Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Network Security Services

Index Network Security Services

In computing, Network Security Services (NSS) comprises a set of libraries designed to support cross-platform development of security-enabled client and server applications with optional support for hardware TLS/SSL acceleration on the server side and hardware smart cards on the client side. [1]

87 relations: Abstract Syntax Notation One, Advanced Encryption Standard, AES instruction set, AIM (software), AOL, Apache HTTP Server, Assembly language, C (programming language), Camellia (cipher), Chromium (web browser), Comparison of TLS implementations, Computing, Cross-platform, Cryptographic Message Syntax, Data Encryption Standard, Datagram Transport Layer Security, Diffie–Hellman key exchange, Digital Signature Algorithm, Elliptic Curve Digital Signature Algorithm, Elliptic-curve Diffie–Hellman, Evolution (software), Federal Information Processing Standards, FIPS 140, Firefox, Firefox for Android, GlassFish, GNU General Public License, GNU Lesser General Public License, Google, Google Chrome, Hardware security module, HMAC, Information security, International Data Encryption Algorithm, International Telecommunication Union, Internet Engineering Task Force, Java (programming language), Library (computing), Libreswan, List of Apache modules, MD2 (cryptography), MD5, MIME, Mozilla, Mozilla Foundation, Mozilla Public License, Mozilla Thunderbird, Multi-licensing, National Infrastructure Security Co-ordination Centre, National Institute of Standards and Technology, ..., Netscape, Netscape Portable Runtime, Online Certificate Status Protocol, Open-source model, OpenDJ, OpenOffice.org, OpenSSL, Opera (web browser), Oracle Communications Messaging Server, Oracle Corporation, Oracle iPlanet Web Server, Pidgin (software), PKCS, PKCS 11, RC2, RC4, Red Hat, RSA (cryptosystem), S/MIME, SafeNet, SeaMonkey, SEED, SHA-1, SHA-2, Smart card, SSL acceleration, Sun Java System, Sun Java System Directory Server, Sun Java System Portal Server, Sun Microsystems, Thales Group, Transport Layer Security, Triple DES, Ultra Electronics, X.509, X.690, 389 Directory Server. Expand index (37 more) »

Abstract Syntax Notation One

Abstract Syntax Notation One (ASN.1) is an interface description language for defining data structures that can be serialized and deserialized in a standard, cross-platform way.

New!!: Network Security Services and Abstract Syntax Notation One · See more »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Network Security Services and Advanced Encryption Standard · See more »

AES instruction set

Advanced Encryption Standard instruction set (or the Intel Advanced Encryption Standard New Instructions; AES-NI) is an extension to the x86 instruction set architecture for microprocessors from Intel and AMD proposed by Intel in March 2008.

New!!: Network Security Services and AES instruction set · See more »

AIM (software)

AIM (AOL Instant Messenger) was an instant messaging and presence computer program created by AOL, which used the proprietary OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time.

New!!: Network Security Services and AIM (software) · See more »

AOL

AOL (formerly a company known as AOL Inc., originally known as America Online, and stylized as Aol.) is a web portal and online service provider based in New York.

New!!: Network Security Services and AOL · See more »

Apache HTTP Server

The Apache HTTP Server, colloquially called Apache, is a free and open-source cross-platform web server, released under the terms of Apache License 2.0.

New!!: Network Security Services and Apache HTTP Server · See more »

Assembly language

An assembly (or assembler) language, often abbreviated asm, is a low-level programming language, in which there is a very strong (but often not one-to-one) correspondence between the assembly program statements and the architecture's machine code instructions.

New!!: Network Security Services and Assembly language · See more »

C (programming language)

C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.

New!!: Network Security Services and C (programming language) · See more »

Camellia (cipher)

In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits.

New!!: Network Security Services and Camellia (cipher) · See more »

Chromium (web browser)

Chromium is an open-source Web browser project started by Google, to provide the source code for the proprietary Google Chrome browser.

New!!: Network Security Services and Chromium (web browser) · See more »

Comparison of TLS implementations

The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks.

New!!: Network Security Services and Comparison of TLS implementations · See more »

Computing

Computing is any goal-oriented activity requiring, benefiting from, or creating computers.

New!!: Network Security Services and Computing · See more »

Cross-platform

In computing, cross-platform software (also multi-platform software or platform-independent software) is computer software that is implemented on multiple computing platforms.

New!!: Network Security Services and Cross-platform · See more »

Cryptographic Message Syntax

The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages.

New!!: Network Security Services and Cryptographic Message Syntax · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Network Security Services and Data Encryption Standard · See more »

Datagram Transport Layer Security

Datagram Transport Layer Security (DTLS) is a communications protocol that provides security for datagram-based applications by allowing them to communicate in a way that is designedRFC 4347RFC 6347 to prevent eavesdropping, tampering, or message forgery.

New!!: Network Security Services and Datagram Transport Layer Security · See more »

Diffie–Hellman key exchange

Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.

New!!: Network Security Services and Diffie–Hellman key exchange · See more »

Digital Signature Algorithm

The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.

New!!: Network Security Services and Digital Signature Algorithm · See more »

Elliptic Curve Digital Signature Algorithm

In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.

New!!: Network Security Services and Elliptic Curve Digital Signature Algorithm · See more »

Elliptic-curve Diffie–Hellman

Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel.

New!!: Network Security Services and Elliptic-curve Diffie–Hellman · See more »

Evolution (software)

Evolution (formerly Novell Evolution and Ximian Evolution, prior to Novell's 2003 acquisition of Ximian) is the official personal information manager for GNOME.

New!!: Network Security Services and Evolution (software) · See more »

Federal Information Processing Standards

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

New!!: Network Security Services and Federal Information Processing Standards · See more »

FIPS 140

The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules.

New!!: Network Security Services and FIPS 140 · See more »

Firefox

Mozilla Firefox (or simply Firefox) is a free and open-source web browser developed by Mozilla Foundation and its subsidiary, Mozilla Corporation.

New!!: Network Security Services and Firefox · See more »

Firefox for Android

Firefox for Android (codenamed Fennec) is the build of the Mozilla Firefox web browser for devices such as smartphones and tablet computers.

New!!: Network Security Services and Firefox for Android · See more »

GlassFish

GlassFish is an open-source application server project started by Sun Microsystems for the Java EE platform and now sponsored by Oracle Corporation.

New!!: Network Security Services and GlassFish · See more »

GNU General Public License

The GNU General Public License (GNU GPL or GPL) is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.

New!!: Network Security Services and GNU General Public License · See more »

GNU Lesser General Public License

The GNU Lesser General Public License (LGPL) is a free software license published by the Free Software Foundation (FSF).

New!!: Network Security Services and GNU Lesser General Public License · See more »

Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

New!!: Network Security Services and Google · See more »

Google Chrome

Google Chrome is a freeware web browser developed by Google LLC.

New!!: Network Security Services and Google Chrome · See more »

Hardware security module

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.

New!!: Network Security Services and Hardware security module · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Network Security Services and HMAC · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Network Security Services and Information security · See more »

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

New!!: Network Security Services and International Data Encryption Algorithm · See more »

International Telecommunication Union

The International Telecommunication Union (ITU; Union Internationale des Télécommunications (UIT)), originally the International Telegraph Union (Union Télégraphique Internationale), is a specialized agency of the United Nations (UN) that is responsible for issues that concern information and communication technologies.

New!!: Network Security Services and International Telecommunication Union · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Network Security Services and Internet Engineering Task Force · See more »

Java (programming language)

Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.

New!!: Network Security Services and Java (programming language) · See more »

Library (computing)

In computer science, a library is a collection of non-volatile resources used by computer programs, often for software development.

New!!: Network Security Services and Library (computing) · See more »

Libreswan

In the field of computer security, Libreswan is a fork of the Openswan IPsec VPN implementation created by almost all of the Openswan developers after a about the ownership of the Openswan name was filed against Paul Wouters, the release manager of Openswan, in December 2012.

New!!: Network Security Services and Libreswan · See more »

List of Apache modules

In computing, '''Apache''', an open-source HTTP server, comprises a small core for HTTP request/response processing and for Multi-Processing Modules (MPM) which dispatches data processing to threads and/or processes.

New!!: Network Security Services and List of Apache modules · See more »

MD2 (cryptography)

The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.

New!!: Network Security Services and MD2 (cryptography) · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Network Security Services and MD5 · See more »

MIME

Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email to support.

New!!: Network Security Services and MIME · See more »

Mozilla

Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape.

New!!: Network Security Services and Mozilla · See more »

Mozilla Foundation

The Mozilla Foundation (stylized as moz://a) is a non-profit organization that exists to support and collectively lead the open source Mozilla project.

New!!: Network Security Services and Mozilla Foundation · See more »

Mozilla Public License

The Mozilla Public License (MPL) is a free and open source software license developed and maintained by the Mozilla Foundation.

New!!: Network Security Services and Mozilla Public License · See more »

Mozilla Thunderbird

Mozilla Thunderbird is a free and open-source cross-platform email client, news client, RSS and chat client developed by the Mozilla Foundation.

New!!: Network Security Services and Mozilla Thunderbird · See more »

Multi-licensing

Multi-licensing is the practice of distributing software under two or more different sets of terms and conditions.

New!!: Network Security Services and Multi-licensing · See more »

National Infrastructure Security Co-ordination Centre

The National Infrastructure Security Co-ordination Centre (NISCC) was an inter-departmental centre of the UK government.

New!!: Network Security Services and National Infrastructure Security Co-ordination Centre · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Network Security Services and National Institute of Standards and Technology · See more »

Netscape

Netscape is a brand name associated with the development of the Netscape web browser.

New!!: Network Security Services and Netscape · See more »

Netscape Portable Runtime

In computing, the Netscape Portable Runtime, or NSPR, a platform abstraction library, makes all operating systems it supports appear the same to (for example) Mozilla-style web-browsers.

New!!: Network Security Services and Netscape Portable Runtime · See more »

Online Certificate Status Protocol

The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.

New!!: Network Security Services and Online Certificate Status Protocol · See more »

Open-source model

The open-source model is a decentralized software-development model that encourages open collaboration.

New!!: Network Security Services and Open-source model · See more »

OpenDJ

OpenDJ is a directory server which implements a wide range of Lightweight Directory Access Protocol and related standards, including full compliance with LDAPv3 but also support for Directory Service Markup Language (DSMLv2).

New!!: Network Security Services and OpenDJ · See more »

OpenOffice.org

OpenOffice.org (OOo), commonly known as OpenOffice, is a discontinued open-source office suite.

New!!: Network Security Services and OpenOffice.org · See more »

OpenSSL

OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end.

New!!: Network Security Services and OpenSSL · See more »

Opera (web browser)

Opera is a web browser for Windows, macOS, and Linux operating systems developed by Opera Software AS.

New!!: Network Security Services and Opera (web browser) · See more »

Oracle Communications Messaging Server

Oracle Communications Messaging Server is Oracle's messaging (email) server software.

New!!: Network Security Services and Oracle Communications Messaging Server · See more »

Oracle Corporation

Oracle Corporation is an American multinational computer technology corporation, headquartered in Redwood Shores, California.

New!!: Network Security Services and Oracle Corporation · See more »

Oracle iPlanet Web Server

Oracle iPlanet Web Server (OiWS) is a web server designed for medium and large business applications.

New!!: Network Security Services and Oracle iPlanet Web Server · See more »

Pidgin (software)

Pidgin (formerly named Gaim) is a free and open-source multi-platform instant messaging client, based on a library named libpurple that has support for many instant messaging protocols, allowing the user to simultaneously log into various services from one application.

New!!: Network Security Services and Pidgin (software) · See more »

PKCS

In cryptography, PKCS stands for "Public Key Cryptography Standards".

New!!: Network Security Services and PKCS · See more »

PKCS 11

In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate cryptographic tokens.

New!!: Network Security Services and PKCS 11 · See more »

RC2

In cryptography, RC2 (also known as ARC2) is a symmetric-key block cipher designed by Ron Rivest in 1987.

New!!: Network Security Services and RC2 · See more »

RC4

In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.

New!!: Network Security Services and RC4 · See more »

Red Hat

Red Hat, Inc. is an American multinational software company providing open-source software products to the enterprise community.

New!!: Network Security Services and Red Hat · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Network Security Services and RSA (cryptosystem) · See more »

S/MIME

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data.

New!!: Network Security Services and S/MIME · See more »

SafeNet

SafeNet, Inc. was an information security company based in Belcamp, Maryland, United States, which was acquired in August 2014 by the Dutch security company Gemalto.

New!!: Network Security Services and SafeNet · See more »

SeaMonkey

SeaMonkey is a free and open-source Internet suite.

New!!: Network Security Services and SeaMonkey · See more »

SEED

SEED is a block cipher developed by the Korea Internet & Security Agency (KISA).

New!!: Network Security Services and SEED · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Network Security Services and SHA-1 · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Network Security Services and SHA-2 · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Network Security Services and Smart card · See more »

SSL acceleration

SSL acceleration (TLS acceleration) is a method of offloading processor-intensive public-key encryption for Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) to a hardware accelerator.

New!!: Network Security Services and SSL acceleration · See more »

Sun Java System

Sun Java System was a brand used by Sun Microsystems to market computer software.

New!!: Network Security Services and Sun Java System · See more »

Sun Java System Directory Server

The Sun Java System Directory Server was Sun Microsystems' LDAP directory server and DSML server written in C. The Java System Directory Server is a component of the Java Enterprise System.

New!!: Network Security Services and Sun Java System Directory Server · See more »

Sun Java System Portal Server

The Sun Java System Portal Server is a component of the Sun Java Platform, Enterprise Edition, a software system that supports a wide range of enterprise computing needs.

New!!: Network Security Services and Sun Java System Portal Server · See more »

Sun Microsystems

Sun Microsystems, Inc. was an American company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the Network File System (NFS), and SPARC.

New!!: Network Security Services and Sun Microsystems · See more »

Thales Group

Thales Group is a French multinational company that designs and builds electrical systems and provides services for the aerospace, defence, transportation and security markets.

New!!: Network Security Services and Thales Group · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Network Security Services and Transport Layer Security · See more »

Triple DES

In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.

New!!: Network Security Services and Triple DES · See more »

Ultra Electronics

Ultra Electronics Holdings is a British company serving the defence, security, transport and energy industries.

New!!: Network Security Services and Ultra Electronics · See more »

X.509

In cryptography, X.509 is a standard that defines the format of public key certificates.

New!!: Network Security Services and X.509 · See more »

X.690

X.690 is an ITU-T standard specifying several ASN.1 encoding formats.

New!!: Network Security Services and X.690 · See more »

389 Directory Server

The 389 Directory Server (previously Fedora Directory Server) is an LDAP (Lightweight Directory Access Protocol) server developed by Red Hat as part of Red Hat's community-supported Fedora Project.

New!!: Network Security Services and 389 Directory Server · See more »

References

[1] https://en.wikipedia.org/wiki/Network_Security_Services

OutgoingIncoming
Hey! We are on Facebook now! »