM) -$ certificate authority -$ certificate chain -$ certificate chain validation -$ certificate creation -$ certificate expiration -$ certificate extension -$ certificate holder -$ certificate management -$ certificate management authority (CMA) -$ certificate owner -$ certificate path -$ certificate policy -$ certificate policy qualifier -$ certificate profile -$ certificate reactivation -$ certificate rekey -$ certificate renewal -$ certificate request -$ certificate revocation -$ certificate revocation list (CRL) -$ certificate revocation tree -$ certificate serial number -$ certificate status authority -$ certificate status responder -$ certificate update -$ certificate user -$ certificate validation -$ certification -$ certification authority (CA) -$ certification authority workstation (CAW) -$ certification hierarchy -$ certification path -$ certification policy -$ certification practice statement (CPS) -$ certification request -$ certify -$ CFB -$ chain -$ Challenge Handshake Authentication Protocol (CHAP) -$ challenge-response -$ Challenge-Response Authentication Mechanism (CRAM) -$ channel -$ channel capacity -$ CHAP -$ checksum -$ Chinese wall policy -$ chosen-ciphertext attack -$ chosen-plaintext attack -$ CIAC -$ CIK -$ cipher -$ cipher block chaining (CBC) -$ cipher feedback (CFB) -$ cipher text -$ ciphertext -$ ciphertext auto-key (CTAK) -$ ciphertext-only attack -$ ciphony -$ CIPSO -$ CKL -$ Clark-Wilson model -$ class 2, 3, 4, 5 -$ Class A1, B3, B2, B1, C2, or C1 computer system -$ classification -$ classification label -$ classification level -$ classified -$ classify -$ clean system -$ clear -$ clear text -$ clearance -$ clearance level -$ cleartext -$ CLEF -$ client -$ client-server system -$ CLIPPER -$ closed security environment -$ CMA -$ CMAC~ (N)対称ブロック暗号に基づくメッセージ認証コード --導出:暗号ベースのMAC。 (比較:HMAC。) --チュートリアル:CMACは、AESなどの承認された対称キーブロック暗号に基づいているため、~ CMACはこれらのブロック暗号の操作モードと考えることができる。(See: mode of operation.) -$ CMCS -$ CMM -$ CMS -$ code -$ code book -$ code signing -$ code word -$ COI -$ cold start -$ collateral information -$ color change -$ Commercial COMSEC Evaluation Program (CCEP) -$ commercially licensed evaluation facility (CLEF) -$ Committee on National Security Systems (CNSS) -$ Common Criteria for Information Technology Security -$ Common IP Security Option (CIPSO) -$ common name -$ communications cover -$ communication security (COMSEC) -$ community of interest (COI) -$ community risk -$ community string -$ compartment -$ compartmented security mode -$ Compartments field -$ component -$ compression -$ compromise -$ compromise recovery -$ compromised key list (CKL) -$ COMPUSEC -$ computer emergency response team (CERT) -$ Computer Incident Advisory Capability (CIAC) -$ computer network -$ computer platform -$ computer security (COMPUSEC) -$ computer security incident response team (CSIRT) -$ computer security object -$ Computer Security Objects Register (CSOR) -$ computer system -$ Computers At Risk -$ COMSEC -$ COMSEC account -$ COMSEC accounting -$ COMSEC boundary -$ COMSEC custodian -$ COMSEC material -$ COMSEC Material Control System (CMCS) -$ confidentiality -$ concealment system -$ configuration control -$ confinement property -$ constraint -$ content filter -$ contingency plan -$ control zone -$ controlled access protection -$ controlled cryptographic item (CCI) -$ controlled interface -$ controlled security mode -$ controlling authority -$ cookie -$ Coordinated Universal Time (UTC) -$ correction -$ correctness -$ correctness integrity -$ correctness proof -$ corruption -$ counter -$ counter-countermeasure -$ counter mode (CTR) -$ Counter with Cipher Block Chaining-Message Authentication Code -$ countermeasure -$ country code -$ Courtney's laws -$ covert action -$ covert channel -$ covert storage channel -$ covert timing channel -$ CPS -$ cracker -$ CRAM -$ CRC -$ credential -$ critical -$ critical information infrastructure -$ CRL -$ CRL distribution point -$ CRL extension -$ cross-certificate -$ cross-certification -$ cross-domain solution -$ cryptanalysis -$ crypto, CRYPTO -$ cryptographic -$ cryptographic algorithm -$ cryptographic application programming interface (CAPI) -$ cryptographic association -$ cryptographic boundary -$ cryptographic card -$ cryptographic component -$ cryptographic hash -$ cryptographic ignition key (CIK) -$ cryptographic key -$ Cryptographic Message Syntax (CMS) -$ cryptographic module -$ cryptographic system -$ cryptographic token -$ cryptography -$ Cryptoki -$ cryptology -$ cryptonet -$ cryptoperiod -$ cryptosystem -$ cryptovariable -$ CSIRT -$ CSOR -$ CTAK -$ CTR -$ cut-and-paste attack -$ cyclic redundancy check (CRC) **D English [#i2ea967b] -$ DAC -$ daemon -$ dangling threat -$ dangling vulnerability -$ DASS -$ data -$ Data Authentication Algorithm, data authentication algorithm -$ Data Authentication Code, data authentication code -$ data compromise -$ data confidentiality -$ data confidentiality service -$ Data Encryption Algorithm (DEA) -$ data encryption key (DEK) -$ Data Encryption Standard (DES) -$ data integrity -$ data integrity service -$ data origin authentication -$ data origin authentication service -$ data owner -$ data privacy -$ data recovery -$ data security -$ datagram -$ datagram confidentiality service -$ datagram integrity service -$ DEA -$ deception -$ decipher -$ decipherment -$ declassification -$ declassify -$ decode -$ decrypt -$ decryption -$ dedicated security mode -$ default account -$ defense in depth -$ Defense Information Infrastructure (DII) -$ Defense Information Systems Network (DISN) -$ degauss -$ degausser -$ DEK -$ delay -$ deletion -$ deliberate exposure -$ delta CRL -$ demilitarized zone (DMZ) -$ denial of service -$ DES -$ designated approving authority (DAA) -$ detection -$ deterrence -$ dictionary attack -$ Diffie-Hellman -$ Diffie-Hellman-Merkle -$ digest -$ digital certificate -$ digital certification -$ digital document -$ digital envelope -$ Digital ID(service mark) -$ digital key -$ digital notary -$ digital signature -$ Digital Signature Algorithm (DSA) -$ Digital Signature Standard (DSS) -$ digital watermarking -$ digitized signature -$ DII -$ direct attack -$ directory, Directory -$ Directory Access Protocol (DAP) -$ disaster plan -$ disclosure -$ discretionary access control -$ DISN -$ disruption -$ Distinguished Encoding Rules (DER) -$ distinguished name (DN) -$ distributed attack -$ Distributed Authentication Security Service (DASS) -$ distributed computing -$ distribution point -$ DKIM -$ DMZ -$ DN -$ DNS -$ doctrine -$ DoD -$ DOI -$ domain -$ Domain Keys Identified Mail (DKIM) -$ domain name -$ Domain Name System (DNS) -$ domain of interpretation (DOI) -$ dominate -$ dongle -$ downgrade -$ downgrade attack -$ draft RFC -$ Draft Standard -$ DSA -$ DSS -$ dual control -$ dual signature -$ dual-use certificate -$ duty **E English [#fc9c0975] -$ e-cash -$ EAP -$ EAL -$ Easter egg -$ eavesdropping -$ ECB -$ ECDSA -$ economy of alternatives -$ economy of mechanism -$ ECU -$ EDI -$ EDIFACT -$ EE -$ EES -$ effective key length -$ effectiveness -$ El Gamal algorithm -$ electronic codebook (ECB) -$ electronic commerce -$ electronic data interchange (EDI) -$ Electronic Key Management System (EKMS) -$ electronic signature -$ electronic wallet -$ elliptic curve cryptography (ECC) -$ Elliptic Curve Digital Signature Algorithm (ECDSA) -$ emanation -$ emanations analysis -$ emanations security (EMSEC) -$ embedded cryptography -$ emergency plan -$ emergency response -$ EMSEC -$ EMV -$ Encapsulating Security Payload (ESP) -$ encipher -$ encipherment -$ enclave -$ encode -$ encrypt -$ encryption -$ encryption certificate -$ end cryptographic unit (ECU) -$ end entity -$ end system -$ end-to-end encryption -$ end user -$ endorsed-for-unclassified cryptographic item (EUCI) -$ entity -$ entrapment -$ entropy -$ ephemeral -$ erase -$ error detection code -$ Escrowed Encryption Standard (EES) -$ ESP -$ Estelle -$ ETSI -$ EUCI -$ European Telecommunication Standards Institute (ETSI) -$ evaluated system -$ evaluation -$ evaluation assurance level (EAL) -$ expire -$ exposure -$ Extended Security Option -$ Extensible Authentication Protocol (EAP) -$ Extensible Markup Language (XML) -$ extension -$ external controls -$ extranet -$ extraction resistance -$ extrusion detection **F English [#db631134] -$ fail-safe -$ fail-secure -$ fail-soft -$ failure control -$ fairness -$ falsification -$ fault tree -$ FEAL -$ Federal Information Processing Standards (FIPS) -$ Federal Public-key Infrastructure (FPKI) -$ Federal Standard 1027 -$ File Transfer Protocol (FTP) -$ fill device -$ filter -$ filtering router -$ financial institution -$ fingerprint -$ FIPS -$ FIPS PUB 140 -$ FIREFLY -$ firewall -$ firmware -$ FIRST -$ flaw -$ flaw hypothesis methodology -$ flooding -$ flow analysis -$ flow control -$ For Official Use Only (FOUO) -$ formal -$ formal access approval -$ Formal Development Methodology -$ formal model -$ formal proof -$ formal specification -$ formal top-level specification -$ formulary -$ FORTEZZA(trademark) -$ Forum of Incident Response and Security Teams (FIRST) -$ forward secrecy -$ FOUO -$ FPKI -$ fraggle attack -$ frequency hopping -$ fresh -$ FTP **G English [#gccd9834] -$ gateway -$ GCA -$ GDOI -$ GeldKarte -$ GeneralizedTime -$ Generic Security Service Application Program Interface (GSS-API) -$ geopolitical certificate authority (GCA) -$ GIG -$ Global Information Grid (GIG) -$ good engineering practice(s) -$ granularity -$ Green Book -$ Group Domain of Interpretation (GDOI) -$ group identity -$ group security association -$ GSS-API -$ guard -$ guest login -$ GULS -$ Gypsy verification environment **H English [#qc3126d3] -$ H field -$ hack -$ hacker -$ handle -$ handling restriction -$ Handling Restrictions field -$ handshake -$ Handshake Protocol -$ harden -$ hardware -$ hardware error -$ hardware token -$ hash code -$ hash function -$ hash result -$ hash value -$ HDM -$ Hierarchical Development Methodology (HDM) -$ hierarchical PKI -$ hierarchy management -$ hierarchy of trust -$ high-assurance guard -$ hijack attack -$ HIPAA -$ HMAC~ (I)HMACの暗号強度が選択された暗号ハッシュの特性に依存するように、~ 任意の反復暗号ハッシュ(例えばMD5またはSHA-1)に基づくことができるキー付きハッシュ --導出~ ハッシュベースのMAC。(比較:CMAC。) --チュートリアル~ HMACは、「H(K XOR OPAD, H(K XOR IPAD, inputdata))」によって計算される。 ---Hは長さBバイトのデータブロックで関数が反復される一般的な暗号ハッシュと仮定。~ LはHのハッシュ結果の長さ。Kは長さの秘密鍵。L≦K≦B。 ---内側パディング(IPAD)、外側パディング(OPAD)に使用される固定ストリング~ IPAD = 0x36はB回、OPAD = 0x5CはB回繰り返される。 --目標 ---利用可能な暗号化ハッシュ関数を変更せずに使用すること。~ 特に、ソフトウェアでうまく機能し、ソフトウェアが自由に広く利用可能であること。 ---選択されたハッシュの元のパフォーマンスを大幅に低下させることなく保持する。 ---簡単な方法でキーを使用して処理する。 ---基盤となるハッシュ関数についての合理的な仮定に基づいて、~ メカニズムの強さについて十分に理解された暗号解析を行う。 ---より高速・強力なハッシュが見つかった場合や必要な場合、ハッシュ関数を簡単に置き換える。 -$ honey pot -$ host -$ HTML -$ HTTP -$ https -$ human error -$ hybrid encryption -$ hyperlink -$ hypermedia -$ hypertext -$ Hypertext Markup Language (HTML) -$ Hypertext Transfer Protocol (HTTP) **I English [#u4ca8fc8] -$ IAB -$ IANA -$ IATF -$ ICANN -$ ICMP -$ ICMP flood -$ ICRL -$ IDEA -$ identification -$ identification information -$ Identification Protocol -$ identifier -$ identifier credential -$ identifying information -$ identity -$ identity-based security policy -$ identity proofing -$ IDOC -$ IDS -$ IEEE -$ IEEE 802.10 -$ IEEE P1363 -$ IESG -$ IETF -$ IKE -$ IMAP4 -$ IMAP4 AUTHJATICATE -$ impossible -$ in the clear -$ Ina Jo -$ incapacitation -$ incident -$ INCITS -$ indicator -$ indirect attack -$ indirect certificate revocation list (ICRL) -$ indistinguishability -$ inference -$ inference control -$ INFOCON -$ informal -$ information -$ information assurance -$ Information Assurance Technical Framework (IATF) -$ information domain -$ information domain security policy -$ information flow policy -$ information operations condition (INFOCON) -$ information security (INFOSEC) -$ information system -$ Information Technology Security Evaluation Criteria (ITSEC) -$ INFOSEC -$ ingress filtering -$ initialization value (IV) -$ initialization vector -$ insertion -$ inside attack -$ insider -$ inspectable space -$ Institute of Electrical and Electronics Engineers, Inc. (IEEE) -$ integrity -$ integrity check -$ integrity label -$ intelligent threat -$ interception -$ interference -$ intermediate CA -$ internal controls -$ International Data Encryption Algorithm (IDEA) -$ International Standard -$ International Traffic in Arms Regulations (ITAR) -$ internet, Internet -$ Internet Architecture Board (IAB) -$ Internet Assigned Numbers Authority (IANA) -$ Internet Control Message Protocol (ICMP) -$ Internet Corporation for Assigned Names and Numbers (ICANN) -$ Internet-Draft -$ Internet Engineering Steering Group (IESG) -$ Internet Engineering Task Force (IETF) -$ Internet Key Exchange (IKE) -$ Internet Layer -$ Internet Message Access Protocol, version 4 (IMAP4) -$ Internet Open Trading Protocol (IOTP) -$ Internet Policy Registration Authority (IPRA) -$ Internet Private Line Interface (IPLI) -$ Internet Protocol (IP) -$ Internet Protocol security -$ Internet Protocol Security Option (IPSO) -$ Internet Protocol Suite (IPS) -$ Internet Security Association and Key Management Protocol (ISAKMP) -$ Internet Society (ISOC) -$ Internet Standard -$ internetwork -$ intranet -$ intruder -$ intrusion -$ intrusion detection -$ intrusion detection system (IDS) -$ invalidity date -$ IOTP -$ IP -$ IP address -$ IP Security Option -$ IP Security Protocol (IPsec) -$ IPLI -$ IPRA -$ IPS -$ IPsec -$ IPSO -$ ISAKMP -$ ISO -$ ISO 17799 -$ ISOC -$ issue -$ issuer -$ ITAR -$ ITSEC -$ ITU-T -$ IV **J English [#gebc7b05] -$ jamming **K English [#z2760470] -$ KAK -$ KDC -$ KEA -$ KEK -$ Kerberos -$ kernel -$ Kernelized Secure Operating System (KSOS) -$ key -$ key agreement (algorithm or protocol) -$ key authentication -$ key-auto-key (KAK) -$ key center -$ key confirmation -$ key distribution -$ key distribution center (KDC) -$ key encapsulation -$ key-encrypting key (KEK) -$ key escrow -$ key establishment (algorithm or protocol) -$ Key Exchange Algorithm (KEA) -$ key generation -$ key generator -$ key length -$ key lifetime -$ key loader -$ key loading and initialization facility (KLIF) -$ key management -$ Key Management Protocol (KMP) -$ key material -$ key pair -$ key recovery -$ key space -$ key translation center -$ key transport (algorithm or protocol) -$ key update -$ key validation -$ keyed hash -$ keying material -$ keying material identifier (KMID) -$ Khafre -$ Khufu -$ KLIF -$ KMID -$ known-plaintext attack -$ kracker -$ KSOS, KSOS-6, KSOS-11 **L English [#h7ad8748] -$ L2F -$ L2TP -$ label -$ laboratory attack -$ LAN -$ land attack -$ Language of Temporal Ordering Specification (LOTOS) -$ lattice -$ lattice model -$ Law Enforcement Access Field (LEAF) -$ Layer 1, 2, 3, 4, 5, 6, 7 -$ Layer 2 Forwarding Protocol (L2F) -$ Layer 2 Tunneling Protocol (L2TP) -$ LDAP -$ least common mechanism -$ least privilege -$ least trust -$ legacy system -$ legal non-repudiation -$ leap of faith -$ level of concern -$ level of robustness -$ Liberty Alliance -$ Lightweight Directory Access Protocol (LDAP) -$ link -$ link encryption -$ liveness -$ logic bomb -$ login -$ long title -$ low probability of detection -$ low probability of intercept -$ LOTOS **M English [#m428d765] -$ MAC~ (N)参照:必須アクセス制御、メッセージ認証コード。~ 廃止された使用法:省略形があいまいであるため、定義を述べるべき。 -$ magnetic remanence -$ main mode -$ maintenance hook -$ malicious logic -$ malware -$ MAN -$ man-in-the-middle attack -$ manager -$ mandatory access control -$ manipulation detection code -$ marking -$ MARS -$ Martian -$ masquerade -$ MCA -$ MD2 -$ MD4 -$ MD5 -$ merchant -$ merchant certificate -$ merchant certification authority (MCA) -$ mesh PKI -$ Message Authentication Code (MAC), message authentication code~ メッセージ認証コード(MAC)、メッセージ認証コード > +(N)/capitalized(大文字)/ --DES に基づく鍵付きハッシュで処理されたチェックサムについての ANSI 標準 [A9009] をいう。 --[[米国政府標準 Data Authentication Code [FP113]>https://csrc.nist.gov/publications/detail/fips/113/archive/1985-05-01]] としても知られている。 +(D) /not capitalized(小文字)/ 「error detection code」の同義語。 --推奨されない用語: 代わりに、意味に応じて、以下を使用。(See: authentication code.) ---checksum ---error detection code ---hash ---keyed hash ---Message Authentication Code ---protected checksum --小文字の場合、 ---「message」という単語は、誤解を招く。~ なぜなら、そのメカニズムが電子メールに特に適しているか、または電子メールに限定されていることを意味するため (see: Message Handling Systems)。 ---「認証(authentication)」という単語は、誤解を招く。~ なぜなら、このメカニズムは、主に、認証機能ではなく、データインテグリティ機能を提供するから。 ---「コード(code)」という単語は、誤解を招く。~ なぜなら、「コード化もしくは暗号化に関すること」か「この用語はコンピュータソフトウェアを言うこと」のいずれかを意味するから。 -$ message digest -$ message handling system -$ Message Handling System -$ message indicator -$ message integrity check -$ message integrity code (MIC) -$ Message Security Protocol (MSP) -$ meta-data -$ metadata, Metadata(trademark), METADATA(trademark) -$ MHS -$ MIC -$ MIME -$ MIME Object Security Services (MOSS) -$ Minimum Interoperability Specification for PKI Components (MISPC) -$ misappropriation -$ MISPC -$ MISSI -$ MISSI user -$ mission -$ mission critical -$ mission essential -$ misuse -$ misuse detection -$ MLS -$ mobile code -$ mode -$ mode of operation > +(I) [[/cryptographic operation/>暗号化アルゴリズム#s2956a2c]]~ データブロックのシーケンスまたはデータストリームにブロック暗号を適用するなど、~ 暗号アルゴリズムの効果を強化したり、アルゴリズムをアプリケーションに適合させるための手法。~ (See: CBC, CCM, CMAC, CFB, CTR, ECB, OFB.) +(I) /system operation/~ --システムが処理することを許可されている情報の分類レベルの範囲と、~ システムへのアクセスを許可されたユーザーの認可上限と許可の範囲を示すセキュリティポリシーの一種。~ --See: ---compartmented security mode ---controlled security mode ---dedicated security mode ---multilevel security mode ---partitioned security mode ---system-high security mode --Compare: ---protection level +(I) /IKE/ --メッセージのさまざまな種類のISAKMPスクリプト化された交換を「モード」と呼ぶ。 --これらの中には以下のものがある: ---メインモード:IKEの2つのフェーズ1モードの1つ (See: ISAKMP。) ---クイックモード:IKEの唯一のフェーズ2モード(See: ISAKMP。) -$ model -$ modulus -$ Mondex -$ Morris Worm -$ MOSS -$ MQV -$ MSP -$ multicast security -$ Multics -$ multilevel secure (MLS) -$ multilevel security mode -$ Multipurpose Internet Mail Extensions (MIME) -$ mutual suspicion **N English [#qeb6684a] -$ name -$ naming authority -$ National Computer Security Center (NCSC) -$ National Information Assurance Partnership (NIAP) -$ National Institute of Standards and Technology (NIST) -$ National Reliability and Interoperability Council (NRIC) -$ national security -$ National Security Agency (NSA) -$ national security information -$ national security system -$ natural disaster -$ NCSC -$ need to know, need-to-know -$ network -$ Network Hardware Layer -$ Network Interface Layer -$ Network Layer Security Protocol (NLSP). -$ Network Substrate Layer -$ network weaving -$ NIAP -$ nibble -$ NIPRNET -$ NIST -$ NLSP -$ no-lone zone -$ no-PIN ORA (NORA) -$ node -$ nonce -$ non-critical -$ non-repudiation service -$ non-repudiation with proof of origin -$ non-repudiation with proof of receipt -$ non-volatile media -$ NORA -$ notarization -$ NRIC -$ NSA -$ null -$ NULL encryption algorithm **O English [#o7c12ae7] -$ OAKLEY -$ object -$ object identifier (OID) -$ object reuse -$ obstruction -$ OCSP -$ octet -$ OFB -$ off-line attack -$ ohnosecond -$ OID -$ Online Certificate Status Protocol (OCSP) -$ one-time pad -$ one-time password, One-Time Password (OTP) -$ one-way encryption -$ one-way function -$ onion routing -$ open security environment -$ open storage -$ Open Systems Interconnection (OSI) Reference Model (OSIRM) -$ operational integrity -$ operational security -$ operations security (OPSEC) -$ operator -$ OPSEC -$ ORA -$ Orange Book -$ organizational certificate -$ organizational registration authority (ORA) -$ origin authentication -$ origin authenticity -$ OSI, OSIRM -$ OSIRM Security Architecture -$ OTAR -$ OTP -$ out-of-band -$ output feedback (OFB) -$ outside attack -$ outsider -$ over-the-air rekeying (OTAR) -$ overload **P English [#bea65dd1] -$ P1363 -$ PAA -$ package -$ packet -$ packet filter -$ packet monkey -$ pagejacking -$ PAN -$ PAP -$ parity bit -$ partitioned security mode -$ PASS -$ passive attack -$ passive user -$ passive wiretapping -$ password -$ Password Authentication Protocol (PAP) -$ password sniffing -$ path discovery -$ path validation -$ payment card -$ payment gateway -$ payment gateway certification authority (SET PCA) -$ PC card -$ PCA -$ PCI -$ PCMCIA -$ PDS -$ PDU -$ peer entity authentication -$ peer entity authentication service -$ PEM -$ penetrate -$ penetration -$ penetration test -$ perfect forward secrecy -$ perimeter -$ periods processing -$ permanent storage -$ permission -$ persona certificate -$ personal identification number (PIN) -$ personal information -$ personality -$ personnel authentication system string (PASS) -$ personnel security -$ PGP(trademark) -$ phase 1 negotiation -$ phase 2 negotiation -$ phishing -$ Photuris -$ phreaking -$ physical destruction -$ physical security -$ piggyback attack -$ PIN -$ ping of death -$ ping sweep -$ PKCS -$ PKCS #5 -$ PKCS #7 -$ PKCS #10 -$ PKCS #11 -$ PKI -$ PKINIT -$ PKIX -$ plain text -$ plaintext -$ PLI -$ PMA -$ Point-to-Point Protocol (PPP) -$ Point-to-Point Tunneling Protocol (PPTP) -$ policy -$ policy approval authority -$ policy approving authority (PAA) -$ policy authority -$ policy certification authority (Internet PCA) -$ policy creation authority (MISSI PCA) -$ policy management authority (PMA) -$ policy mapping -$ policy rule -$ POP3 -$ POP3 APOP -$ POP3 AUTH -$ port scan -$ positive authorization -$ POSIX -$ Post Office Protocol, version 3 (POP3) -$ PPP -$ PPTP -$ preauthorization -$ precedence -$ preemption -$ Pretty Good Privacy(trademark) (PGP(trademark)) -$ prevention -$ primary account number (PAN) -$ principal -$ priority -$ privacy -$ Privacy Act of 1974 -$ Privacy Enhanced Mail (PEM) -$ private component -$ private extension -$ private key -$ Private Line Interface (PLI) -$ privilege -$ privilege management infrastructure -$ privileged process -$ privileged user -$ probe -$ procedural security -$ profile -$ proof-of-possession protocol -$ proprietary -$ protected checksum -$ protective packaging -$ protection authority -$ protection level -$ protection profile -$ protection ring -$ protective distribution system (PDS) -$ protocol -$ protocol control information (PCI) -$ protocol data unit (PDU) -$ protocol suite -$ proxy -$ proxy certificate -$ pseudorandom -$ pseudorandom number generator -$ public component -$ public key -$ public-key certificate -$ public-key cryptography -$ Public-Key Cryptography Standards (PKCS) -$ public-key forward secrecy (PFS) -$ public-key Kerberos -$ public-key infrastructure (PKI) -$ purge **Q English [#r2c852a5] -$ QUADRANT -$ qualified certificate -$ quick mode **R English [#c8451c76] -$ RA -$ RA domains -$ RADIUS -$ Rainbow Series -$ random -$ random number generator -$ RBAC -$ RC2, RC4, RC6 -$ read -$ realm -$ recovery -$ RED -$ RED/BLACK separation -$ Red Book -$ RED key -$ reference monitor -$ reflection attack -$ reflector attack -$ registered user -$ registration -$ registration authority (RA) -$ regrade -$ rekey -$ reliability -$ reliable human review -$ relying party -$ remanence -$ Remote Authentication Dial-In User Service (RADIUS) -$ renew -$ reordering -$ replay attack -$ repository -$ repudiation -$ Request for Comment (RFC) -$ residual risk -$ restore -$ reverse engineering -$ revocation -$ revocation date -$ revocation list -$ revoke -$ RFC -$ Rijndael -$ risk -$ risk analysis -$ risk assumption -$ risk avoidance -$ risk limitation -$ risk management -$ risk transference -$ Rivest Cipher #2 (RC2) -$ Rivest Cipher #4 (RC4) -$ Rivest Cipher #6 (RC6) -$ Rivest-Shamir-Adleman (RSA) -$ robustness -$ role -$ role-based access control -$ role certificate -$ root, root CA -$ root certificate -$ root key -$ root registry -$ ROT13 -$ router -$ RSA -$ rule -$ rule-based security policy -$ rules of behavior **S English [#d6946f9e] -$ S field -$ S-BGP -$ S-HTTP -$ S/Key -$ S/MIME -$ SAD -$ safety -$ SAID -$ salami swindle -$ salt -$ SAML -$ sandbox -$ sanitize -$ SAP -$ SASL -$ SCA -$ scavenging -$ SCI -$ SCIF -$ SCOMP -$ screen room -$ screening router -$ script kiddy -$ SDE -$ SDNS -$ SDU -$ seal -$ secret -$ secret key -$ secret-key cryptography -$ Secure BGP (S-BGP) -$ Secure Data Exchange (SDE) -$ Secure Data Network System (SDNS) -$ secure distribution -$ Secure Hash Algorithm (SHA) -$ Secure Hash Standard (SHS) -$ Secure Hypertext Transfer Protocol (S-HTTP) -$ Secure/MIME (S/MIME) -$ secure multicast -$ Secure Shell(trademark) (SSH(trademark)) -$ Secure Sockets Layer (SSL) -$ secure state -$ security -$ security architecture -$ Security Assertion Markup Language (SAML) -$ security association -$ Security Association Database (SAD) -$ security association identifier (SAID) -$ security assurance -$ security audit -$ security audit trail -$ security by obscurity -$ security class -$ security clearance -$ security compromise -$ security controls -$ security doctrine -$ security domain -$ security environment -$ security event -$ security fault analysis -$ security function -$ security gateway -$ security incident -$ security intrusion -$ security kernel -$ security label -$ security level -$ Security Level field -$ security management infrastructure (SMI) -$ security marking -$ security mechanism -$ security model -$ security parameters index (SPI) -$ security perimeter -$ security policy -$ Security Policy Database (SPD) -$ Security Protocol 3 (SP3) -$ Security Protocol 4 (SP4) -$ security-relevant event -$ security-sensitive function -$ security service -$ security situation -$ security target -$ security token -$ security violation -$ seed -$ selective-field confidentiality -$ selective-field integrity -$ self-signed certificate -$ semantic security -$ semiformal -$ sensitive -$ sensitive compartmented information (SCI) -$ sensitive compartmented information facility (SCIF) -$ sensitive information -$ sensitivity label -$ sensitivity level -$ separation of duties -$ serial number -$ Serpent -$ server -$ service data unit (SDU) -$ session -$ session key -$ SET(trademark) -$ SET private extension -$ SET qualifier -$ SET Secure Electronic Transaction(trademark) or SET(trademark) -$ SETCo -$ SHA, SHA-1, SHA-2 -$ shared identity -$ shared secret -$ shielded enclosure -$ short title -$ shroud -$ SHS -$ sign -$ signal analysis -$ signal intelligence -$ signal security -$ signature -$ signature certificate -$ signed receipt -$ signer -$ SILS -$ simple authentication -$ Simple Authentication and Security Layer (SASL) -$ Simple Key Management for Internet Protocols (SKIP) -$ Simple Mail Transfer Protocol (SMTP) -$ Simple Network Management Protocol (SNMP) -$ Simple Public Key Infrastructure (SPKI) -$ simple security property -$ single sign-on -$ singular identity -$ site -$ situation -$ SKEME -$ SKIP -$ SKIPJACK -$ slot -$ smart card -$ smart token -$ SMI -$ SMTP -$ smurf attack -$ sneaker net -$ Snefru -$ sniffing -$ SNMP -$ social engineering -$ SOCKS -$ soft TEMPEST -$ soft token -$ software -$ software error -$ SORA -$ source authentication -$ source integrity -$ SP3 -$ SP4 -$ spam -$ SPD -$ special access program (SAP) -$ SPI -$ SPKI -$ split key -$ split knowledge -$ spoof -$ spoofing attack -$ spread spectrum -$ spyware -$ SSH(trademark) -$ SSL -$ SSO -$ SSO PIN -$ SSO-PIN ORA (SORA) -$ Standards for Interoperable LAN/MAN Security (SILS) -$ star property -$ Star Trek attack -$ static -$ steganography -$ storage channel -$ storage key -$ stream cipher -$ stream integrity service -$ strength -$ strong -$ strong authentication -$ subject -$ subject CA -$ subnetwork -$ subordinate CA (SCA) -$ subordinate DN -$ subscriber -$ substitution -$ subsystem -$ superencryption -$ superuser -$ survivability -$ swIPe -$ syllabary -$ symmetric cryptography -$ symmetric key -$ SYN flood -$ synchronization -$ system -$ system architecture -$ system component -$ system entity -$ system high -$ system-high security mode -$ system integrity -$ system integrity service -$ system low -$ system resource -$ system security officer (SSO) -$ system user **T English [#u02aa2f3] -$ TACACS -$ TACACS+ -$ tamper -$ tamper-evident -$ tamper-resistant -$ tampering -$ target of evaluation (TOE) -$ TCB -$ TCC field -$ TCG -$ TCP -$ TCP/IP -$ TCSEC -$ TDEA -$ teardrop attack -$ technical non-repudiation -$ technical security -$ Telecommunications Security Word System (TSEC) -$ TELNET -$ TEMPEST -$ TEMPEST zone -$ Terminal Access Controller (TAC) Access Control System (TACACS) -$ TESS -$ The Exponential Encryption System (TESS) -$ theft -$ threat -$ threat action -$ threat agent -$ threat analysis -$ threat consequence -$ thumbprint -$ ticket -$ tiger team -$ time stamp -$ Time-Stamp Protocol -$ timing channel -$ TKEY -$ TLS -$ TLSP -$ TOE -$ token -$ token backup -$ token copy -$ token management -$ token restore -$ token storage key -$ top CA -$ top-level specification -$ TPM -$ traceback -$ tracker -$ traffic analysis -$ traffic-flow analysis -$ traffic-flow confidentiality (TFC) -$ traffic key -$ traffic padding -$ tranquility property -$ transaction -$ TRANSEC -$ Transmission Control Code field (TCC field) -$ Transmission Control Protocol (TCP) -$ transmission security (TRANSEC) -$ Transport Layer -$ Transport Layer Security (TLS) -$ Transport Layer Security Protocol (TLSP) -$ transport mode -$ transposition -$ trap door -$ trespass -$ Triple Data Encryption Algorithm -$ triple-wrapped -$ Trojan horse -$ trust -$ trust anchor -$ trust anchor CA -$ trust anchor certificate -$ trust anchor key -$ trust anchor information -$ trust chain -$ trust-file PKI -$ trust hierarchy -$ trust level -$ trusted -$ trusted CA -$ trusted certificate -$ Trusted Computer System Evaluation Criteria (TCSEC) -$ trusted computing base (TCB) -$ Trusted Computing Group (TCG) -$ trusted distribution -$ trusted key -$ trusted path -$ Trusted Platform Module (TPM) -$ trusted process -$ trusted public key -$ trusted recovery -$ trusted subnetwork -$ trusted system -$ Trusted Systems Interoperability Group (TSIG) -$ trustworthy system -$ TSEC -$ TSIG -$ tunnel -$ tunnel mode -$ two-person control -$ Twofish -$ type 0 product -$ type 1 key -$ type 1 product -$ type 2 key -$ type 2 product -$ type 3 key -$ type 3 product -$ type 4 key -$ type 4 product **U English [#seb3d287] -$ UDP -$ UDP flood -$ unauthorized disclosure -$ unauthorized user -$ uncertainty -$ unclassified -$ unencrypted -$ unforgeable -$ uniform resource identifier (URI) -$ uniform resource locator (URL) -$ uniform resource name (URN) -$ untrusted -$ untrusted process -$ UORA -$ update -$ upgrade -$ URI -$ URL -$ URN -$ user -$ user authentication service -$ User Datagram Protocol (UDP) -$ user identifier -$ user identity -$ user PIN -$ user-PIN ORA (UORA) -$ usurpation -$ UTCTime **V English [#j19ace09] -$ v1 certificate -$ v1 CRL -$ v2 certificate -$ v2 CRL -$ v3 certificate -$ valid certificate -$ valid signature -$ validate -$ validate vs. verify -$ validation -$ validity period -$ value-added network (VAN) -$ VAN -$ verification -$ verified design -$ verify -$ vet -$ violation -$ virtual private network (VPN) -$ virus -$ Visa Cash -$ volatile media -$ VPN -$ vulnerability **W English [#o4ce4acf] -$ W3 -$ W3C -$ war dialer -$ Wassenaar Arrangement -$ watermarking -$ weak key -$ web, Web -$ web of trust -$ web server -$ WEP -$ Wired Equivalent Privacy (WEP) -$ wiretapping -$ work factor -$ World Wide Web ("the Web", WWW) -$ World Wide Web Consortium (W3C) -$ worm -$ wrap -$ wrapping algorithm -$ wrapping key -$ write -$ WWW **X English [#t2022ad6] -$ X.400 -$ X.500 -$ X.509 -$ X.509 attribute certificate -$ X.509 certificate -$ X.509 certificate revocation list (CRL) -$ X.509 public-key certificate -$ X9 -$ XML -$ XML-Signature. **Y English [#be2d6815] -$ Yellow Book **Z English [#ded60bad] -$ zero-knowledge proof -$ zeroize -$ zombie -$ zone of control *参考 [#x43ba6bd] -RFC 4949 - Internet Security Glossary, Version 2~ https://tools.ietf.org/html/rfc4949 **rfc2828 [#t895f827] -https://www.ietf.org/rfc/rfc2828.txt~ https://www.ietf.org/rfc/rfc2828.txt **IPA [#d6dce6f5] -Internet Security Glossary(廃止) --https://www.ipa.go.jp/security/rfc/RFC2828EN.html --https://www.ipa.go.jp/security/rfc/RFC2828-00JA.html -Internet Security Glossary, Version 2 --https://www.ipa.go.jp/security/rfc/RFC4949-00EN.html --https://www.ipa.go.jp/security/rfc/RFC4949-00JA.html ---- Tags: [[:.NET開発]], [[:セキュリティ]], [[:暗号化]], [[:証明書]] Tags: [[:IT国際標準]], [[:.NET開発]], [[:セキュリティ]], [[:暗号化]], [[:証明書]]