Glossary
Page 130 of 147
TAINY iQ
Asymmetric
encryption
With asymmetric encryption, data is encrypted with a key and encrypted
again with a second key. Both keys are suitable for encryption and
decryption. One of the keys is kept secret by its owner (private key) and the
other is given to the public (public key), potential communication partners.
A message encrypted with the public key can only be decrypted and read by
a recipient who has the corresponding private key. A message encrypted
with the private key can only be decrypted and read by any recipient who
has the corresponding public key. Encryption with the private key shows that
the message actually originated from the owner of the corresponding public
key. For that reason, the term “digital signature” is used.
However, asymmetric encryption processes such as RSA are slow and
susceptible to certain types of attacks, therefore they are often combined
with a symmetric process (
symmetric encryption). Furthermore concepts
which eliminate the elaborate administrative efforts for symmetric keys are
also possible.
Cell ID
Unique identifier of a cellular network cell.
CIDR
Classless Inter-Domain Routing
IP netmasks and CIDR are notations for grouping a number of IP addresses
into an address space. Thus a range of contiguous addresses is treated as a
network.
The CIDR method reduces, for example the routing tables stored in routers
by means of a postfix in the IP address. This postfix can be used to
designate a network together with its subnetworks. This method is described
in RFC 1518.
In order to specify a range of IP addresses to the TAINY IQ-LTE, or when
configuring the firewall, it may be necessary to specify the address space in
the CIDR notation. The following table shows the IP netmask on the left-
hand side and to the far right the corresponding CIDR notation.
Summary of Contents for TAINY IQ-LTE
Page 1: ...TAINY IQ LTE User Manual ...