A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
authenticity
Share to Facebook Share to Twitter Share to LinkedIn Share ia Email
Definitions:
The property that data originated from its purported source.
Sources:
NIST SP 800-38B under Authenticity
NIST SP 800-38C under Authenticity
NIST SP 800-38D under Authenticity
NIST SP 800-63-3 under Authenticity
The property that data originated from its purported source. In the context of a key-wrap algorithm, the source of authentic data is an entity with access to an implementation of the authenticated-encryption function with the KEK.
Sources:
NIST SP 800-38F
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.
Sources:
NIST SP 800-37 Rev. 2
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See Authentication.
Sources:
CNSSI 4009-2015 from NIST SP 800-39
NIST SP 800-137 under Authenticity from CNSSI 4009
NIST SP 800-18 Rev. 1 under Authenticity
NIST SP 800-39 under Authenticity
NIST SP 800-60 Vol. 1 Rev. 1 under Authenticity
NIST SP 800-60 Vol. 2 Rev. 1 under Authenticity
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, message, or message originator. See authentication.
Sources:
NIST SP 800-53 Rev. 5
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator
Sources:
NIST SP 800-30 Rev. 1 under Authenticity
Glossary Comments
Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.
Comments about the glossary's presentation and functionality should be sent to secglossary@nist.gov.
See NISTIR 7298 Rev. 3 for additional details.