Network Security Features of HP-UX 11i v1 and 11i v2
Page 34
Appendix B: Glossary
3DES Triple-Data Encryption Standard
AAA Authentication, Authorization, and Accounting
AES Advanced Encryption Standard
DES Data Encryption Standard
DH The Diffie-Hellman key agreement public-key cryptosystem
DMZ De-Militarized Zone (between the Internet and the intranet)
DSS Digital Signature Standard
EDI Electronic Data Interchange
HTTP Hyper-Text Transport Protocol
IETF Internet Engineering Task Force
KDC Key Distribution Center
Man-in-
the-middle
attacks
In a man-in-the-middle attack, the attacker relays traffic between two
parties in both directions, observes the conversation between the parties,
and modifies selected messages, thus achieving an effect equivalent to
the impersonation of one or both parties.