A |
---|
AAL | | See Application Adaptation Layer (AAL)..
|
---|
AC | | Authorization Computation service provider module.
Synonymous with Authorization Computation Module (ACM).
|
---|
Accountability | | A mechanism whereby the action of a user or a machine
can be traced to that user or machine. A user's action may be audited
and stored in a data bank called an audit trail. Subsequent searching
of the audit trail can match events to the event instigator. In
the commercial world, accountability is important to establish accurate billing
procedures.
|
---|
API | | Application Programming Interface.
|
---|
Application Adaptation Layer (AAL) | | An interface between CDSA and applications designed to
use CDSA services.
|
---|
Asymmetric Algorithms | | Cryptographic algorithms using one key to encrypt
and a second key to decrypt. They are often called public-key algorithms.
One key is called the public key, and the other is called the private
key or secret key.
|
---|
Attach | | A process whereby an application obtains a service
provider module handle, via an ATTACH call to CSSM. A service provider
module can be a dynamic load module added at runtime on demand or
a statically resident module.
|
---|
Authentication | | A user or machine's identity must be established
before establishing a connection to a computer. Authentication is
the process of proving identity to the satisfaction of the permission-granting
authority.
|
---|
Authorization | | Permission for an entity to perform an action upon
an object. Authorization is evaluated by a set of access control
rules. Evaluation typically includes authentication of the requesting
entity. The result of the evaluation should be conveyed to an agent
that can enable the requested action upon the target object.
|
---|
B |
---|
Bilateral authentication | | A scheme designed for two entities to establish
trust in the identity and integrity of each other.
|
---|
Biometric input | | The gathering of data from a personal, unique source,
such as fingerprints, retina patterns, or human voice, for the purposes
of verification or authorization.
|
---|
BIR | | Biometric Identification Record.
|
---|
BSAFE | | A cryptographic toolkit from RSA Data Security Incorporated.
|
---|
BSP | | Biometric Service Provider.
|
---|
C |
---|
CDSA | | See Common Data Security Architecture (CDSA)..
|
---|
Certificate | | A combination of an asymmetric public key and other
identifying private information, which is digitally signed by a
private key so it can be verified. See also Digital certificate.
|
---|
Certificate Authority | | An entity that guarantees or sponsors a certificate.
For example, a credit card company signs a cardholder's certificate
to assure that the cardholder is who he or she claims to be. The
credit card company is a certificate authority. Certificate authorities
issue, verify, and revoke certificates.
|
---|
Certificate chain | | The hierarchical chain of all other certificates
used to sign the current certificate. This includes the Certificate
Authority (CA) who signs the certificate, the CA who signed that
CA's certificate, and so on. There is no limit to the depth of the
certificate chain.
|
---|
Certificate signing | | The Certificate Authority (CA) can sign certificates
it issues or cosign certificates issued by another CA. In a general
signing model, an object signs an arbitrary set of one or more objects. Hence,
any number of signers can attest to an arbitrary set of objects.
The arbitrary objects could be, for example, pieces of a document
for libraries of executable code.
|
---|
Certificate validity date | | A start date and a stop date for the validity of
a certificate. If a certificate expires, the Certificate Authority
(CA) may issue a new certificate.
|
---|
Certification authority | | An entity that guarantees or sponsors a certificate.
For example, a credit card company signs a cardholder's certificate
to ensure that the cardholder is who he or she claims to be. The
credit card company is a certificate authority. Certificate authorities
issue, verify, and revoke certificates.
|
---|
CL | | Certificate Library service provider module. Synonymous
with Certificate Library Module (CLM).
|
---|
Common Data Security Architecture (CDSA) | | A set of layered security services that address communications
and data security problems in the emerging Internet and Intranet
application space. CDSA consists of three basic layers: A set of system security services The Common Security Services Manager (CSSM) Add-in security modules (CSPs, TPs, CLs, DLs, ACs)
|
---|
Common Security Services Manager (CSSM) | | The central layer of the Common Data Security Architecture
(CDSA) that defines the following service components: Cryptographic Services Manager Trust Policy Services Manager Certificate Library Services Manager Data Storage Library Services Manager Authorization Computation Manager Integrity Services Manager
CSSM binds together all the security services required by
applications. In particular, it facilitates linking digital certificates
to cryptographic actions and trust protocols.
|
---|
Confidentiality | | Information is revealed only to those who are authorized
to see it. Confidentiality can be provided through an authorization
and access control mechanism. It can also be provided through encryption
and decryption operations, which limit data access to those who
possess the cryptographic keys required to decrypt the information.
|
---|
CRL | | Certificate Revocation List. An official list of certificates
that are no longer valid.
|
---|
Cryptographic algorithm | | A method or defined mathematical process for implementing
a cryptography operation. A Cryptographic algorithm may specify
the procedure for encrypting and decrypting a byte stream, digitally
signing an object, computing the hash of an object, or generating
a random number.
|
---|
Cryptographic Service Providers (CSPs) | | Modules that provide secure key storage and cryptographic
functions. The modules may be software only or hardware with software
drivers. The cryptographic functions provided may include: Bulk encryption and decryption
|
---|
Cryptography | | The art and science of using mathematics to secure
information and create a high degree of trust in the electronic
media.
|
---|
Cryptoki | | The name of the PKCS#11 Version 1.0 standard published
by RSA Laboratories. The standard specifies the interface for accessing cryptographic
services performed by a removable device. For additional information,
refer to http://www.rsasecurity.com.
|
---|
CSP | | See Cryptographic Service Providers (CSPs)..
|
---|
CSSM | | See Common Security Services Manager (CSSM). .
|
---|
D |
---|
Digital certificate | | The binding of some identification to a public key
in a particular domain, as attested to directly or indirectly by
the digital signature of the owner of that domain. A digital certificate
is an unforgeable credential in cyberspace. The certificate is issued
by a trusted authority and covered by that party's digital signature.
The certificate may attest to the certificate holder's identity
or may authorize certain actions by the certificate holder. A certificate
may include multiple signatures and may attest to multiple objects
or multiple actions.
|
---|
Digital signature | | A data block that was created by applying a cryptographic
signing algorithm to some other data using a secret key. Digital
signatures may be used to: Authenticate the source of a message,
data, or document. Verify that the content of a message has not been modified
since it was signed by the sender. Verify that a public key belongs to a particular person.
Typical digital signing algorithms include RSA signaturing
and DSS, the Digital Signature Standard defined by NIST FIPS Pub
186.
|
---|
DL | | Database Library service provider module.
|
---|
E |
---|
EISL | | Embedded Integrity Services Library.
|
---|
EMM | | Elective module manager: an extensibility mechanism
in CDSA supporting the dynamic addition of new categories of service,
beyond the basic set of Cryptographic Service Provider (CSP), Trust
Policy (TP), Authorization Computation (AC), Certificate Library
(CL), and Data Storage Library (DL).
|
---|
ESW | | Electronic shrink-wrap. A term used to refer to an
aggregate collection of data files identified by a manifest or bill
of materials.
|
---|
F |
---|
FAR | | False Accept Rate: the probability that biometric
data samples are falsely decided by the HRS as matching; that is,
they should not match, but do.
|
---|
FRR | | False Reject Rate: the probability that biometric
data samples are falsely decided by the HRS as not matching; that
is, they should match, but do not.
|
---|
G |
---|
Generic Cryptographic Services (GCS) | | A set of services and associated APIs designed to
provide key-based cryptographic operations to applications. GCS
predates CDSA. GCS requirements were based on early hardware-based
cryptographic devices where cryptographic keys were retained within
the device. Some Internet applications require the secured transmission
of cryptographic keys. The CDSA Cryptographic Service APIs accommodate both
types of requirements.
|
---|
Generic Security Services (GSS) | | A set of services and associated APIs defined by
the International Engineering Task Force (IETF). The defined APIs support
concurrent applications in authenticating each other, delegating
rights and privileges to each other, and using confidentiality and
integrity verification services to secure communications between
the applications.
|
---|
GUI | | Graphical User Interface.
|
---|
GUID | | Globally unique identifier.
|
---|
H |
---|
Hash algorithm | | A cryptographic algorithm used to compress a variable-size
input stream into a unique, fixed-size output value. The function
is one-way, meaning the input value cannot be derived from the output
value. A cryptographically strong hash algorithm is collision-free,
meaning unique input values produce unique output values. Hashing
is typically used in digital signing algorithms. Example hash algorithms
include MD and MD2 from RSA Data Security. MD5, also from RSA Data
Security, hashes a variable-size input stream into a 128-bit output
value. SHA, a Secure Hash Algorithm published by the U.S. Government,
produces a 160-bit hash value from a variable-size input stream.
|
---|
HRS | | Human Recognition Services. HRS is a CSSM Elective
Module Manager intended to provide a high-level generic authentication
model suited for any form of human authentication. Particular emphasis
has been made in the design on its suitability for authentication
using biometric technology.
|
---|
I |
---|
IBIA | | International Biometric Industry Association.
|
---|
Integrity | | Information is said to have integrity if that data
has not been modified or altered since the point in time when an
authorized agent intended the data to be static. Information integrity
is important for all data types including authorization data and authentication
credentials.
|
---|
K |
---|
Key Management | | Public-private key pairs are items that need to
be securely managed. A key may be lost, stolen, or compromised.
If this happens, the key (and in fact, the key pair) must be nulled. Whatever
task the key was used for, a new key must be issued and used. In
the case of the lost key, a duplicate should be available. If not,
the data protected by the lost key may itself be lost. The null public
key must be advertised as invalid. It will be listed in a data bank
called a revocation list. The new public key must be distributed
to those entitled to have it.
|
---|
L |
---|
Leaf certificate | | The certificate in a certificate chain that has
not been used to sign another certificate in that chain. The leaf
certificate is signed directly or transitively by all other certificates
in the chain.
|
---|
M |
---|
Manifest | | A digital signature of a file, created using certificates.
The digital signature takes the form of a separate file called
a manifest. The manifest contains the encrypted digest of the target
file and the X509 certificates of the signers. This data is sufficient
to guarantee the identity of the signer of a file and the authenticity
of the file's contents.
|
---|
MDS | | See Module Directory Services (MDS)..
|
---|
Message Digest | | The digital fingerprint of an input stream. A cryptographic
hash function is applied to an input message of arbitrary length
and returns a fixed-size output, which is called the digest value.
|
---|
Meta-information | | Descriptive information specified by a service provider
module and stored in MDS. This information advertises the module's services.
CSSM supports application queries for this information. The information
may change at runtime.
|
---|
Module Directory Services (MDS) | | A platform-independent registration service for managing
executable code modules and their associated signed integrity credentials.
|
---|
N |
---|
Nonce | | A nonrepeating value, usually but not necessarily
random.
|
---|
O |
---|
OID | | Object identifier.
|
---|
Owned certificate | | A certificate whose associated private key resides
in a local CSP. Digital signature algorithms require the private
key when signing data. A system may supply certificates it owns
along with signed data to allow others to verify the signature.
A system uses certificates that it does not own to verify signatures
created by others.
|
---|
P |
---|
Payload | | Data wrapped inside biometric data for release to
an application on successful verification of authenticity of a user.
This can be any data that is useful to an application.
|
---|
PIN | | Personal Identification Number.
|
---|
PKI | | See Public Key Infrastructure (PKI)..
|
---|
Private key | | The cryptographic key used to decipher or sign messages
in public-key cryptography. This key is kept secret by its owner.
|
---|
Public key | | The cryptographic key used to encrypt messages in
public-key cryptography. The public key is available to multiple
users (for example, the public).
|
---|
Public Key Infrastructure (PKI) | | The agreed infrastructure, ultimately to be applied
worldwide, in which secure electronic business (eCommerce, banking,
legal transactions) and secure electronic welfare (medical welfare,
state and government provision for pensions, social security, and
so forth) can function securely using the private-public key method
of cryptography.
|
---|
PVC | | Pointer validation checking.
|
---|
R |
---|
Random number generator | | A function that generates cryptographically strong
random numbers that cannot be easily guessed by an attacker. Random
numbers are often used to generate session keys.
|
---|
Root certificate | | The prime certificate, such as the official certificate
of a corporation or government entity. The root certificate is positioned
at the top of the certificate hierarchy in its domain, and it guarantees
the other certificates in its certificate chain. The root certificate's
public key is the foundation of signature verification in its domain.
|
---|
RSA | | RSA Data Security, Incorporated, Bedford, MA. Producers
of the BSAFE toolkit.
|
---|
S |
---|
Secret key | | A cryptographic key used with symmetric algorithms,
usually to provide confidentiality.
|
---|
Secure Electronic Transaction (SET) | | A specification designed to utilize technology for authenticating
the parties involved in payment card purchases on any type of online
network, including the Internet. SET focuses on maintaining confidentiality
of information, ensuring message integrity, and authenticating the
parties involved in a transaction. More information about SET is available
at: http://www.setco.org/. See also Secure Sockets Layer (SSL).
|
---|
Secure Sockets Layer (SSL) | | Also known as Above Transport Layer Security (TLS).
A security protocol that prevents eavesdropping, tampering, or message forgery
over the Internet. An SSL service negotiates a secure session between
two communicating endpoints. Basic facilities include certificate-based authentication,
end-to-end data integrity, and optional data privacy. SSL has been
submitted to the IETF as an Internet Draft for Transport Layer Security
(TLS).
|
---|
Security context | | A control structure that retains state information
shared between a cryptographic service provider and the application
agent requesting service from the CSP. A security context specifies
CSP and application-specific values, such as required key length
and desired hash functions.
|
---|
Security infrastructure | | An agreed infrastructure for the security of all
electronic data transfer. Such an infrastructure would, in theory,
lessen the need for organizations to construct trust domains. An international
security infrastructure would facilitate the creation of a secure
Internet. Presently, global efforts are more focussed on an architecture
for Public Key Infrastructure, seen by many as the blueprint for
the infrastructure that will facilitate eCommerce.
|
---|
Security perimeter | | A conceptual perimeter or boundary of a computer
system or local area network inside which the security is at a known level
of competence. If data is required to cross this perimeter, it is
prudent to pass all such data through a firewall.
|
---|
Security risk assessment | | An exercise performed by specialists to assess how
vulnerable an enterprise is to various forms of security attack.
The ideal outcome from this exercise is a recommended range of security
measures, hardware, software, and procedural, which give a level
of protection commensurate with the value of the assets that need to
be protected.
|
---|
Security-relevant event | | An event where a CSP-provided function is performed,
a security service provider module is loaded, or a breach of system
security is detected.
|
---|
Session key | | A cryptographic key used to encrypt and decrypt
data. The key is shared by two or more communicating parties, who
use the key to ensure privacy of the exchanged data.
|
---|
SET | | See Secure Electronic Transaction (SET)..
|
---|
Signature | | See Digital Signature..
|
---|
Signature chain | | The hierarchical chain of signers, from the root
certificate to the leaf certificate, in a certificate chain.
|
---|
Signing and sealing | | The electronic equivalent to the handwritten signature
and the secure strong room. Precise ways of performing these actions
may vary, but signing by digital signature and sealing (for transport
or storage) by encryption is evolving towards internationally agreed
protocols which will be acceptable to the commercial world, the
legal profession, and governments.
|
---|
Single sign-on | | A mechanism whereby a single action of user authentication
and authorization can permit a user to access all computers and
systems where he has access permission, without the need to enter
multiple passwords. Single sign-on reduces human error, a major
component of systems failure.
|
---|
SmartCard | | A card of the same dimensions as the magnetic-stripe
credit card, but containing processing ability and memory storage
space. Because the card can contain storage credentials and cryptographic
keys and perform encryption/decryption operations, its power as
a tamper-proof personal token for authentication makes it very attractive
to a whole range of computer applications.
|
---|
SPI | | Service provider interface.
|
---|
SPKI | | Simple public key infrastructure. Information about
SPKI can be found at http://www.ietf.org/html.charters/spki-charter.html.
|
---|
SSL | | See Secure Sockets Layer (SSL)..
|
---|
SSLeay | | A free implementation of the Secure Sockets Layer. See also Secure Sockets Layer (SSL).
|
---|
Symmetric algorithms | | Cryptographic algorithms that use a single secret
key for encryption and decryption. Both the sender and receiver
must know the secret key. Well known symmetric functions include
DES (Data Encryption Standard) and IDEA. DES was endorsed by the
U.S. Government as a standard in 1977. It's an encryption block
cipher that operates on 64-bit blocks with a 56-bit key. It is designed
to be implemented in hardware, and works well for bulk encryption.
IDEA (International Data Encryption Algorithm) uses a 128-bit key.
|
---|
T |
---|
Token | | The logical view of a cryptographic device, as defined
by a CSP's interface. A token can be hardware, a physical object,
or software. A token contains information about its owner in digital
form and about the services it provides for electronic-commerce
and other communication applications. A token is a secure device.
It may provide a limited or a broad range of cryptographic functions.
Examples of hardware tokens are SmartCards and PMCIA cards.
|
---|
TP | | Trust Policy service provider module. Synonymous
with Trust Policy Module (TPM).
|
---|
Trust domains | | A designated virtual area that has a known and accepted
level of security, and thus a known and accepted level of trust.
A local area network is an example of a domain that is likely to be
trusted. Domains may be geographically wide ranging, and may be
made up of subdomains. A domain is only as trustworthy as its weakest component.
|
---|
V |
---|
Verification | | A process performed to check the integrity of a
message, to determine the sender of a message, or both. Different
algorithms are used to support different modes of verification. A typical procedure supporting integrity verification is the
combination of a one-way hash function and a reversible digital
signaturing algorithm. A one-way hash of the message is computed.
The hash value is signed by encrypting it with a private key. The message
and the encrypted hash value are sent to a receiver. The recipient
recomputes the one-way hash, decrypts the signed hash value, and
compares it with the computed hash. If the values match, then the
message has not been tampered since it was signed. The identity of a sender can be verified by a challenge-response
protocol. The recipient sends the message sender a random challenge
value. The original sender uses its private key to sign the challenge
value and returns the result to the receiver. The receiver uses
the corresponding public key to verify the signature over the challenge
value. If the signature is valid, the sender is the holder of the
private key. If the receiver can reliably associate the corresponding
public key with the named/known entity, then the identity of the
sender is said to have been verified.
|
---|
W |
---|
Web of trust | | A trust network among people who know and communicate
with each other. Digital certificates are used to represent entities
in the web of trust. Any pair of entities can determine the extent
of trust between the two, based on their relationship in the web.
|
---|
X |
---|
X509v3 certificate | | This standard defines the contents and structure
of a digital certificate. The specification is ITU-T Recommendation
X.509, Data Networks and Open System Communications Directory: Authentication
Framework, 06/97. This certificate format constitutes a widely accepted
basis for a public key infrastructure. To support the PKI, certificates
of this form are digitally signed and issued by certification authorities
(CAs).
|
---|