SNIA Online Dictionary

A glossary of storage networking, data, and information management terminology. You can download a PDF of the dictionary for local reference. To learn more about the SNIA Dictionary About the Dictionary.

SNIA Online Dictionary
Select from the alphabetical list, search for terms and/or filter by context. Download Full Dictionary (.pdf) Reset Filters
K28.5

A 10-bit special character used in 8B/10B encoding to indicate the beginning of an Ordered Set.

kb / kbit

Abbreviations for kilobit.

kB / kbyte

Abbreviations for kilobyte.

key


[Storage] The address of an object in a key-value storage system.


[Data Security] A sequence of bits used for cryptographic operations and/or for producing other keys.


The same plaintext encrypted with different keys yields different ciphertexts, each of which requires a different key for decryption. In a symmetric cryptosystem the encryption and decryption keys are the same. In an asymmetric cryptosystem the encryption and decryption keys are different.

key backup

A process used in a cryptographic system that provides key deposit and recovery.


Key backup is sometimes used as a replacement term for key escrow, which has become encumbered with additional meanings.

key escrow

A process in which the storage of a cryptographic key is entrusted to a third party escrow agent who will disclose it only to the owner or another authorized user.

key exchange

A cryptographic protocol and procedure in which two communicating entities determine a shared key in a fashion such that a third party that reads all of their communication cannot effectively determine the value of the key.


A common approach to key exchange requires such a third party to compute a discrete logarithm over a large field in order to determine the key value, and relies for its security on the computational intractability of the discrete logarithm problem.

key management

The supervision and control of the process, usually in accordance with a security policy, by which cryptographic keys are generated, stored, protected, distributed, applied, archived, revoked and destroyed.

Key Management Interoperability Protocol

An OASIS standard that establishes a single, comprehensive protocol for communication between key management servers and cryptographic clients.

key pair

A public key and its corresponding private key as used in public key cryptography.


See asymmetric cryptosystem.

key recovery

A system characterized by the presence of some mechanism for obtaining exceptional access to a cryptographic key in case of loss by error, disaster, or malicious intent.


See also key escrow.

key wrapping

A method of encrypting keys (along with associated integrity information) that provides both confidentiality and integrity protection using a symmetric key. [NIST SP 800-57 Part 1]

key-value storage

A type of object storage interface where a key is used to address the associated object.

keying material

A key or authentication information in physical or magnetic form.

KiB / KiByte

Shorthand for kibibyte.

Kibibit

Shorthand for 1,024 (210) bits.


Binary notation is most commonly used in computer system and software literature.


See also kilobit.

Kibibyte

Shorthand for 1,024 (210) bytes.


Binary notation is most commonly used in computer system and software literature.


See also kilobyte.

Kibit

Shorthand for kibibit.

Kilobit

1,000 (103) bits.


The base 10 convention is commonly found in I/O-related and scientific literature.


See also kibibit.

Kilobyte

1,000 (103) bytes.


The base 10 convention is commonly found in I/O-related and scientific literature.


See also kibibyte.

KMIP

Acronym for Key Management Interoperability Protocol.