««« »»»

III. DEFINITIONS

For the purposes of these Guidelines:

[40] “Authentication” means a function [mechanism] for establishing the validity of a claimed identity of a user, device or another entity in an information system.

[41] “Confidentiality” means the property [characteristic] that information is not made available or disclosed to unauthorised individuals, entities or processes.

[42] “Cryptography” means the discipline which embodies principles, means, and methods for the transformation of data in order to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation, and/or prevent its unauthorised use.

[43] “Cryptographic key” means a parameter used [in conjunctional] with an algorithm to transform, validate, authenticate, encrypt or decrypt data.

[44] “Cryptographic methods” means [the] hardware and [or] software techniques, services, systems and [or] products that are used for ensuring the confidentiality, authentication, integrity, and non-repudiation of data [ensuring the conf identiality and integrity of data, including authentication and non-repudiation mechanisms].

[45] “Data” means the representation of information in a [formalised] manner [in digital form] suitable for communication, interpretation, storage, or processing.

[46] “Decryption” means the transformation of encrypted data back to its original intelligible form (plaintext) by using a cryptographic method [key and cryptographic algorithm].

[47] “Encryption” means the transformation of data to produce unintelligible data [data which is unintelligible to a third party] (encrypted data) [to ensure its conf identiality] by using a cryptographic method [key and cryptographic algorithm].

[48] “Integrity of data” means the property [characteristic] that data has not been modified or altered in an unauthorised manner.

[49] “Lawful access” means the ability to access cryptographic keys or the plaintext of encrypted data granted to third-party individuals or entities, including government entities, in accordance with law. [access by third party individuals or entities, including governments, to plaintext of encrypted data, in accordance with law.] [access to plaintext of encrypted data or access to cryptographic keys allowed, recognised or sanctioned by law.] (7)

[50] “Key management system” means the [a] system for generation, storage, distribution, revocation, deletion, archiving and [or] application [use] of cryptographic keys.

[51] “Keyholder” means an [the] individual or entity [lawfully] in possession [and/or control] of cryptographic keys. A key holder is not necessarily a user of the key.

[52] “Non-repudiation” means a function [mechanism] for preventing an individual or entity from denying having performed a particular action related to data.

[53] “Plaintext” means intelligible data. the semantic content of which is available.

[54] [“User” means an [the] individual or entity that employs [uses] cryptographic methods, unless indicated otherwise by context.]

««back to main  forward »»