- Secure Hash Algorithm-3 A cryptographic hash function that was announced as the winner of the NIST hash function competition in 2012. Despite being part of the same family, SHA-3 is fundamentally different from SHA-1 and SHA-2, offering better performance and resistance against potential vulnerabilities. SHA-3 can be used for creating hash values to ensure data integrity, generating unique identifiers for data, and creating digital signatures, among other uses.
- Secure Hash Algorithm (SHA) A group of cryptographic hash functions designed to ensure data integrity. By producing a fixed-size hash value from variable input data, SHA helps verify unchanged data transfer, confirm file authenticity, and securely store passwords.
- Secure Hashing Algorithm (SHA-1) A cryptographic hash function that produces a 160-bit hash value, which is typically rendered as a 40-digit hexadecimal number. SHA-1 is part of the Secure Hash Algorithm family designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It was widely used for security applications and protocols, including TLS and SSL, PGP, SSH, and IPsec. However, SHA-1 is no longer considered secure against well-funded attackers; as of 2005, theoretical weaknesses were discovered, and over time, practical attacks have demonstrated the ability to produce collisions (two different inputs that result in the same hash value). As a result, it has been recommended to transition to stronger hash functions such as SHA-256 or SHA-3.
- Secure hash standard A set of cryptographic hash functions that include SHA-1, SHA-2, and SHA-3, as approved and published by the National Institute of Standards and Technology (NIST) in the United States. These algorithms are widely used to verify data integrity and authenticity. The Secure Hash Standard plays a critical role in many security protocols and applications to provide assurances of data integrity.
- Secure Hypertext Transfer Protocol (S-HTTP) S-HTTP was an extension of HTTP to support the secure exchange of data over the internet. However, it has not been widely adopted, and its use has been largely superseded by HTTPS, which combines HTTP with the SSL/TLS protocol to provide a secure browsing experience.
- Secure/Multipurpose Internet Mail Extensions (S/MIME)S/MIME is a protocol for sending digitally signed and encrypted messages. It ensures the confidentiality of email content, authenticates the sender, confirms message integrity, and prevents message tampering in transit, which is essential for secure communication.
- Secure Shell (SSH) A network protocol that enables secure remote login and other secure network services over an unsecured network. SSH provides robust authentication and secure encrypted data communication between two computers connecting over an open network, ensuring the confidentiality and integrity of data transmitted. It is widely used by network administrators for remotely controlling servers and applications.
- Secure Socket Layer (SSL) A cryptographic protocol designed to provide secure communications over a computer network. SSL uses a combination of public key and symmetric key encryption to secure a connection between two machines, typically a web server and a client, over the internet. It was widely used for securing data transfer, ensuring the privacy and integrity of information, and verifying the identity of parties involved in the communication through the use of digital certificates. SSL has been superseded by Transport Layer Security (TLS), an updated and more secure version of the protocol, and while the term SSL is still commonly used, most underlying systems actually use TLS.
- Secure State A state of security in which an information system is protected against unauthorized access, use, disclosure, disruption, modification, or destruction. It is used in security planning and risk management. Examples include the secure state of a computer system, the secure state of a network, and the secure state of a building.
- Secure Subsystem A subsystem of an information system that is designed and implemented to protect the system against unauthorized access, use, disclosure, disruption, modification, or destruction. It is used in security architecture and design. Examples include firewalls, intrusion detection systems, and encryption algorithms.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.