cipher

(redirected from cipher suite)
Also found in: Dictionary, Encyclopedia.
See: blank, calculate, designation, indicant, nonentity, symbol

CIPHER. An arithmetical character, used for numerical notation. Vide Figures, and 13 Vin. Ab. 210; 18 Eng. C. L. R. 95; 1 Ch. Cr. Law, 176.
     2. By cipher is also understood a mode of secret writing. Public ministers and other public agents frequently use ciphers in their correspondence, and it is sometimes very useful so to correspond in times of war. A key is given to each minister before his departure, namely, the cipher for writing ciphers, (chiffre chiffrant,) and the cipher for deciphering (chiffre dechiffrant.) Besides these, it is usual to give him a common cipher, (chiffre banal,) which is known to all the ministers of the same power, who occasionally use it in their correspondence with each other.
     3. When it is suspected that, a cipher becomes known to the cabinet where the minister is residing, recourse is had to a preconcerted sign in order to annul, entirely or in part, what has been written in cipher, or rather to indicate that the contents are to be understood in an inverted or contrary sense. A cipher of reserve is also employed in extraordinary cases.

References in periodicals archive ?
Notations Parameter PK: Public key IP: Internet protocol RN: Random number Info: Information or HTML page CSL: Cipher suite list supported by the client node CSC: Cipher suite choice CB: Client browser program RK: Private key URL: Uniform resource locator SK: Secret key/session key S_ID: Session ID Msg_all: All messages exchanged between C and WS so far Sig: Authority signature DN: Domain name.
Inc, "Finding and Fixing Vulnerabilities in SSL RC4 Cipher Suites Supported, a Medium Risk Vulnerability," Beyond Security - Vulnerability Assessment and Management.Online].Available:http://www.beyondsecurity.com/scan_pentest_network_vulnerabilities_ssl_rc4_cipher_suites_supported.
The ATECC508A provides protected key storage as well as hardware acceleration of Elliptic Curve Cryptography (ECC) cipher suites including mutual authentication (ECDSA) and Diffie-Hellman key agreement (ECDH).
2005 Camellia is accepted as the IETF standard Cipher for IPsec [RFC4312] July 2005 Camellia is accepted as the IETF standard Cipher for SSL/TLS Cipher suites [RFC4132] May 2005 Camellia is adopted as the ISO/IEC standard Cipher [ISO/IEC18033-3] April 2005 Camellia is accepted as the IETF standard Cipher for XML security URIs [RFC4051] Jan.
Through features and capabilities such as multiplexing and concurrency, header compression, server push, support for the latest cipher suites, and an overall reduction in development complexity, HTTP/2 is intended to significantly improve the performance and security/privacy of today s Web.
The security modules integrate hardware cryptographic accelerators and support a broad range of symmetric as well as asymmetric (public key) cryptographic cipher suites and protocols, enabling compliance to widely used standards such as TLS and DLMS-COSEM in a turnkey solution.