This HTML5 document contains 108 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n25http://www.cellular-news.com/story/
dbohttp://dbpedia.org/ontology/
n15http://dbpedia.org/resource/File:
foafhttp://xmlns.com/foaf/0.1/
n20https://books.google.com/
n14https://global.dbpedia.org/id/
n13http://www.its.bldrdoc.gov/fs-1037/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
n16http://dbpedia.org/resource/A5/
n22http://www.cnp-wireless.com/
n23http://csrc.nist.gov/publications/nistir/ir7298-rev1/
n4http://
n9http://commons.wikimedia.org/wiki/Special:FilePath/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
goldhttp://purl.org/linguistics/gold/
dbrhttp://dbpedia.org/resource/
n21http://dbpedia.org/resource/RED/

Statements

Subject Item
dbr:List_of_telecommunications_encryption_terms
rdfs:label
List of telecommunications encryption terms
rdfs:comment
This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C. * A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. * Bulk encryption * Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States. * Cipher * Cipher system * Cipher text * Ciphony * Civision * Codress message * COMSEC equipment * Cryptanalysis * Cryptographic key * CRYPTO (International Cryptology Conference) * * Crypto-shredding * Data Encryption Standard (DES) * Decipher * Decode * Decrypt * DECT Standard Cipher * Descrambler * * Encode * Encoding law * Encrypt * End-to-end
foaf:depiction
n9:President_George_W._Bush_Receives_Information_Regarding_Terrorist_Attacks.jpg n9:Ksd-64.jpg
dcterms:subject
dbc:Cryptography_lists_and_comparisons
dbo:wikiPageID
39352
dbo:wikiPageRevisionID
1082038100
dbo:wikiPageWikiLink
dbr:Public-key_cryptography dbr:ZRTP dbr:STU-III dbr:Secure_communication dbr:Key_distribution_center dbr:Type_2_encryption dbr:International_Cryptology_Conference dbr:Group_(mathematics) dbr:Decrypt dbr:Descrambler dbr:Encrypt dbr:One-time_pad dbr:Over_the_Air_Rekeying dbr:Crypto_phone dbr:Null_cipher dbr:Type_1_encryption dbr:CONDOR_secure_cell_phone dbr:Type_4_encryption dbr:Trunk_encryption_device dbr:VoIP_VPN dbr:Secure_telephone dbr:Key_management dbr:Bulk_encryption dbr:COMSEC_equipment dbr:Security_management dbr:National_Security_Agency dbr:Multiplex_link_encryption dbr:Synchronous_crypto-operation dbr:IMSI-catcher dbr:Data_Encryption_Standard dbr:Cipher_system dbr:Unique_key dbr:Cellular_Message_Encryption_Algorithm dbr:Stream_cipher dbr:PPPoX dbr:Cryptographic_key dbr:Remote_rekeying dbr:RED_signal dbr:Cryptography_standards n15:President_George_W._Bush_Receives_Information_Regarding_Terrorist_Attacks.jpg dbr:Cipher_text n16:1 dbr:Virtual_private_network dbr:Key_stream dbr:Encoding_law dbr:Code dbc:Cryptography_lists_and_comparisons dbr:Privacy dbr:Voice_over_Internet_Protocol dbr:Global_System_for_Mobile_Communications dbr:Communications_security dbr:DECT_Standard_Cipher n21:BLACK_concept dbr:Telecommunication dbr:Dncipher dbr:Federal_Standard_1037C dbr:Spoofing_attack dbr:Cryptanalysis dbr:Plaintext dbr:KSD-64 dbr:Transmission_security_key dbr:Decipher n15:Ksd-64.jpg dbr:Superencryption dbr:Ciphony dbr:Net_control_station dbr:Pseudorandom_number_generator dbr:MISTY1 dbr:Protected_distribution_system dbr:Crypto-shredding dbr:Secure_voice dbr:Type_3_encryption dbr:Cipher dbr:End-to-end_encryption dbr:Cell_phone dbr:Codress_message dbr:Link_encryption dbr:Protection_interval
dbo:wikiPageExternalLink
n4:www.cellular-news.com n4:www.cnp-wireless.com n13:fs-1037c.htm n20:books%3Fid=xGMB9vIV5V8C&printsec=frontcover%23v=onepage&q&f=false n22:glossary.html n23:nistir-7298-revision1.pdf n25:14594.php
owl:sameAs
wikidata:Q6642549 n14:4qhrz
dbp:wikiPageUsesTemplate
dbt:Short_description dbt:ISBN dbt:Cryptography_navbox dbt:Reflist dbt:Spaced_ndash dbt:Portal dbt:Div_col dbt:Div_col_end
dbo:thumbnail
n9:President_George_W._Bush_Receives_Information_Regarding_Terrorist_Attacks.jpg?width=300
dbo:abstract
This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C. * A5/1 – a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. * Bulk encryption * Cellular Message Encryption Algorithm – a block cipher which was used for securing mobile phones in the United States. * Cipher * Cipher system * Cipher text * Ciphony * Civision * Codress message * COMSEC equipment * Cryptanalysis * Cryptographic key * CRYPTO (International Cryptology Conference) * * Crypto-shredding * Data Encryption Standard (DES) * Decipher * Decode * Decrypt * DECT Standard Cipher * Descrambler * * Encode * Encoding law * Encrypt * End-to-end encryption * group * IMSI-catcher – an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones. * Key distribution center (KDC) * Key management * Key stream * KSD-64 * Link encryption * MISTY1 * Multiplex link encryption * (NCS) * Null cipher * One-time pad * Over the Air Rekeying (OTAR) * Plaintext * PPPoX * Protected distribution system (PDS) * (PI) * Pseudorandom number generator * Public-key cryptography * RED/BLACK concept * RED signal * * Security management * Spoofing * Squirt – to load or transfer code key from an electronic key storage device. See Over the Air Rekeying. * STU-III – a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies. * Superencryption * * Transmission security key (TSK) * (TED) * Type 1 encryption * Type 2 encryption * Type 3 encryption * Type 4 encryption * Unique key * VoIP VPN – combines voice over IP and virtual private network technologies to offer a method for delivering secure voice. * ZRTP – a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony.
gold:hypernym
dbr:List
prov:wasDerivedFrom
wikipedia-en:List_of_telecommunications_encryption_terms?oldid=1082038100&ns=0
dbo:wikiPageLength
5357
foaf:isPrimaryTopicOf
wikipedia-en:List_of_telecommunications_encryption_terms