Version 4

17th June 2023

Glossary

The following are used as technical terms in this series of documents; each term is italicised on first occurrence in the main text and in cross-references within this glossary:

Advanced Encryption Standard (AES)
A modern encryption protocol using symmetric keys. The sender encrypts the message using the same key that the recipient will use to decrypt it. In command line mode, the key can either be typed in at run time or read from a file, the name of which is entered as a parameter on the command line. The key file must have a valid Byte Order Marker (BOM) at the start and must use the Unicode character set (UTF-16; UTF-8 does not work because it cannot provide a proper BOM). See also What is AES encryption and how does it work?
algorithm
A computational rule. In this series of papers, unless otherwise qualified, means a cryptographic algorithm used to encrypt and/or decrypt messages. Is used together with keys. Cryptographic algorithms are often open, free and in the public domain, are usually part of a software package (where applicable) provided by a distributor and are not user-modifiable. See also companion paper Background to Modern Cryptography section Traditional Cryptography.
asymmetric key
A key forming one half of a key pair. The two keys making up the key pair are different, but related in that plaintext data encrypted using either of the keys can only be decrypted by the other key of the same pair; in particular, it cannot be decrypted by the key that was used for encrypting the data. Used in Public Key Cryptography, also known as Asymmetric Key Cryptography.
atomic operation
An operation that is indivisible, in that it cannot be cut or divided into parts executed separately, but must be performed either in full or not at all.
Cæsar cipher
A coding algorithm in which each letter of the original text of a secret message is replaced by a different letter, obtained by a rotation of the letters of the alphabet through a specified number of places. For example, the letters of the word “cryptography”, when rotated by 13 places, yield “pelcgbtencul”. The number of places through which the letters are rotated is the key for this coding.
certificate
Properly called an X.509 certificate; an electronic document that, in PKI applications (including S/MIME), associates a Public Key with identity details of its owner and is digitally signed to certify the association. Defined in RFC 5280 as updated by RFC 6818; also RFC 5750. See also companion paper Implementing Cryptography section S/MIME.
certificate owner (also referred to as ‘subject’ or ‘keyholder’)
The person or entity that created (and so is presumed to own) the key pair, of which the Public Key is contained in the certificate referred to.
certificate revocation list (CRL)
A list of certificates which have been revoked by the certification authority that originally issued them and which certificate users should therefore not rely on. The CA publishes CRLs, with frequent (e.g. daily) updates; users keep their own local caches, which they need to update regularly from the latest CA lists. This has the advantage over the Online Certificate Status Protocol (OCSP) system that users can use CRLs even when not online to the internet, but the disadvantage that updating the CRL cache takes much time and internet bandwidth.
Certificate Signing Request (CSR)
An electronic document submitted by a would-be certificate owner to a certification authority, requesting the CA to issue a signed certificate. The CSR is essentially an unsigned draft certificate, which gives the Public Key and owner’s identity details to be included in the certificate (but not the owner’s Private Key, which never leaves the owner’s system). The CA validates the requested certificate content and, if it passes, signs the certificate and returns it to the owner.
certificate user (also referred to as ‘user’ or ‘relying party’)
In relation to a certificate: a person or entity who, for the purpose of encrypting an outgoing document or verifying an incoming document, uses (and relies on) that certificate as evidence of ownership of the Public Key contained in it.
certification authority (CA)
A trusted third party intermediary who validates, signs and issues certificates containing S/MIME type Public Keys. See also companion paper Implementing Cryptography section S/MIME.
ciphertext
Encrypted data, the result of applying encryption to plaintext data. Designed to be secure against cracking by cryptanalysis
decrypt
The inverse function to encryption. Usually, used to transform a piece of unintelligible ciphertext back into the intelligible plaintext from which it was derived. In the special case of digital signature creation, uses a decryption key to transform plaintext into ‘decrypted plaintext’ that is unintelligible unless re-encrypted.
decryption key
A key normally used to decrypt something. See Private Key.
digital signature
Data added to a document to prove the identity of the author and assure the reader that the document content is what the author actually wrote. Fulfils the same function as a manuscript signature on a written document.
domain
Part of the naming scheme used on a computer network such as the Internet or a local network. A domain groups together a set of network resources controlled or provided by the domain owner. Domain names on the Internet are issued by authorised registrars: ICANN for generic international domain names and local registrars for country-specific domain names (e.g. Nominet in the UK). These names are unique, constitute valuable property and can be bought and sold. Names of resources such as mail boxes, which form part of the domain, incorporate the domain name – e.g. ‘richard@rstonehouse.co.uk’ where ‘rstonehouse.co.uk’ is the domain name. A correspondent’s e‑mail address may be under their own domain name, if they have one, or under that of the Internet Service Provider or Web-mail service (e.g. google mail) who provides their e‑mail facility. See also WHOIS.
ElGamal
A public key encryption system using Diffie-Hellman key exchange.
Elliptic-curve Cryptography (ECC)
A family of modern public-key cryptographic algorithms, based on the properties of mathematical functions known as elliptic curves. Provide stronger cryptography, for a given key size, than RSA.
e-mail ping
A rough check that the person claiming to own an e‑mail address does, at least, have access to it; one of the steps in generating a personal certificate using a web browser. An e‑mail is sent to the purported owner at the e‑mail address they claim to own, inviting them to enter a particular web address into their browser in order to proceed. If the e‑mail address is invalid or the claimant does not have access to it, they will not receive the e‑mail and so will be unable to proceed. See also companion paper Implementing Cryptography, section S/MIME sub-section Personal Certificates and Appendix I sub-section CAcert.
encrypt
The inverse function to decryption. Usually, used to transform plaintext into unintelligible gibberish, known as ciphertext. In the special case of digital signature verification, uses an encryption key to transform a decrypted digital signature back into the original digital signature from which it was derived.
encryption key
A key normally used to encrypt something. See Public Key
end-to-end (E2E), end-to-end encryption (E2EE)
Communication in which the cryptographic protections (encryption and/or digital signature) are applied to messages by their original senders and verified by their final recipients, so that an operator of any computer that the messages happen to pass through on their journey between these two end-points cannot read and/or successfully interfere with the contents of the messages. This safeguards messages against malicious attackers who have broken into or compromised the communications network and also against operators acting under instructions from a government or a court order.
enterprise certificate
A certificate owned by a company or organisation. See also companion paper Implementing Cryptography section S/MIME sub-section Enterprise Certificates.
extended validation
Additional validation of a certificate to prove ownership of the internet domain, organisation identity and physical presence of the legal entity who owns the certificate.
fingerprint
A hash of the content of a Public Key, used to identify the Public Key.
forward secrecy (sometimes referred to as ‘perfect forward secrecy’, ‘disappearing messages’ or ‘exploding messages’)
Encryption that allows the encrypted information to be read for only a specified period of time and then to disappear for ever. See also companion document Implementing Cryptography section Forward Secrecy.
general method
Part of the cryptographic system that is available to all users and provides the protocols that carry out actions such as encryption and decryption of data. Often supplied as part of the software distribution installed on the user’s computer.
hash
A fixed-length data string, derived from an arbitrarily long string by applying a hashing algorithm to it. The algorithm is deterministic in that, applied to the same input, it will always yield the same hash. It is non-reversible; the original data cannot be recovered from the hash. The hash is not unique to the data string from which it is derived; it is possible that more than one input string could produce the same hash, but the hashing algorithm and size of the hash are usually chosen so that such ‘collisions’ are rare in practice and the hashes of different data strings are fairly uniformly distributed. The hash may therefore be used as a sum-check or an identifier of the data.
identity, identity details
Details that distinguish a unique individual person or organisation. See also companion paper Implementing Cryptography, section Identity in the Virtual World.
key
A unique identifier that is secret to an individual or group of users of the cryptographic system, and that controls and assists their use of the facilities provided by the general method algorithms. A symmetric key may contain all the information required to carry out its encryption or decryption function, but in the case of an asymmetric key it is more likely that the identifier will just be numeric (often hundreds of digits) and any additional information may be provided as supplementary meta-data. See also companion paper Background to Modern Cryptography section Requirements for Cryptography
key owner (also referred to as ‘owner’)
The person or entity who owns the Private Key of the key pair referred to.
key pair
A pair of asymmetric keys that are related in that, if a piece of data has been encrypted using one of the keys, it can only be decrypted by the other key of the same pair. In particular, it cannot be decrypted by the same key that was used for encryption. One of the keys is designated as the owner’s Private Key and the other as their Public Key..
key server
A public computer from which OpenPGP type keys can be downloaded.
keyholder
See certificate owner.
key user (also referred to as ‘user’)
In relation to a Public Key: a person or entity who uses and relies on it for encrypting an outgoing document or verifying an incoming document.
Man in the Middle (MITM)
An attacker who clandestinely intercepts and falsifies the communication between two legitimate users or their systems, with the aim of impersonating one or both of them to the other.
OCSP Responder
An online server, maintained by a certification authority, which provides the revocation status of the certificates that the CA has issued and are still within their validity periods. Can be queried using the Online Certificate Status Protocol (OCSP).
One-way function
A function that is very quick and easy to execute in one direction but effectively infeasible to execute in the reverse direction. See also Trapdoor one-way function.
Online Certificate Status Protocol (OCSP)
A means by which a certificate user can determine whether a certificate has been revoked by its certification authority to indicate that it should not be relied on. The CA notifies users of certificates’ revocation status through an online OCSP responder. This has the advantage over the alternative Certificate Revocation List (CRL) system that up-to-date status information is provided to the user instantly, but the disadvantage that it does not work when the user is offline from the internet.
OpenPGP
A cryptographic message format, defined in RFC 4880: OpenPGP Message Format. Discussed in companion paper Implementing Cryptography section OpenPGP.
passphrase
Like a password, only longer; used to protect a Private Key. Must be supplied by the user in order to carry out any operation using the Private Key. Usually consists of more than one word. See also companion paper Background to Modern Cryptography section Public Key Cryptography.
persona
A pseudonym by which an internet user chooses to be known online. It need bear no resemblance to their true identity and a single individual may use several different personas, for example when participating in different groups. See also companion paper Implementing Cryptography, section Identity in the Virtual World.
personal certificate
A certificate owned by an individual person. See also companion paper Implementing Cryptography section S/MIME sub-section Personal Certificates.
phishing
An attack using deception to extract secret information from an individual or organisation. The attacker makes contact with the individual victim, or person in the organisation who has access to the information (but of course ought not to disclose it), generally via telephone or electronic messaging. They may gain the victim’s trust by, for example, adopting a trusted person’s identity, impressive-looking (but false) credentials or a fake web-site. The aim is to trick the victim into either disclosing the information directly to the attacker or installing ‘spyware’ that, unknown to the victim, will extract the information from their computer system and deliver it to the attacker.
plaintext
Data that is not encrypted and is therefore intelligible to anyone.
platform
A web-site and its associated infrastructure that provides social media facilities to registered users, often via software that is proprietary to the owner of the platform and can only be used on that platform.
Private Key
A key that is kept secret by the person who owns it. You must not disclose your Private Key to anyone at all. The recipient of an encrypted message uses their Private Key to decrypt it. See also companion paper Background to Modern Cryptography section Public Key Cryptography.
procedure
In this paper, we refer to the combined action of a key and a general method algorithm, working together, as a procedure.
Public Key
A key that its owner makes public. You should have been given a Public Key by each of the contacts you want to send messages to, which you will use for encrypting messages to them. You should give a copy of your own Public Key to each of the contacts you want to receive messages from. See also companion paper Background to Modern Cryptography section Public Key Cryptography.
Public Key Infrastructure (PKI)
A network of certification authorities through whom the ownership of certificates is authenticated using a centralised trust model. Used by S/MIME for secure e-mail, by SSL for secure web-pages and by code-signing. Compare Web of Trust. Discussed in companion paper Implementing Cryptography section S/MIME sub-section Public Key Infrastructure.
relying party
See certificate user.
revocation status check
A check, carried out by cryptography software on a certificate user’s behalf, as to whether a certificate has been revoked. The user should set up their software to do this, either by searching the certification authority’s Certificate Revocation List or by querying the CA’s OCSP responder using the Online Certificate Status Protocol.
revoke
In relation to a certificate: give notice, as the certification authority who signed the certificate referred to, that it is to be regarded as invalid – for example because it has been compromised or the owner is in breach of the CA’s terms.
root certification authority (root CA)
A certification authority whose certificate is self-signed, and which therefore forms the head of a chain or tree structure of certificates.
RSA
One of the first public-key cryptographic algorithms, based on the problem of factorising large numbers. Still in widespread use at the time of writing. See Rivest, Shamir and Adleman: A method for obtaining digital signatures and public-key cryptosystems <https://people.csail.mit.edu/rivest/Rsapaper.pdf>.
safety number
An array of numbers identifying a user’s Public Key, to guard against possible alteration of the key by a Man in the Middle attacker during transmission from one user’s system to another. The user who receives the key checks its safety number against that of the key that was sent. Similar to a fingerprint but slightly more user-friendly.
self-signed certificate
A certificate in which the digital signature is made using this certificate itself rather than the certificate of a higher-level certification authority. Used for certification authorities’ root certificates and may also be used for the root certificate of a local certificate network within an organisation.
Signal protocol
A protocol, making heavy use of Diffie-Hellman key exchange, used in the Signal Messenger and WhatsApp cryptography applications.
S/MIME
A cryptographic message specification, defined in RFC 8551: Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification. Discussed in companion paper Implementing Cryptography section S/MIME.
SMS ping
A rough check that the person claiming to own a mobile telephone or device does, at least, have access to it, by sending an authorisation code to the phone or device via SMS and inviting the recipient to confirm receipt of the code by typing it in. Often used where the telephone number also serves as a user identifier.
subject
See certificate owner.
subordinate certification authority (subordinate CA)
A certification authority whose certificate is signed by a higher-level certification authority.
Surreptitious Forwarding
Forwarding of a confidential message by a person from within a supposedly secure environment to an outsider not entitled to receive it, while making the security breach appear to have been committed by the original author (who is innocent) and not by the forwarder. Naïve Sign & Encrypt is open to this exploit because the only cryptographic signature on the message is that of its author.
symmetric key
A key that can be used both for encrypting ordinary plaintext data into ciphertext and for decrypting the resulting ciphertext back into plaintext. Used in Traditional or Symmetric Key cryptography.
Trapdoor one-way function
A one-way function that can easily be reversed by using some special knowledge. See also Key Generation
Trust on First Use (TOFU)
A trust model, used in the New Cryptography and also in SSH and GnuPG, in which a Public Key is provisionally accepted without authentication. “Subsequent communication that is authenticated using the cached key … is secure against an MiTM attack, if such an attack did not succeed during the vulnerable initial communication.” See RFC 7435: Opportunistic Security: Some Protection Most of the Time.
two-factor authentication (2FA), two-step verification
A method of authentication that requires the candidate to provide two pieces of information drawn from different categories of the set: (1) something that they have; (2) something that they know; and (3) something that they are. See also companion paper Pros and Cons of Cryptography section 3. Stolen or Counterfeit Credentials.
two-step verification
See two-factor authentication (2FA).
user
See (according to context) key user, certificate user or user interface.
user interface
The style of interaction between the user of a computer and a system or program running on it. Examples are the traditional Command Line interface and the more modern Graphical User Interface.
Web of Trust (WoT)
A network of third-party intermediaries through whom the ownership of Public Keys is authenticated using a decentralised trust model. Used for OpenPGP secure e-mail. Compare Public Key Infrastructure. Discussed in companion paper Implementing Cryptography section OpenPGP sub-section Key Servers and Webs of Trust.
WHOIS
Services provided by Internet domain name registrars, giving limited public access to the registers that they maintain. WHOIS for the top-level register that contains the generic domains ending in .com, .org, .net etc. is provided by ICANN <https://whois.icann.org/en>. WHOIS for the individual country registers is delegated to local registrars; that for UK domains, ending in .uk, .cymru or .wales, is provided by Nominet UK <https://www.nominet.uk/whois/>. The register entries contain contact details for the domain owners, but this information is redacted from the WHOIS output unless the domain owner has consented to its being made public, or the enquirer is a law enforcement agency or has an approved reason for wanting the information.

Richard Stonehouse