Reversed field pinchA reversed-field pinch (RFP) is a device used to produce and contain near-thermonuclear plasmas. It is a toroidal pinch which uses a unique magnetic field configuration as a scheme to magnetically confine a plasma, primarily to study magnetic confinement fusion. Its magnetic geometry is somewhat different from that of the more common tokamak. As one moves out radially, the portion of the magnetic field pointing toroidally reverses its direction, giving rise to the term reversed field.
Interplanetary magnetic fieldThe interplanetary magnetic field (IMF), now more commonly referred to as the heliospheric magnetic field (HMF), is the component of the solar magnetic field that is dragged out from the solar corona by the solar wind flow to fill the Solar System. The coronal and solar wind plasmas are highly electrically conductive, meaning the magnetic field lines and the plasma flows are effectively "frozen" together and the magnetic field cannot diffuse through the plasma on time scales of interest.
Public key infrastructureA public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
Magnetic coreA magnetic core is a piece of magnetic material with a high magnetic permeability used to confine and guide magnetic fields in electrical, electromechanical and magnetic devices such as electromagnets, transformers, electric motors, generators, inductors, magnetic recording heads, and magnetic assemblies. It is made of ferromagnetic metal such as iron, or ferrimagnetic compounds such as ferrites. The high permeability, relative to the surrounding air, causes the magnetic field lines to be concentrated in the core material.
Gas core reactor rocketNuclear gas-core-reactor rockets can provide much higher specific impulse than solid core nuclear rockets because their temperature limitations are in the nozzle and core wall structural temperatures, which are distanced from the hottest regions of the gas core. Consequently, nuclear gas core reactors can provide much higher temperatures to the propellant.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Central heatingA central heating system provides warmth to a number of spaces within a building from one main source of heat. It is a component of heating, ventilation, and air conditioning (short: HVAC) systems, which can both cool and warm interior spaces. A central heating system has a furnace that converts fuel or electricity to heat. The heat is circulated through the building either by fans forcing heated air through ducts, circulation of low-pressure steam to radiators in each heated room, or pumps that circulate hot water through room radiators.
Plasma cuttingPlasma cutting is a process that cuts through electrically conductive materials by means of an accelerated jet of hot plasma. Typical materials cut with a plasma torch include steel, stainless steel, aluminum, brass and copper, although other conductive metals may be cut as well. Plasma cutting is often used in fabrication shops, automotive repair and restoration, industrial construction, and salvage and scrapping operations.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.