It certainly appears complicated to me! That's why I prepared this glossary!
AES | Advanced Encryption Standard |
Base64 | An ASP server side object |
block-cipher | A self-study course in block-cipher cryptanalysis |
CodeCon 2002 | The premier event in 2002 for the P2P, cypherpunk, and network/security application developer community. It is a workshop for developers of real-world applications that support individual liberties. All presentations were given by one of the active developers, and accompanied by a functional demo. |
connection agnosticity | ? |
cryptographic primitives | Symmetric, asymmetric and hybrid ciphers, authentication primitives and random number generators |
FCP | Fibre Channel Protocol(?) |
freenet | More on Freenet |
Freenet Client Protocol | Apparently something that hex-encodes numbers, allows one transaction per connection and square-brackets optional fields. |
Java SDK 1.3 | ? |
JMS | ? |
java.security.SecureRandom | This class provides a crytpographically strong pseudo-random number generator based on the SHA-1 hash algorithm. |
JUnit framework | ? |
According to Georg Thurner, a keyspace can be visualized by visualizing first the following:
| |
keyspace discovery protocol | ? |
libfreenet | A Freenet library written in C. It provides client functionality, as well as a lower-level API for sending and receiving messages over a Freenet connection, and for reading and writing raw data streams. |
Man in the Middle attack | Apparently the man in the middle has two faces, one of whom looks like you and one of whom looks like someone else. Guess which side faces you... |
NIST | National Institute of Standards and Technology |
OpenSSL | A collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. |
PKI | WorldCom's corporate Public Key Infrastructure (PKI) Encryption Certificate Policies |
PRNG | Software is intended only for use on Unix platforms such as Solaris, SCO, or HP/UX that do not have a cryptographically strong PRNG available |
security.TimerJitterEntropy.java | takes about 20 seconds to seed the generator with 160 bits on an IBM PC. |
Silent Bob | Your easy-to-use sound recording application ! |
Station-to-Station protocol(STS) | The three-pass variation of the basic Diffie-Hellman protocol. It allows the establishment of a shared secret key between two parties with mutual entitiy authentication and umutal explicit key authentication. The protocol also facilitates anonymity- the identities of A and B may be protected from eavesdroppers. The method employs digital signatures. |
twofish | a new block cipher to succeed the aging AES? |
unique-id | Examples include The Open Source Foundation's Universal Unique IDentifiers (UUIDs), Microsoft's Globally Unique IDentifiers (GUIDs) and the other Unique ID generator (such as the RMI based UID generator) |
Yarrow | A secure pseudorandom number generator |