SafeDoXX for Safe EXIM Glossary of Terms
1. Asymmetric Encryption: In
asymmetric encryption, public key associated with the certificate is
used to encrypt data and corresponding private key is used to
decrypt data.
2. Automater: You can automate operations like
signing, encrypting, decrypting, verifying and CRL download here
3. Bulk Mailing: You can
sign/encrypt multiple documents and send each signed encrypted
document to a recipient.
4. Certificate Store: It is the repository to store
certificates.
5. Certification Authority: certificate authority is a trusted third
party that issues digital certificates and guarantees that the
public key really belongs to a specific person or entity.
6. Configuration Manager: Configuration Manager helps
you configure some basic parameters with respect to
Signing,Encryption,CRL Logs,SMTP and LDAP.
7. CRL: A periodically issued
list, digitally signed by a CA, of identified certificates that have
been suspended or revoked prior to their expiration dates. The list
generally indicates the CRL issuer's name, the date of issue, the
date of the next scheduled CRL issue, the suspended or revoked
certificates' serial numbers, and the specific times and reasons for
suspension and revocation.
8. Decryption -Decryption refers to the process of
getting the original file back, which was encrypted.
9. Digital Certificate: Digital Certificate's are the
electronic counterparts to driver licenses, passports, and
membership cards. You can present a Digital ID electronically to
prove your identity or your right to access information or services
online.
10. Digital Signature: The digital signature is a
non-forgeable piece of data that asserts that a named person wrote
or otherwise agreed to the document to which the signature is
attached.
11. Encryption Algorithm: It refers to the algorithm
used to encrypt data.
12. Encryption: Encryption refers to transformation of
data with a secret code in such a manner that only the intended user
can get back the data in its original form.
14. Non-Self Extractor: The type of output file
created when u sign and / encrypt a file which requires the end user
to have a reader
16. PKCS: The Public-Key Cryptography Standards are
specifications produced by RSA Laboratories in cooperation with
secure systems developers worldwide for the purpose of accelerating
the deployment of public-key cryptography
17. Private Key Password: A mathematical key (kept
secret by the holder) used to create digital signatures and,
depending upon the algorithm, to decrypt messages or files encrypted
(for confidentiality) with the corresponding public key.
18. Private Key: A mathematical key (kept secret by
the holder) used to create digital signatures and, depending upon
the algorithm, to decrypt messages or files encrypted (for
confidentiality) with the corresponding public key
19. Public key cryptography: A type of cryptography
that uses a key pair of mathematically related cryptographic keys.
The public key can be made available to anyone who wishes to use it
and can encrypt information or verify a digital signature; the
private key is kept secret by its holder and can decrypt information
or generate a digital signature.
20. Public Key Infrastructure: The architecture, organization,
techniques, practices, and procedures that collectively support the
implementation and operation of a certificate-based public key
cryptographic system
21. Public Key: A mathematical key that can be made
publicly available and which is used to verify signatures created
with its corresponding private key. Depending on the algorithm,
public keys are also used to encrypt messages or files, which can
then be decrypted with the corresponding private key.
22. Self-Extractor (.exe): The type of output file
created at the time of signing and/encrypting, which doesn't require
end user to have a reader
23. Sign: Sign is an operation to perform Digital
Signature on the selected document/s and which has
equivalent legal status as a hand written signature
24. Secure Hash Algorithm: An algorithm that maps or
translates one set of bits into another (generally smaller) set in
such a way that, it is computationally infeasible to find two
different messages that produce the same hash result using the same
algorithm.
25. Serial number: A value that unambiguously
identifies a certificate generated by a CA.
26. Smart card: A hardware token that incorporates one
or more integrated circuit (IC) chips to implement cryptographic
functions and that possesses some inherent resistance to tampering.
27. S/MIME: A specification of E-mail Security
exploiting cryptographic message syntax in an Internet Mime
environment.
28. SMTP Settings: SafeDoXX for Safe EXIM allows you
to set your SMTP settings.
29. .ssig: This is the
extension of the signed file
30. Symmetric Encryption: In symmetric encryption the
same keys are use to encrypt and decrypt data.
31. Time Stamping: A notation that indicates (at
least) the correct date and time of an action, and identity of the person or device that
sent or received the time stamp.
32. Verification Status: This displays the status of
verification
33. Verify: It refers to authenticating or validating
the signer's identity.
|