Home Up General Purpose Definition of VPN Shannon

 

 

Cryptocommunications

DOMAIN TERMS & DEFINITIONS

  Copyright (c) 1999 Roy D. Follendore III

All Rights Reserved


      Language is the most powerful tool humans have for both communicating and for understanding ideas.  It is often important in the technical world to define a concept relative to local use and context.  The scope of Cryptocommunications is broad.  A different paradigm is a essential part of Cryptocommunications and it therefore should not be surprising that there would be terms that are unique to the domain.   For these reasons the following domain terms and definitions are not necessarily intended to comply with terms and definitions normally found in existing technical dictionaries and institutions. 

  • Bit- an individual binary input unit that can either be considered significant in either an on or off state.  At its lowest physical level, a bit represents a single packet of energy with a universal context.

  •  Byte- the matrix of internationally recognized bits from a set having one of 256 degrees of freedom.

  •   Classification label- a label class expressing the concern for the security of the information within the message.

  • Context Based Cryptography- cryptographic processes that encrypt information based on multiple environmental contexts rather than just random permutations or roles. 

  • Core Control Philosophy- an n dimensional control concept whereby the secure degrees of freedom are tightly integrated and expressed within the authentication and authorization process at such fundamental levels such that they become dynamic permutation variables requiring rational, irrational, logical and illogical solutions in order to obtain and manage transaction access and control.  The importance of the Core Control Philosophy is the inherent ability to maximize and maintain secure degrees of freedom within a dynamic label management system.

  • Cryptocommunications- the study of the use of hidden access and contextual associations to hidden meanings.  Cryptocommunication processes are naturally occurring though the technical uses are normally associated with the integration of mathematical logic with applied rational and irrational  information using cryptologic and inferential artificial intelligence techniques.   

  • Cryptocommunicologist- a person who studies and applies access and contextual associations, normally through the use of cryptologic and rational reasoning, to affect improvement in the communication of knowledge among people and organizations. 

  •  Cryptographic Label- A label object used to permute security process though permutation by a cryptographic means.

  •  Cybernoise- The noise induced on the Internet from the user's perspective when the amount of competing information is larger than the user can consider or control for use as knowledge.  Cybernoise not only involves quantity but the quality of competing information.

  •  Data- a matrix of associated bytes capable of representing differentiable symbols with N degrees of freedom.

  •  Dynamic Label Management System- A system expressing the dynamic control of labeling technology as a means for accurately reflecting operational conditions of messages, their services and contextual organizational processes.  Managers and Security level users make rational and logical changes that ultimately end up being reflected as irrational control, but Dynamic label management systems could also create labels on the fly.

  •  Environment label- a label class expressing the intended environment the message is to be viewed by the receiver's).

  • Equivalent (Cryptographic) Label- A cryptographic label that provides equivalent security processes to another label or group of labels.  

  • Fatal Compliance- A system high level of control whereby Label Drop Dead Attributes are destroyed and the potential of a label to become alive again no longer exists.  The compliance therefore is given up by the system and the label can no longer be rejuvenated.

  •  From label- a label class expressing the entity or entities from which the transaction or message is originating.

  • Illogical attribute- an object attribute expressing illogical information.

  • Illogical Information- Computational information which has been isolated from the logical context and process.   

  • Inductive Key Management- The process of managing and maintaining cryptographic keys using inductive reasoning transaction controls normally found within knowledge based systems.

  • Information- a matrix of associated data having complex expressions, which are associated with static and dynamic issues, things and processes.

  • Intelligent Key Management- The process of generating, managing and maintaining cryptographic keys using artificial intelligence.

  • Intelligent Cryptography- Cryptography which uses Intelligent Key Management.

  • Irrational attribute- an object attribute expressing irrational information.  

  • Interknowledge- Knowledge that is intended to distributed externally to the technical and social boundaries of a particular group.

  • Intraknowledge- Knowledge that is intended to be held within the technical and social boundaries of a particular group.  

  • Irrational Information- Information which is isolated from individual meaning and context.

  • KeyByte Management Level- a predetermined user level associated with access to management level subsystems providing a greater degree of flexibility and freedom than user levels and associated with internal policies.  

  •  KeyByte Security Level- a predetermined user level associated with the performance of security functions such as but not limited to access control, rekey and relabeling subsystems.

  •  KeyByte User Level- a predetermined user level associated with essential methods and processes necessary for cryptographic transaction and message control.

  •  Knowledge- a specific matrix of information, which expresses associated inferential qualities from other information or other knowledge.

  •  Label Authorization Process- any process associated with the authorization of labels for creation and use.

  • Label Bag- a collection of all possible labels including those in all label classes.

  • Label Birth Date/Time attribute- a label attribute that expresses the date/time at which the label is intended to become active.

  • Label Bypass- The process whereby a particular label is predetermined by the sender to be excluded as a cryptographic label.

  • Label Creation Date/Time attribute- a label attribute that expresses the date/time the label was actually created.

  • Label Drop-Dead Date/Time attribute- label attributes that express the date/time the label is intended to become inactive.  Drop dead attributes can have weak or fatal compliance.   

  • Label Filtering- The rational and mathematical process of reducing the potential matrix of labels from a Label bag.  This is one important use of the the Label Sensitivity Attribute.

  • Label Matrix- An association of a given set of labels from each of the label classes within the Label Bag.

  • Label Object- The complete entity that consists of attributes and other objects expressing the nature of a particular label.

  • Label Rejuvenation- the process of modifying and/or permuting the attributes of a label so that it can continue to be used.  This process is usually but not necessarily performed on a Label Drop Dead attribute.

  •  Label Sensitivity Attribute- an object attribute relating to a matrixed sensitivity of information objects and their attributes to each other.

  •  Label Signature- a one way transposition that provides a means of authenticating the authenticity and viability of a particular label.

  •  Logical attribute- an object attribute expressing logical information.

  •  Logical Information- Information which is directly derived from computational (mathematical), axiom and postulate constraints.

  •  Message or Transaction Key- a cryptographic key that has been generated through label permutation processes and is used to secure a particular message(s) or transaction(s).

  •   Multi-Algorithm Transaction Control System- a system that uses a given algorithm as a choice from several as an inferential expression of the content of a given transaction rather than as a static predetermined requirement.

  •   Multilevel Transaction Authorization- The ability of management level users to flexibly interrelate and authorize process controls that are necessary for a successful transaction.

  •  Network label- a label class that expressing the logical networked pathway through which the transaction or message will pass. 

  •  Noise- a collection of unassociated bits that may or may not appear to be random.

  •   Nonsymmetrical Algorithms- Unconventional (or public-key algorithms) where the encryption key can not be calculated from the decryption key and visa versa.

  •   Nonsymmetrical Labeling- the operational concept of labeling whereby one or more of the attributes of a given VNet limits the key generation operationally.  (For instance Read Only, and Write Only configurations are examples of labeling VNet matrix that may prevent access to transaction controls.)

  •  Object Oriented Key Management- The technical process of designing and managing and maintaining an open systems approach of transaction control systems and processes by using an object oriented paradigm.

  •  Permutation Level- a hierarchical policy related to the degree of stochastic complexity integrated into the creation of keys.

  •  Purpose label- a label class expressing the reason for the transaction or message. 

  •  Rational attribute- an object attribute expressing rational information.

  • Rational Cryptographic Key Management- A technical process for integrating rational transaction controls directly into key generation processes through the use of Intelligent Key Management. 

  • Rational Information- Conceptual information, including images, words and definitions, which human beings may cognitively infer information from.

  •  Remote Access Control- the process a security manager user may use to change the access of a user to cryptographic transaction and messaging key management processes.

  •  Remote Rekey- the process a security level user may use to affect a change in an initialization vector of a user, which would change some characteristic of the user access and control of transactions or messages.

  •  Remote Relabel- the process a security or management level user may use to change the rational attributes of cryptographic labels.

  •  Rogue label- an individual label that is out of place relative to its class position  

  •  Secure Degrees of Freedom- the degrees of freedom that management or security level users have to rationally and logically control information and processes in a secure way.

  • Security Exchange- a process whereby one set of security issues are expressed and mapped to another set of issues. 

  •  Signature- a one way transposition that provides a means of authenticating the authenticity and viability of data and information. 

  • Surrogate label- a label that is used to replace another as part of a cryptographic control process.

  • Symmetric Algorithms- Conventional algorithms where the encryption key can be calculated from the decryption key and visa versa.

  • Symmetric Labeling- the operational concept of labeling whereby one or more of the attributes of a VNet does not limit the key generation operationally.  For instance, (read and write) labels are symmetric because what one can cryptographically write, one can also cryptographically read. 

  •  System label bag- the complete collection of all possible labels in a given system to include those in all possible classes.

  •  To label- a label class expressing the entity or entities to which transactions or messages are intended by the sender.

  •  User label bag- the complete collection of all possible labels a user may have access, including all of those from all possible classes to which the user is entitled.   

  • Virtual INFOSEC-.the concept that Information Security is transparent as an integral core of process and control.  

  •   Virtual labels-.a label that is seen as a rational expression but not logically computed as part of the cryptographic control.

  •  Virtual Private Networking Signature- a one way transposition that provides a means of authenticating the authenticity and viability of a particular Virtual Private Network.

  •  VNet Signature- a one way transposition that provides a means of authenticating the authenticity and viability of a particular VNet.

  • Weak Label Compliance- A system high level of control whereby Label Drop Dead Attributes do not destroy the potential of a label to become alive again.  The compliance therefore remains within the system therefore the label can be rejuvenated.

  • Wisdom- a matrix of knowledge that may be applied to provide generalized solutions to human conditions.

 

.

Copyright (c) 2001-2007 RDFollendoreIII All Rights Reserved