List of Telecommunications Encryption Terms


This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.

  • A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
  • Bulk encryption
  • Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States.
  • Cipher
  • Cipher system
  • Cipher text
  • Ciphony
  • Civision
  • Codress message
  • COMSEC equipment
  • Cryptanalysis
  • Cryptographic key
  • CRYPTO (International Cryptology Conference)
  • Crypto phone
  • Data Encryption Standard (DES)
  • Decipher
  • Decode
  • Decrypt
  • DECT Standard Cipher
  • Descrambler
  • Dncipher
  • Encode
  • Encoding law
  • Encrypt
  • End-to-end encryption
  • group
  • IMSI-catcher – an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
  • Key distribution center (KDC)
  • Key management
  • Key stream
  • KSD-64
  • Link encryption
  • MISTY1
  • Multiplex link encryption
  • Net control station (NCS)
  • Null cipher
  • One-time pad
  • Over the Air Rekeying (OTAR)
  • Plaintext
  • PPPoX
  • Protected distribution system (PDS)
  • Protection interval (PI)
  • Pseudorandom number generator
  • Public-key cryptography
  • RED/BLACK concept
  • RED signal
  • Remote rekeying
  • Security management
  • Spoofing
  • STU-III – a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
  • Superencryption
  • Synchronous crypto-operation
  • Transmission security key (TSK)
  • Trunk encryption device (TED)
  • Type 1 encryption
  • Type 2 encryption
  • Type 3 encryption
  • Type 4 encryption
  • Unique key
  • VoIP VPN – combines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
  • ZRTP – a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.

Famous quotes containing the words list of, list and/or terms:

    My list of things I never pictured myself saying when I pictured myself as a parent has grown over the years.
    Polly Berrien Berends (20th century)

    Love’s boat has been shattered against the life of everyday. You and I are quits, and it’s useless to draw up a list of mutual hurts, sorrows, and pains.
    Vladimir Mayakovsky (1893–1930)

    The nineteenth century was completely lacking in logic, it had cosmic terms and hopes, and aspirations, and discoveries, and ideals but it had no logic.
    Gertrude Stein (1874–1946)