7. Glossary – Definitions
Side channel attack
Attack that does not concern the theoretical security method. It seeks out and exploits weaknesses in the practical means of implementation: human procedure, external behavior (computing time) of software or hardware (electromagnetic radiation, noise).
Vernam cipher/one-time pad
Symmetrical encryption based on the use of the XOR (exclusive OR) logic function, using unique (ephemeral) keys made of random bits that are the same size as the messages. This encryption has been shown to be tamper-proof (ITS), but difficult to implement due to the impossibility of truly secretly exchanging the encryption keys used (or disposable masks) between sender and receiver.
Forward secrecy
Term used in the QSC white paper, cryptographic property...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Glossary – Definitions
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!