. . . . . . . "Red/black concept"@de . . "1065533"^^ . . . . . "The red/black concept, sometimes called the red\u2013black architectureor red/black engineering,refers to the careful segregation in cryptographic systems of signals that contain sensitive or classified plaintext information (red signals) from those that carry encrypted information, or ciphertext (black signals). Therefore, the red side is usually considered the internal side, and the black side the more public side, with often some sort of guard, firewall or data-diode between the two. In NSA jargon, encryption devices are often called blackers, because they convert red signals to black. TEMPEST standards spelled out in Tempest/ specify shielding or a minimum physical distance between wires or equipment carrying or processing red and black signals. Different organizations have differing requirements for the separation of red and black fiber optic cables. Red/black terminology is also applied to cryptographic keys. Black keys have themselves been encrypted with a \"key encryption key\" (KEK) and are therefore benign. Red keys are not encrypted and must be treated as highly sensitive material."@en . . . . . . "1102282134"^^ . . "Conceito vermelho/preto"@pt . . . . . . . "Red/black concept"@en . . . . . . . "\u7EA2/\u9ED1\u6982\u5FF5"@zh . . . . "O conceito vermelho/preto, \u00E0s vezes chamado de arquitetura vermelha preta ou engenharia vermelha/preto, se refere \u00E0 segrega\u00E7\u00E3o cuidadosa em sistemas criptogr\u00E1ficos de sinais que cont\u00EAm informa\u00E7\u00F5es confidenciais ou classificadas em texto simples (sinais vermelhos) daqueles que transportam informa\u00E7\u00F5es criptografadas ou em texto cifrado (sinais pretos). Portanto, o lado vermelho \u00E9 geralmente considerado o lado interno, e o lado preto o lado mais p\u00FAblico, geralmente com algum tipo de guarda, firewall ou diodo de dados entre os dois."@pt . "Das red/black concept (dt. rot/schwarz-Konzept) beschreibt eine sichere Abschottung in kryptografischen Umgebungen zwischen den unverschl\u00FCsselten (Plaintext) heiklen oder klassifizierten Informationen (red signals / rote Signale) von den verschl\u00FCsselten Informationen, auch Ciphertext genannt (black signals / schwarze Signale). Verschiedene Organisationen haben verschiedene Anforderungen f\u00FCr die Trennung von Red- und Black-Glasfaserkabeln. Die Red/Black-Terminologie wird au\u00DFerdem im Bereich kryptografischer Schl\u00FCssel verwendet:"@de . "The red/black concept, sometimes called the red\u2013black architectureor red/black engineering,refers to the careful segregation in cryptographic systems of signals that contain sensitive or classified plaintext information (red signals) from those that carry encrypted information, or ciphertext (black signals). Therefore, the red side is usually considered the internal side, and the black side the more public side, with often some sort of guard, firewall or data-diode between the two. Different organizations have differing requirements for the separation of red and black fiber optic cables."@en . "O conceito vermelho/preto, \u00E0s vezes chamado de arquitetura vermelha preta ou engenharia vermelha/preto, se refere \u00E0 segrega\u00E7\u00E3o cuidadosa em sistemas criptogr\u00E1ficos de sinais que cont\u00EAm informa\u00E7\u00F5es confidenciais ou classificadas em texto simples (sinais vermelhos) daqueles que transportam informa\u00E7\u00F5es criptografadas ou em texto cifrado (sinais pretos). Portanto, o lado vermelho \u00E9 geralmente considerado o lado interno, e o lado preto o lado mais p\u00FAblico, geralmente com algum tipo de guarda, firewall ou diodo de dados entre os dois. No jarg\u00E3o da ag\u00EAncia de seguran\u00E7a nacional (NSA), os dispositivos de criptografia costumam ser chamados de blackers, porque convertem sinais vermelhos em pretos. Os padr\u00F5es TEMPEST enunciados em Tempest/2-95 especificam blindagem ou uma dist\u00E2ncia f\u00EDsica m\u00EDnima entre fios ou equipamentos que transportam ou processam sinais vermelhos e pretos. Diferentes organiza\u00E7\u00F5es t\u00EAm diferentes requisitos para a separa\u00E7\u00E3o de cabos de fibra \u00F3tica vermelhos e pretos. A terminologia vermelho/preto tamb\u00E9m \u00E9 aplicada a chaves criptogr\u00E1ficas. As chaves pretas foram criptografadas com uma \"chave de criptografia de chave\" (KEK) e, portanto, s\u00E3o benignas. As chaves vermelhas n\u00E3o s\u00E3o criptografadas e devem ser tratadas como material altamente sens\u00EDvel."@pt . . . "Das red/black concept (dt. rot/schwarz-Konzept) beschreibt eine sichere Abschottung in kryptografischen Umgebungen zwischen den unverschl\u00FCsselten (Plaintext) heiklen oder klassifizierten Informationen (red signals / rote Signale) von den verschl\u00FCsselten Informationen, auch Ciphertext genannt (black signals / schwarze Signale). Im NSA-Jargon werden Verschl\u00FCsselungsger\u00E4te oft \u201Eblackers\u201C genannt, da sie rote (unverschl\u00FCsselte) Daten in schwarze (verschl\u00FCsselte) Signale konvertieren. Der TEMPEST-Standard schreibt in NSTISSAM Tempest/2-95 eine Mindestabschirmung oder eine physikalische Mindestdistanz zwischen Kabeln oder Hardware f\u00FCr Red- und Black-Signale vor. Verschiedene Organisationen haben verschiedene Anforderungen f\u00FCr die Trennung von Red- und Black-Glasfaserkabeln. Die Red/Black-Terminologie wird au\u00DFerdem im Bereich kryptografischer Schl\u00FCssel verwendet: \n* Black keys wurden ihrerseits mit einem Key Encryption Key (KEK) verschl\u00FCsselt und sind daher sicher. \n* Red keys sind nicht verschl\u00FCsselt und m\u00FCssen daher als hochsensibles Material betrachtet werden."@de . "3936"^^ . . . . . . . "\u7EA2/\u9ED1\u6982\u5FF5\uFF0C\u6709\u65F6\u4E5F\u88AB\u79F0\u4F5C\u7EA2/\u9ED1\u67B6\u6784\u6216\u7EA2/\u9ED1\u5DE5\u7A0B\uFF0C\u6307\u7684\u662F\u6307\u7684\u662F \u52A0\u5BC6 \u7CFB\u7EDF\u8C28\u614E\u533A\u5206\u5305\u542B\u6709\u654F\u611F\u7684\u6D89\u5BC6\u7684\u660E\u6587\u4FE1\u606F\uFF08\u7EA2\u4FE1\u53F7\uFF09\u4E0E\u90A3\u4E9B\u4E0D\u654F\u611F\u7684\u5BC6\u6587\u4FE1\u606F\uFF08\u9ED1\u4FE1\u53F7\uFF09\u7684\u8BBE\u8BA1\u3002\u56E0\u6B64\uFF0C\u5305\u542B\u201C\u7EA2\u8272\u5185\u5BB9\u201D\u7684\u4E00\u8FB9\u901A\u5E38\u662F\u5728\u5185\u90E8\u7684\uFF0C\u800C\u5305\u542B\u201C\u9ED1\u8272\u5185\u5BB9\u201D\u7684\u4E00\u8FB9\u901A\u5E38\u662F\u516C\u5F00\u7684\uFF0C\u5B83\u4EEC\u4E4B\u95F4\u4F7F\u7528 \u7F51\u5173\u3001 \u9632\u706B\u5899 \u6216 \u5355\u5411\u7F51\u7EDC\u4FE1\u9053 \u52A0\u4EE5\u9694\u79BB\u3002 \u7F8E\u56FD\u56FD\u5BB6\u5B89\u5168\u5C40\u901A\u5E38\u5C06\u52A0\u5BC6\u8BBE\u5907\u6210\u4E3ABLACKER\uFF08\u52A0\u5BC6\u9ED1\u7BB1\uFF09\uFF0C\u8FD9\u4E2A\u547D\u540D\u5C31\u6765\u81EA\u52A0\u5BC6\u8BBE\u5907\u5C06\u7EA2\u4FE1\u53F7\u8F6C\u6362\u4E3A\u9ED1\u4FE1\u53F7\u7684\u529F\u80FD\u7279\u70B9\u3002 TEMPEST/2-95\u6807\u51C6\u5B9A\u4E49\u4E86\u4F20\u8F93\u5904\u7406\u7EA2/\u9ED1\u4FE1\u53F7\u7684\u4FE1\u9053\u95F4\u6700\u5C0F\u7684\u5B89\u5168\u8DDD\u79BB\u6216\u5C4F\u853D\u65B9\u5F0F \u4E0D\u540C\u7EC4\u7EC7\u5BF9\u4F20\u8F93\u7EA2/\u9ED1\u6570\u636E\u7684\u5149\u7EA4\u7535\u7F06\u6709\u7740\u4E0D\u540C\u7684\u8981\u6C42\u3002 \u7EA2/\u9ED1\u8FD9\u79CD\u672F\u8BED\u7528\u6CD5\u4E5F\u9002\u7528\u4E8E\u5BC6\u94A5\u3002 \u9ED1\u5BC6\u94A5\u4E4B\u6240\u4EE5\u4E0D\u654F\u611F\uFF0C\u662F\u56E0\u4E3A\u5B83\u4EEC\u88AB\u7528\u4E8E\u52A0\u5BC6\u5176\u5B83\u5BC6\u94A5\u7684\u5BC6\u94A5\uFF08KEK, Key Encryption Key\uFF09\u52A0\u5BC6\u540E\u5DF2\u7ECF\u8131\u654F\u3002\u800C\u7EA2\u5BC6\u94A5\u56E0\u4E3A\u672A\u88AB\u52A0\u5BC6\uFF0C\u56E0\u6B64\u5FC5\u987B\u88AB\u89C6\u4E3A\u9AD8\u5EA6\u654F\u611F\u7684\u5185\u5BB9\u3002"@zh . "\u7EA2/\u9ED1\u6982\u5FF5\uFF0C\u6709\u65F6\u4E5F\u88AB\u79F0\u4F5C\u7EA2/\u9ED1\u67B6\u6784\u6216\u7EA2/\u9ED1\u5DE5\u7A0B\uFF0C\u6307\u7684\u662F\u6307\u7684\u662F \u52A0\u5BC6 \u7CFB\u7EDF\u8C28\u614E\u533A\u5206\u5305\u542B\u6709\u654F\u611F\u7684\u6D89\u5BC6\u7684\u660E\u6587\u4FE1\u606F\uFF08\u7EA2\u4FE1\u53F7\uFF09\u4E0E\u90A3\u4E9B\u4E0D\u654F\u611F\u7684\u5BC6\u6587\u4FE1\u606F\uFF08\u9ED1\u4FE1\u53F7\uFF09\u7684\u8BBE\u8BA1\u3002\u56E0\u6B64\uFF0C\u5305\u542B\u201C\u7EA2\u8272\u5185\u5BB9\u201D\u7684\u4E00\u8FB9\u901A\u5E38\u662F\u5728\u5185\u90E8\u7684\uFF0C\u800C\u5305\u542B\u201C\u9ED1\u8272\u5185\u5BB9\u201D\u7684\u4E00\u8FB9\u901A\u5E38\u662F\u516C\u5F00\u7684\uFF0C\u5B83\u4EEC\u4E4B\u95F4\u4F7F\u7528 \u7F51\u5173\u3001 \u9632\u706B\u5899 \u6216 \u5355\u5411\u7F51\u7EDC\u4FE1\u9053 \u52A0\u4EE5\u9694\u79BB\u3002 \u7F8E\u56FD\u56FD\u5BB6\u5B89\u5168\u5C40\u901A\u5E38\u5C06\u52A0\u5BC6\u8BBE\u5907\u6210\u4E3ABLACKER\uFF08\u52A0\u5BC6\u9ED1\u7BB1\uFF09\uFF0C\u8FD9\u4E2A\u547D\u540D\u5C31\u6765\u81EA\u52A0\u5BC6\u8BBE\u5907\u5C06\u7EA2\u4FE1\u53F7\u8F6C\u6362\u4E3A\u9ED1\u4FE1\u53F7\u7684\u529F\u80FD\u7279\u70B9\u3002 TEMPEST/2-95\u6807\u51C6\u5B9A\u4E49\u4E86\u4F20\u8F93\u5904\u7406\u7EA2/\u9ED1\u4FE1\u53F7\u7684\u4FE1\u9053\u95F4\u6700\u5C0F\u7684\u5B89\u5168\u8DDD\u79BB\u6216\u5C4F\u853D\u65B9\u5F0F \u4E0D\u540C\u7EC4\u7EC7\u5BF9\u4F20\u8F93\u7EA2/\u9ED1\u6570\u636E\u7684\u5149\u7EA4\u7535\u7F06\u6709\u7740\u4E0D\u540C\u7684\u8981\u6C42\u3002 \u7EA2/\u9ED1\u8FD9\u79CD\u672F\u8BED\u7528\u6CD5\u4E5F\u9002\u7528\u4E8E\u5BC6\u94A5\u3002 \u9ED1\u5BC6\u94A5\u4E4B\u6240\u4EE5\u4E0D\u654F\u611F\uFF0C\u662F\u56E0\u4E3A\u5B83\u4EEC\u88AB\u7528\u4E8E\u52A0\u5BC6\u5176\u5B83\u5BC6\u94A5\u7684\u5BC6\u94A5\uFF08KEK, Key Encryption Key\uFF09\u52A0\u5BC6\u540E\u5DF2\u7ECF\u8131\u654F\u3002\u800C\u7EA2\u5BC6\u94A5\u56E0\u4E3A\u672A\u88AB\u52A0\u5BC6\uFF0C\u56E0\u6B64\u5FC5\u987B\u88AB\u89C6\u4E3A\u9AD8\u5EA6\u654F\u611F\u7684\u5185\u5BB9\u3002"@zh .