T

T=0

is a character oriented asynchronous half-duplex transmission protocol for the smart cards. It is defined by ISO 7816 standard.

T=1

is a block oriented asynchronous half-duplex transmission protocol for the smart cards. It is defined by ISO 7816standard.

T=14

is a reserved code for proprietary transmission protocol for the smart cards. It is defined by ISO 7816 standard.

TCG (Trusted Computing Group)

is the sequel of TCPA.  It generated the TPM specifications.

TCPA (Trusted Computer Platform Alliance)

is an association that defined an architecture for trusted computer. Its successor is Trusted Computing Group (TCG)

Timing Attack

is a category of attacks trying to guess an embedded private key based on the measurement of the execution time. Depending on the implementation, the execution may be longer if a given bit of the key is null or not. This type of attack may allow to deduce an embedded private key or part of it.

Triple DES

Encryption algorithm based on a succession of three DES encryption modules. This means that the plaintext is encrypted three times. There are several ways of doing that. Some of them increase the level of security while others are less secure then a single DES. Three modes of triple-encryption have been proposed and tested:

  • DES-EEE3: Three DES encryption modules with three different keys.
  • DES-EDE3: Three DES operations with three different keys. The sequence is encrypt-decrypt-encrypt.
  • DES-EEE2 and DES-EDE2: Respectively the same formats as DES-EEE3 and DES-EDE3 except that we used the same key for the first and the third operations.

MERKLE et al., proposed attacks on two-key triple DES have been proposed by. PRENEEL provided comparisons in the security of various versions of multiple-DES. It appears that the most secure form is triple-DES with three distinct keys.

TRNG (True Random Number Generator)

See Random number generator

Trojan Horse

is software installed on a host computer without his owner knowing it. The hacker activates from a remote computer the Trojan Horse that grants him complete access to the infected computer. This is done in a way transparent to the user. A  famous Trojan Horse is Back Orifice 2000 from Cult of the Dead Cow.

Trusted Third Party

is a special kind of Certification authority that keeps copies of their clients’ private keys. This may be used for instance to perform key escrowing.

TTP

see Trusted Third Party

Leave a Reply

Your email address will not be published. Required fields are marked *