Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.
Public key fingerprintIn public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are shorter than the keys they refer to, they can be used to simplify certain key management tasks. In Microsoft software, "thumbprint" is used instead of "fingerprint." A public key fingerprint is typically created through the following steps: A public key (and optionally some additional data) is encoded into a sequence of bytes.
Sediment basinA sediment basin is a temporary pond built on a construction site to capture eroded or disturbed soil that is washed off during rain storms, and protect the water quality of a nearby stream, river, lake, or bay. The sediment-laden soil settles in the pond before the runoff is discharged. Sediment basins are typically used on construction sites of or more, where there is sufficient room. They are often used in conjunction with erosion controls and other sediment control practices.
Complexity classIn computational complexity theory, a complexity class is a set of computational problems "of related resource-based complexity". The two most commonly analyzed resources are time and memory. In general, a complexity class is defined in terms of a type of computational problem, a model of computation, and a bounded resource like time or memory. In particular, most complexity classes consist of decision problems that are solvable with a Turing machine, and are differentiated by their time or space (memory) requirements.
Abrupt climate changeAn abrupt climate change occurs when the climate system is forced to transition at a rate that is determined by the climate system energy-balance, and which is more rapid than the rate of change of the external forcing, though it may include sudden forcing events such as meteorite impacts. Abrupt climate change therefore is a variation beyond the variability of a climate. Past events include the end of the Carboniferous Rainforest Collapse, Younger Dryas, Dansgaard-Oeschger events, Heinrich events and possibly also the Paleocene–Eocene Thermal Maximum.
Upland and lowlandUpland and lowland are conditional descriptions of a plain based on elevation above sea level. In studies of the ecology of freshwater rivers, habitats are classified as upland or lowland. Upland and lowland are portions of plain that are conditionally categorized by their elevation above the sea level. Lowlands are usually no higher than , while uplands are somewhere around to . On unusual occasions, certain lowlands such as the Caspian Depression lie below sea level.
Grain sizeGrain size (or particle size) is the diameter of individual grains of sediment, or the lithified particles in clastic rocks. The term may also be applied to other granular materials. This is different from the crystallite size, which refers to the size of a single crystal inside a particle or grain. A single grain can be composed of several crystals. Granular material can range from very small colloidal particles, through clay, silt, sand, gravel, and cobbles, to boulders.
Sedimentary rockSedimentary rocks are types of rock that are formed by the accumulation or deposition of mineral or organic particles at Earth's surface, followed by cementation. Sedimentation is the collective name for processes that cause these particles to settle in place. The particles that form a sedimentary rock are called sediment, and may be composed of geological detritus (minerals) or biological detritus (organic matter). The geological detritus originated from weathering and erosion of existing rocks, or from the solidification of molten lava blobs erupted by volcanoes.