7. Glossary – Definitions
side channel attack
Attack that does not concern the theoretical security method. It seeks out and exploits weaknesses in the practical means of implementation: human procedure, external behavior (computing time) of software or hardware (electromagnetic radiation, noise).
Vernam cipher; Vernam cipher/one-time pad
Symmetrical encryption based on the logical function XOR (exclusive OR) using unique (ephemeral) keys made of random bits that are the same size as the messages. This encryption has been shown to be tamper-proof (ITS), but difficult to implement due to the impossibility of truly secretly exchanging the encryption keys used (or disposable masks) between sender and receiver.
confidentilité persitante; forward secrecy
Term used in the QSC white paper, cryptographic...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Glossary – Definitions
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!