List of Telecommunications Encryption Terms


This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C.

  • A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
  • Bulk encryption
  • Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States.
  • Cipher
  • Cipher system
  • Cipher text
  • Ciphony
  • Civision
  • Codress message
  • COMSEC equipment
  • Cryptanalysis
  • Cryptographic key
  • CRYPTO (International Cryptology Conference)
  • Crypto phone
  • Data Encryption Standard (DES)
  • Decipher
  • Decode
  • Decrypt
  • DECT Standard Cipher
  • Descrambler
  • Dncipher
  • Encode
  • Encoding law
  • Encrypt
  • End-to-end encryption
  • group
  • IMSI-catcher – an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones.
  • Key distribution center (KDC)
  • Key management
  • Key stream
  • KSD-64
  • Link encryption
  • MISTY1
  • Multiplex link encryption
  • Net control station (NCS)
  • Null cipher
  • One-time pad
  • Over the Air Rekeying (OTAR)
  • Plaintext
  • PPPoX
  • Protected distribution system (PDS)
  • Protection interval (PI)
  • Pseudorandom number generator
  • Public-key cryptography
  • RED/BLACK concept
  • RED signal
  • Remote rekeying
  • Security management
  • Spoofing
  • STU-III – a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies.
  • Superencryption
  • Synchronous crypto-operation
  • Transmission security key (TSK)
  • Trunk encryption device (TED)
  • Type 1 encryption
  • Type 2 encryption
  • Type 3 encryption
  • Type 4 encryption
  • Unique key
  • VoIP VPN – combines voice over IP and virtual private network technologies to offer a method for delivering secure voice.
  • ZRTP – a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.

Famous quotes containing the words list of, list and/or terms:

    Thirty—the promise of a decade of loneliness, a thinning list of single men to know, a thinning brief-case of enthusiasm, thinning hair.
    F. Scott Fitzgerald (1896–1940)

    Do your children view themselves as successes or failures? Are they being encouraged to be inquisitive or passive? Are they afraid to challenge authority and to question assumptions? Do they feel comfortable adapting to change? Are they easily discouraged if they cannot arrive at a solution to a problem? The answers to those questions will give you a better appraisal of their education than any list of courses, grades, or test scores.
    Lawrence Kutner (20th century)

    Consider his life which was valueless
    In terms of employment, hotel ledgers, news files.
    Consider. One bullet in ten thousand kills a man.
    Ask. Was so much expenditure justified
    On the death of one so young and so silly
    Lying under the olive tree, O world, O death?
    Stephen Spender (1909–1995)