U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

CA

Abbreviation(s) and Synonym(s):

certificate authority
Certificate Authority/Certificate Authorities
Controlling Authority
Cryptanalysis

Definition(s):

  A trusted entity that issues and revokes public key certificates.
Source(s):
NIST SP 1800-12b under Certification Authority
NIST SP 1800-16B under Certificate Authority from NISTIR 8149
NIST SP 1800-16D under Certificate Authority from NISTIR 8149
NISTIR 7711 under Certification Authority
FIPS 201 [version unknown] under Certification Authority

  Operations performed in defeating cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Cryptanalysis
NIST SP 800-57 Part 2 Rev.1 under Cryptanalysis
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptanalysis

  1. Operations performed to defeat cryptographic protection without an initial knowledge of the key employed in providing the protection.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptanalysis

  2. The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptanalysis

  The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or of the algorithm itself.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Cryptanalysis
NIST SP 800-57 Part 2 Rev.1 under Cryptanalysis

  1. Operations performed to defeat cryptographic protection without an initial knowledge of the key employed in providing the protection. 2. The study of mathematical techniques for attempting to defeat cryptographic techniques and information-system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Cryptanalysis

  The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or in the algorithm itself.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptanalysis