Public Key Certificate

Certificate in the form of data that holds a public key, authentication information, and private key information.

RA

A Registration Authority (RA) does not issue certificates, but does the required identification for certain certificate data.

Resolution

Resolution of a time code refers to the smallest increment of time, whether it is days, hours, seconds, or other.

Revocation

The withdrawing of a certificate by a Certificate Authority before its expiration date or time.

Also see Certificate Revocation List (CRL)

Risk Management

The tasks and plans that help avoid security risk, and if security is breached, helps minimize damage.

Root CA

A Certificate Authority (CA) whose certificate is self-signed; that is, the issuer and the subject are the same. A root CA is at the top of a hierarchy.

Root Time Trust Authority (RTTA)

Also called Root Time Trust Services, these are end user organizations who provide time calibration and auditing services. Examples include Seiko Instruments, Inc., and Sovereign Time.

RSA

The RSA (Rivest-Shamir-Andleman) algorithm is a public-key encryption technology developed by RSA Data Security.

SHA-1

Secure Hash Algorithm is an algorithm developed by the US National Institute of Standards and Technology (NIST). SHA-1 is used to create a cryptographic hash of a message or data. It has a larger message digest, so it is considered to be somewhat stronger than MD5.

Smart card

A card the size of a credit card, which holds a microprocessor that stores information.

S/MIME

Secure Multipurpose Internet Mail Extensions. The standard for secure messaging.

S100 User Guide – Rev. D – June 2005

131

Page 139
Image 139
Symmetricom S100 manual Rsa, SHA-1, Mime