You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| algorithm |Mathematical function commonly used for data encryption, authentication, and digital signatures. |
21
+
| algorithm |Cryptographic function commonly used for data encryption, authentication, and digital signatures or other primitives.|
22
22
| certificate | An electronic document that is used to provide the identity or validate a public key. |
23
23
| protocol | A set of rules and guidelines that govern the behavior and communication with each other. |
24
24
| private-key | The confidential key of a key pair used in asymmetric cryptography. |
25
25
| public-key | The non-confidential key of a key pair used in asymmetric cryptography. |
26
26
| secret-key | A key used to encrypt and decrypt messages in symmetric cryptography. |
27
-
| key | A piece of information, usually a string of characters, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. |
27
+
| key | A piece of information, usually an octet string, which, when processed through a cryptographic algorithm, process cryptographic data.|
28
28
| ciphertext | The result of encryption performed on plaintext using an algorithm (or cipher). |
29
29
| signature | A cryptographic value that is calculated from the data and a key known only by the signer. |
30
30
| digest | The output of the hash function. |
@@ -34,7 +34,7 @@ CycloneDX can represent the following types of cryptographic assets:
34
34
| salt | A non-secret value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker. |
35
35
| shared-secret | A piece of data, known only to the parties involved, in a secure communication. |
36
36
| tag | A message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking a message. |
37
-
| additional-data |???? TODO ???? |
37
+
| additional-data |An unspecified collection of data with relevance to cryptographic activity.|
38
38
| password | A secret word, phrase, or sequence of characters used during authentication or authorization. |
39
39
| credential | Establishes the identity of a party to communication, usually in the form of cryptographic keys or passwords. |
40
40
| token | An object encapsulating a security identity. |
0 commit comments