Statements (731)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
gptkb:infrastructure gptkb:standard gptkb:blockade gptkb:API gptkb:protocol gptkb:Library gptkb:species gptkb:Wasp gptkb:cloud_services gptkb:cloud_storage |
gptkbp:allows |
key rotation
provider-based architecture |
gptkbp:aroma |
pleasant aroma when crushed
|
gptkbp:available_at |
open source licenses
|
gptkbp:bark_color |
reddish-brown
fibrous and peeling |
gptkbp:based_on |
rotor mechanism
|
gptkbp:behavior |
man-in-the-middle attacks
|
gptkbp:body_shape |
conical
carapace chelicerae walking legs telson swimming appendages |
gptkbp:can_be_configured_for |
Security Providers
|
gptkbp:can_be_extended_by |
third-party providers
Custom algorithms |
gptkbp:can_be_used_for |
authentication
file transfer |
gptkbp:can_be_used_with |
on-premises applications
|
gptkbp:capacity |
32 GB
|
gptkbp:class |
gptkb:Pinopsida
|
gptkbp:climate |
temperate climate
|
gptkbp:climate_adaptation |
adapted to humid conditions
|
gptkbp:color |
light yellowish-brown
|
gptkbp:common_name |
Japanese cedar
|
gptkbp:components |
gptkb:crypt
secure applications secure systems |
gptkbp:conservation_status |
not threatened
|
gptkbp:cultivation |
widely cultivated in temperate regions
|
gptkbp:cultural_significance |
symbol of longevity in Japan
|
gptkbp:data_usage |
up to 25 MB/s
|
gptkbp:decommissioned |
1945
|
gptkbp:deployment |
gptkb:Nazi_Germany
cloud environments |
gptkbp:designed_for |
gptkb:crypt
gptkb:Java_2_Platform secure communication |
gptkbp:developed_by |
gptkb:Microsoft
gptkb:Oracle_Corporation gptkb:American_National_Standards_Institute gptkb:SD_Association gptkb:Internet_Engineering_Task_Force gptkb:IETF |
gptkbp:diameter |
woody
|
gptkbp:drought_tolerance |
moderate
|
gptkbp:enables |
access control
data integrity authentication secure communication secure data transmission |
gptkbp:exhibited_at |
gptkb:museums
science museums war museums |
gptkbp:facilitates |
Secure Communication
compliance with regulations digital signatures key management secure access to resources session key generation |
gptkbp:family |
gptkb:Cupressaceae
|
gptkbp:features |
gptkb:Reflector
plugboard rotors |
gptkbp:file_system |
gptkb:FAT32
|
gptkbp:first_appearance |
gptkb:Allied_forces
Allied cryptanalysts Ordovician period |
gptkbp:first_introduced |
1920s
|
gptkbp:first_published |
gptkb:1991
|
gptkbp:first_released |
gptkb:1995
|
gptkbp:flowering_season |
dioecious
can be grown from seed or cuttings |
gptkbp:foot |
gptkb:sports_equipment
|
gptkbp:form_factor |
2.1 mm thickness
|
gptkbp:fossil_record |
gptkb:Africa
gptkb:Europe gptkb:Asia gptkb:Australia gptkb:North_America yes |
gptkbp:fruit_type |
winged seeds
|
gptkbp:genus |
gptkb:Cryptomeria
|
gptkbp:governed_by |
cryptographic standards
policies and standards |
gptkbp:growth_form |
gptkb:tree
|
gptkbp:growth_habit |
pyramidal shape
|
gptkbp:growth_rate |
gptkb:fast
often found in forests |
gptkbp:habitat |
mountainous regions
coastal areas shallow seas |
gptkbp:has_color |
varies by species
|
gptkbp:has_diet |
gptkb:carnivore
|
gptkbp:has_enemies |
man-in-the-middle attacks
brute force attacks |
gptkbp:has_extinct_family |
Eurypteridae
Pterygotidae Brachyopteridae Mycterosomidae Stygobromidae |
gptkbp:has_impact_on |
computer security
modern cryptography |
gptkbp:has_legacy |
gptkb:crypt
gptkb:computer_science information security |
gptkbp:has_type |
electromechanical
|
gptkbp:has_variants |
gptkb:M3
gptkb:M1 gptkb:M2 gptkb:M4 M4 with additional rotors |
gptkbp:has_version |
gptkb:IKEv2
gptkb:IKEv1 |
gptkbp:height |
up to 50 meters
|
gptkbp:historical_significance |
gptkb:World_War_II
|
https://www.w3.org/2000/01/rdf-schema#label |
crypt
|
gptkbp:includes |
gptkb:crypt
gptkb:PKCS_#1 gptkb:Certificate_Authorities gptkb:PKCS_#10 gptkb:PKCS_#11 gptkb:PKCS_#12 gptkb:PKCS_#3 gptkb:PKCS_#5 gptkb:PKCS_#7 gptkb:PKCS_#8 gptkb:Java_Cryptography_Architecture_(JCE) gptkb:Elliptic_Curve_Digital_Signature_Algorithm_(ECDSA) gptkb:Java_Cryptography_Architecture_(JCA) RSA algorithm asymmetric encryption symmetric encryption Digital signatures hash functions Registration Authorities Encryption algorithms Key management private key public key Message authentication codes ECDSA algorithm DSA algorithm Crypto API functions Cryptographic service providers (CSPs) |
gptkbp:influenced |
modern encryption techniques
military communication strategies computer security practices |
gptkbp:influenced_by |
gptkb:Polish_cryptography
previous cipher machines |
gptkbp:inspired_by |
mechanical devices
|
gptkbp:integrates_with |
AWS services
|
gptkbp:introduced_in |
gptkb:Java_2_Platform,_Standard_Edition_(J2_SE)_1.4
gptkb:1976 gptkb:2006 gptkb:Whitfield_Diffie gptkb:Windows_2000 |
gptkbp:invention |
gptkb:Arthur_Scherbius
1918 |
gptkbp:is_a_basis_for |
secure protocols
|
gptkbp:is_a_foundation_for |
secure transactions
|
gptkbp:is_a_framework_for |
secure data sharing
secure coding practices public key distribution |
gptkbp:is_a_key_component_of |
cybersecurity
cybersecurity strategies |
gptkbp:is_a_reference_for |
security best practices
|
gptkbp:is_a_resource_for |
gptkb:developers
security researchers |
gptkbp:is_a_solution_for |
data breaches
secure data transmission trust establishment |
gptkbp:is_a_subject_of |
gptkb:academic_research
|
gptkbp:is_a_tool_for |
access control
risk management identity verification privacy protection |
gptkbp:is_accessible_by |
gptkb:AWS_SDKs
gptkb:API |
gptkbp:is_adopted_by |
Financial institutions
Government agencies Healthcare organizations E-commerce platforms Telecommunications companies |
gptkbp:is_associated_with |
gptkb:crypt
gptkb:Gordon_Welchman gptkb:Marian_Rejewski gptkb:Bletchley_Park gptkb:Alan_Turing gptkb:John_Tiltman gptkb:intelligence_operations signal intelligence |
gptkbp:is_available_for |
gptkb:multiple_platforms
|
gptkbp:is_available_in |
multiple regions
|
gptkbp:is_available_on |
gptkb:Java_1.4
gptkb:Java_1.1 gptkb:operating_system |
gptkbp:is_based_on |
gptkb:Mathematics
symmetric key cryptography public key infrastructure elliptic curve cryptography factorization problem discrete logarithm problem Mathematical properties of elliptic curves |
gptkbp:is_based_on_the_difficulty_of_solving |
Elliptic curve discrete logarithm problem
|
gptkbp:is_compared_to |
symmetric key cryptography
|
gptkbp:is_compatible_with |
gptkb:Java_SE
gptkb:IPv4 gptkb:Java_EE gptkb:Java_Development_Kit_(JDK) gptkb:SSL/_TLS gptkb:IPv6 Windows operating systems third-party tools SD devices various hardware security modules |
gptkbp:is_compliant_with |
gptkb:FIPS_140-2
|
gptkbp:is_considered |
gptkb:historical_artifacts
gptkb:sea_scorpion historically significant symbol of WWII espionage symbol of cryptography |
gptkbp:is_considered_by |
gptkb:historians
cryptographers military strategists |
gptkbp:is_considered_secure_against |
Classical computers
|
gptkbp:is_defined_by |
gptkb:RFC_7296
gptkb:RFC_2409 gptkb:RFC_4306 |
gptkbp:is_designed_for |
data integrity
high availability secure key storage |
gptkbp:is_designed_to |
reduce operational overhead
simplify key management |
gptkbp:is_documented_in |
Microsoft documentation
user manuals Java Documentation Java Cryptography Architecture Reference Guide Java Security Architecture Guide |
gptkbp:is_effective_against |
RSA for equivalent security levels
|
gptkbp:is_enhanced_by |
gptkb:crypt
encryption standards hardware acceleration security protocols Third-party libraries authentication standards |
gptkbp:is_essential_for |
data encryption
identity verification secure online transactions secure messaging cryptographic protocols e-commerce security |
gptkbp:is_evaluated_by |
security audits
|
gptkbp:is_featured_in |
gptkb:books
gptkb:documentaries gptkb:films |
gptkbp:is_found_in |
marine environments
fossil beds freshwater environments |
gptkbp:is_implemented_in |
gptkb:PGP
gptkb:crypt gptkb:SSH gptkb:SSL/_TLS government agencies various programming languages kernel mode firewalls various software applications security appliances Various programming libraries user mode VPN gateways |
gptkbp:is_influenced_by |
Regulatory requirements
Cryptographic standards Industry best practices |
gptkbp:is_integrated_with |
gptkb:Java_Secure_Socket_Extension_(JSSE)
gptkb:Java_Authentication_and_Authorization_Service_(JAAS) gptkb:Java_Management_Extensions_(JMX) gptkb:Java_Naming_and_Directory_Interface_(JNDI) gptkb:AWS_Cloud_Trail other security tools Windows security features |
gptkbp:is_involved_in |
data encryption
digital forensics secure software development |
gptkbp:is_known_for |
complexity
large size complexity of encryption diverse morphology predatory behavior historical impact contribution to victory in WWII |
gptkbp:is_maintained_by |
gptkb:RSA_Security
gptkb:Oracle_Corporation open source community trusted entities |
gptkbp:is_managed_by |
gptkb:AWS_Management_Console
|
gptkbp:is_notable_for |
its role in the war
|
gptkbp:is_part_of |
gptkb:Java_Enterprise_Edition
gptkb:historical_artifacts gptkb:Java_Standard_Edition gptkb:Java_SE_Security gptkb:Java_Security_API gptkb:Windows_API gptkb:military_technology gptkb:Java_Development_Kit_(JDK) gptkb:security_services gptkb:military_history gptkb:smart_home_devices AWS ecosystem AWS security services data governance identity management systems network security enterprise security VPN technology cybersecurity measures public key infrastructure (PKI) information security Cryptography Standards security frameworks Java EE (Enterprise Edition) cryptographic systems network security protocols history of computing secure network protocols data security strategy World War II technology German technology Post-quantum cryptography research secure communications framework AWS compliance programs history of cryptography Eurypterida order history of WWII IPsec architecture |
gptkbp:is_popular_in |
paleontological studies
fossil collections |
gptkbp:is_promoted_by |
gptkb:Java_User_Groups
Webinars Online tutorials Tech conferences |
gptkbp:is_related_to |
gptkb:PGP
gptkb:crypt gptkb:Diffie-Hellman_key_exchange gptkb:horseshoe_crabs gptkb:Java_Security_API gptkb:SSL/_TLS gptkb:S/_MIME gptkb:PKI data protection encryption standards network security privacy cryptographic protocols information security World War II espionage spiders scorpions |
gptkbp:is_scalable |
to meet demand
|
gptkbp:is_standardized_by |
gptkb:RFC_7296
gptkb:NIST gptkb:RFC_2409 gptkb:RFC_4251 gptkb:RFC_4306 data protection |
gptkbp:is_studied_in |
gptkb:computer_science
gptkb:Mathematics history paleontology |
gptkbp:is_subject_to |
regulatory compliance
legal regulations |
gptkbp:is_supported_by |
gptkb:Windows_SDK
gptkb:Java_Community_Process gptkb:Java_Runtime_Environment Open-source projects various operating systems Community contributions network devices various algorithms hardware security modules Various hardware devices |
gptkbp:is_symbolic_of |
intelligence warfare
wartime secrecy |
gptkbp:is_tested_for |
security vulnerabilities
Security audits |
gptkbp:is_updated_by |
gptkb:developers
Microsoft regularly |
gptkbp:is_used_by |
gptkb:developers
startups enterprises Windows applications VPN clients |
gptkbp:is_used_for |
gptkb:Secure_Sockets_Layer_(SSL)
gptkb:Public_Key_Infrastructure_(PKI) gptkb:Transport_Layer_Security_(TLS) data integrity authentication data confidentiality data encryption data protection digital signatures file encryption identity and access management secure communications secure messaging secure data transmission secure remote access secure web browsing secure file transfer Secure Hashing email encryption secure web services secure file storage secure software development site-to-site VPNs data signing |
gptkbp:is_used_in |
gptkb:blockchain_technology
gptkb:Bitcoin gptkb:Io_T_devices gptkb:Secure_Socket_Layer_(SSL) gptkb:financial_services gptkb:SSL/_TLS gptkb:cloud_services gptkb:intelligence_operations gptkb:Transport_Layer_Security_(TLS) gptkb:scientific_research gptkb:mobile_applications gptkb:Internet_of_Things_(Io_T) Authentication Digital wallets Mobile devices Cryptographic protocols healthcare Digital certificates enterprise applications Data integrity VPNs cloud security data security digital signatures educational purposes financial transactions secure communications web applications Virtual Private Networks (VPNs) Secure communications Java applications Digital signatures secure messaging digital certificates Data integrity verification Secure remote access cloud applications email security enterprise networks wireless networks cryptocurrencies Secure online transactions government communications secure email secure file transfer Authentication systems code signing government applications email encryption Secure messaging applications Secure email Secure voting systems key exchange protocols Secure data exchange Cryptographic tokens Secure file storage secure online banking Secure digital identities Secure access control Secure software updates remote access security Secure network protocols Secure online banking Secure online communications Secure online shopping Secure application programming interfaces (APIs) Secure cloud computing Secure online gaming Secure online identity verification Secure online platforms Io T applications Io T security Vo IP security Identity-based encryption Secure key exchange protocols Secure online applications Secure online environments Secure online services Secure online transactions systems |
gptkbp:is_used_to |
protect sensitive data
support regulatory compliance facilitate secure transactions secure cloud environments control key permissions manage access to keys manage cryptographic keys |
gptkbp:is_utilized_in |
gptkb:blockchain_technology
Cloud services Web applications Mobile applications access control data loss prevention application security cloud security data confidentiality data encryption at rest data encryption in transit data protection e-commerce file encryption identity management identity verification network security secure storage secure transactions VPN services Enterprise applications system security data integrity checks secure messaging endpoint security digital rights management database security digital currencies operating system security secure file sharing secure file transfer secure APIs email encryption e-commerce security secure cloud storage secure backups Io T applications Io T security |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
Quantum computers quantum attacks certificate spoofing |
gptkbp:key_concept |
gptkb:Reflector
plugboard rotors |
gptkbp:kingdom |
gptkb:Plantae
|
gptkbp:landscape |
shade tree
aesthetic appeal |
gptkbp:leaf_arrangement |
gptkb:spiral_galaxy
alternate |
gptkbp:leaf_color |
gptkb:green
|
gptkbp:leaf_shape |
needle-like
evergreen linear |
gptkbp:led_to |
development of cryptanalysis
|
gptkbp:length |
varies by species
up to 3 meters |
gptkbp:lifespan |
up to 1000 years
|
gptkbp:light_requirement |
full sun
|
gptkbp:lived_during |
Carboniferous period
Devonian period Silurian period Permian period |
gptkbp:native_to |
gptkb:Japan
|
gptkbp:notable_applications |
gptkb:smartphone
gptkb:camera gaming consoles tablets video recorders |
gptkbp:offers |
data encryption at rest
data encryption in transit digital signatures multi-region support |
gptkbp:operates |
gptkb:TCP/_IP
gptkb:UDP |
gptkbp:order |
Pinales
|
gptkbp:part_of |
gptkb:Java_2_Platform
|
gptkbp:performed_in |
gptkb:World_War_II
|
gptkbp:pests |
susceptible to root rot
|
gptkbp:phylum |
gptkb:Coniferophyta
|
gptkbp:pollinators |
wind-pollinated
|
gptkbp:predators |
larger marine animals
|
gptkbp:promotes |
Interoperability
|
gptkbp:proposed_by |
gptkb:Neil_Koblitz
gptkb:Victor_S._Miller |
gptkbp:provides |
gptkb:crypt
gptkb:random_number_generation confidentiality data integrity encryption audit logs authentication key management Public key cryptography secure hash algorithms decryption encryption algorithms key lifecycle management secure key management secure random number generation decryption algorithms encryption key management encryption services key policies key usage metrics encrypted communication cipher algorithms Cryptographic services digital certificate management hashing functions key agreement protocols decryption services |
gptkbp:provides_access_to |
gptkb:Amazon_Web_Services
|
gptkbp:region |
USDA zones 5-8
|
gptkbp:related_species |
gptkb:Cryptomeria
|
gptkbp:related_to |
gptkb:crypt
|
gptkbp:replaced_by |
gptkb:Cryptography_API:_Next_Generation_(CNG)
modern encryption methods in favor of CNG |
gptkbp:reproduction |
ovoviviparous
|
gptkbp:requires |
key management
user education secure web applications |
gptkbp:requires_smaller_keys_than |
gptkb:RSA
|
gptkbp:root_system |
shallow and wide
|
gptkbp:scales |
large organizations
|
gptkbp:security |
human error
key management Access controls Encryption keys Secure coding practices predictable settings |
gptkbp:seed_dispersal |
gptkb:wind
|
gptkbp:soil_type |
well-drained soil
|
gptkbp:species |
gptkb:Eurypterus
gptkb:Megalograptus gptkb:Pterygotus Stygobromus |
gptkbp:successor |
Secure Digital Extended Capacity
Lorenz SZ40/42 |
gptkbp:supports |
gptkb:TLS/_SSL_protocols
data integrity encryption asymmetric encryption authentication digital signatures key management secure communication symmetric encryption Asymmetric encryption hash functions cryptographic protocols decryption encryption algorithms key generation non-repudiation Symmetric encryption NAT traversal mutual authentication message digests symmetric keys asymmetric cryptography asymmetric keys symmetric cryptography key aliases |
gptkbp:technique |
data anonymization
confidential communication |
gptkbp:type_of |
Asymmetric cryptography
|
gptkbp:used_by |
German military
|
gptkbp:used_for |
data integrity
encryption authentication secure remote login |
gptkbp:used_in |
gptkb:IPsec
gptkb:Transport_Layer_Security_(TLS) gptkb:Software_Development Encryption Digital Signatures secure communications military communications |
gptkbp:uses |
gptkb:crypt
gptkb:Secure_Sockets_Layer_(SSL) gptkb:Elliptic_curves gptkb:Transport_Layer_Security_(TLS) ornamental tree timber production asymmetric cryptography asymmetric key encryption |
gptkbp:was_cracked_by |
gptkb:Alan_Turing
Bletchley Park team |
gptkbp:wildlife |
gptkb:Permian-Triassic_extinction_event
|
gptkbp:wood_uses |
durable and resistant to decay
moderate density furniture and construction |
gptkbp:written_in |
gptkb:C++
|
gptkbp:bfsParent |
gptkb:The_National_Security_Agency
gptkb:National_Security_Agency gptkb:user_interface gptkb:Shafi_Goldwasser gptkb:Ron_Rivest gptkb:Martin_Hellman gptkb:blockchain_technology gptkb:CIA gptkb:Quantum_Computing gptkb:United_States_Capitol gptkb:Alan_Turing gptkb:Andrew_Wiles gptkb:Battle_of_the_Atlantic gptkb:Andrew_Yao gptkb:Whitfield_Diffie gptkb:David_Chaum gptkb:Battle_of_the_North_Cape gptkb:The_Basilica_of_the_National_Shrine_of_the_Immaculate_Conception gptkb:U._S._Capitol gptkb:The_National_Security_Agency_Headquarters |
gptkbp:bfsLayer |
3
|