- Branche: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
An encoding law in which an approximation to a curve defined by a smooth encoding law is obtained by a number of linear segments. Synonym piecewise linear encoding law.
Industry:Telecommunications
An encoding law in which an approximation to a curve defined by a smooth encoding law is obtained by a number of linear segments. Synonym piecewise linear encoding law.
Industry:Telecommunications
An encryption algorithm whose key consists of three DES (Data Encryption Standard) keys, which is also referred to as a key bundle. Note 1: A DES key consists of 64 binary digits ("0"s or "1"s) of which 56 bits are randomly generated and used directly by the algorithm. (The other 8 bits, which are not used by the algorithm, may be used for error detection. ) Note 2: Each TDEA encryption/decryption operation (as specified in ANSI X9. 52) is a compound operation of DES encryption and decryption operations. Let EK (I) and DK (I) represent the DES encryption and decryption of I using DES key K respectively. The following operations are TDEA encryption operation: the transformation of a 64-bit block I into a 64-bit block O that is defined as follows: O = EK3 (DK2 (EK1 (I) ). ) TDEA decryption operation: the transformation of a 64-bit block I into a 64-bit block O that is defined as follows: O = DK1 (EK2 (DK3 (I) ). ) The standard specifies the following keying options for bundle (K1, K2, K3) Keying Option 1: K1, K2, and K3 are independent keys; Keying Option 2: K1 and K2 are independent keys and K3 = K1; Keying Option 3: K1 = K2 = K3.
Industry:Telecommunications
An encryption key that provides privacy during a call and may be changed dynamically by the system.
Industry:Telecommunications
An encryption process or tool in which the results of text encryption depend on all relevant authentication elements.
Industry:Telecommunications
An encryption system that utilizes two keys, one called a public key (which is known to both the sender and the recipient of encrypted data,) and the other, called a private key (known only to the individual sending the data. ) Note: Data are encrypted with the private key and decrypted with the public key. Asymmetric encryption allows for the secure transfer of data.
Industry:Telecommunications
An encryption treatment applied to signaling or user data, which treatment is intended to prevent an unauthorized detector of the data from extracting information.
Industry:Telecommunications
An entity (e.g., human user or computer based entity) that attempts to access other entities.
Industry:Telecommunications
An entity comprised of the Regional Bell Operating Company's (RBOCs) who were ordered by the FCC to administer the SMS/800 at the advent of portability (May 1993. )
Industry:Telecommunications
An entity in a passive role to which a security policy applies.
Industry:Telecommunications