loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  (Next)
  ALL

K

Kerckhoffs’s Principle

A foundational principle stating that a cryptosystem should remain secure even if everything about the system is public except the key. Modern cryptography assumes algorithms are known and relies on key secrecy and correct implementation.

Kernel

The core component of an operating system responsible for managing CPU scheduling, memory allocation, device drivers, and system calls. The kernel operates in privileged mode and controls low-level hardware access.

Key Derivation Function (KDF)

A function that derives one or more cryptographic keys from a secret (such as a password or master key). KDFs are used for generating keys of appropriate length and for deriving separate keys for different purposes from a single root secret.

Key Escrow

A system where encryption keys are stored with a third party (or split among parties) so that authorized recovery is possible. Key escrow can support business continuity and lawful access processes but introduces central points of risk and governance challenges.

Key Exchange

A method for establishing a shared secret between parties, typically over an untrusted network. Key exchange is foundational to secure protocols (like TLS) and commonly uses Diffie-Hellman or Elliptic Curve Diffie-Hellman (ECDH).

Key Length

The size of a cryptographic key, measured in bits. Longer keys generally increase resistance to brute-force attacks. Practical security also depends on algorithm design, implementation quality, and operational key management.

Key Management

The processes and controls used to generate, store, distribute, rotate, revoke, and destroy cryptographic keys. Weak key management can compromise strong cryptography, and is a common cause of real-world failures.

Key Revocation

The process of invalidating a key or certificate before its normal expiration, usually due to suspected compromise, misuse, or decommissioning. Revocation is critical to prevent continued trust in compromised keys.

Key Rotation

The planned replacement of cryptographic keys to reduce risk if a key is compromised and to limit the amount of data protected by a single key. Rotation schedules depend on sensitivity, usage frequency, and threat model.

Kubernetes

An open-source container orchestration platform that automates deployment, scaling, and management of containerized applications.


Page:  1  2  (Next)
  ALL