Authentication - Being able to validate that a 
messages is from who it claims to be from. An intruder should not be able to 
masquerade as someone else.
 
 
Big Numbers - Very large numbers 
used in digital encryption and signatures. Big numbers those larger than 2^128 or 128 bits integer. For
comparison the number  of atoms in the planet(Earth) is 2^170 or 170 bits integer.
 
CA - Certifying Authority
 
Cert - Short for certificate
 
Certificate - A special format of a public key which has been signed by a Certifying Authority
 
Certifying Authority - A trusted entity that signs public keys
 
Digital Signature - A special hash or signature which is create using the private key and can
only be validate using the matching public key.
 
Gabbi - Global Amateur Interchange format.  This is the format that logbooks 
use to send tQSL data to LoTW servers.
 
Integrity - Being able to validate that the message hasn't been altered.
 
Message - Any message or data that is to be signed, such a QSL or public key
 
Nonredudiation - A sender should not be able to falsely deny later that he sent a message.
 
PKDS  
    - Public Key Digital Signature. 
PKI - Public Key Infrastructure.  Because of the trust 
is require in using a PK system it requires a complex infrastructure which is 
called PKI.
 
Prime Numbers - Numbers that can only be divided by by itself and 1.
 
Principal - The person originating the message
 
 
Private key - A key which is used to sign messages which must be kept private
 
Public key - A key which can only be used to validate messages which has been signed with
the matching private key.
 
Secret key - A key which is used in single key encryption systems. A private key 
should be stored encrypted with a secret key.
 
Because this digital signature and encryption protocols has many players 
standard names call dramatic personae have been given to them.  Because we are only concern with digital signatures  and certificates has been
shorten to include only those we need.
| Alice | First participant in all the all protocols | 
| Bob | Second participant in the all protocols | 
| Mallory | Malicious active attacker | 
| Trent | Trusted arbitrator | 
| Peggy | QSL service provider | 
| Victor | Award sponsor verifier |