. . . . . . "List of telecommunications encryption terms"@en . . . . . . . . . . . . . "5357"^^ . . . . . . . . . . . "This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C. \n* A5/1 \u2013 a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. \n* Bulk encryption \n* Cellular Message Encryption Algorithm \u2013 a block cipher which was used for securing mobile phones in the United States. \n* Cipher \n* Cipher system \n* Cipher text \n* Ciphony \n* Civision \n* Codress message \n* COMSEC equipment \n* Cryptanalysis \n* Cryptographic key \n* CRYPTO (International Cryptology Conference) \n* \n* Crypto-shredding \n* Data Encryption Standard (DES) \n* Decipher \n* Decode \n* Decrypt \n* DECT Standard Cipher \n* Descrambler \n* \n* Encode \n* Encoding law \n* Encrypt \n* End-to-end encryption \n* group \n* IMSI-catcher \u2013 an eavesdropping device used for interception of cellular phones and usually is undetectable for users of mobile phones. \n* Key distribution center (KDC) \n* Key management \n* Key stream \n* KSD-64 \n* Link encryption \n* MISTY1 \n* Multiplex link encryption \n* (NCS) \n* Null cipher \n* One-time pad \n* Over the Air Rekeying (OTAR) \n* Plaintext \n* PPPoX \n* Protected distribution system (PDS) \n* (PI) \n* Pseudorandom number generator \n* Public-key cryptography \n* RED/BLACK concept \n* RED signal \n* \n* Security management \n* Spoofing \n* Squirt \u2013 to load or transfer code key from an electronic key storage device. See Over the Air Rekeying. \n* STU-III \u2013 a family of secure telephones introduced in 1987 by the National Security Agency for use by the United States government, its contractors, and its allies. \n* Superencryption \n* \n* Transmission security key (TSK) \n* (TED) \n* Type 1 encryption \n* Type 2 encryption \n* Type 3 encryption \n* Type 4 encryption \n* Unique key \n* VoIP VPN \u2013 combines voice over IP and virtual private network technologies to offer a method for delivering secure voice. \n* ZRTP \u2013 a cryptographic key-agreement protocol used in Voice over Internet Protocol (VoIP) phone telephony."@en . . . . "This is a list of telecommunications encryption terms. This list is derived in part from the Glossary of Telecommunication Terms published as Federal Standard 1037C. \n* A5/1 \u2013 a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. \n* Bulk encryption \n* Cellular Message Encryption Algorithm \u2013 a block cipher which was used for securing mobile phones in the United States. \n* Cipher \n* Cipher system \n* Cipher text \n* Ciphony \n* Civision \n* Codress message \n* COMSEC equipment \n* Cryptanalysis \n* Cryptographic key \n* CRYPTO (International Cryptology Conference) \n* \n* Crypto-shredding \n* Data Encryption Standard (DES) \n* Decipher \n* Decode \n* Decrypt \n* DECT Standard Cipher \n* Descrambler \n* \n* Encode \n* Encoding law \n* Encrypt \n* End-to-end "@en . . . . . . . . . . . "39352"^^ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "1082038100"^^ .