Common Data Security Architecture (CDSA) White Paper

Glossary of CDSA Terms and Acronyms

bulk encryption

Technique used to disguise a large amount of data using symmetric key algorithms that are relatively “inexpensive” computationally.

bundled modules

HP’s implementation of CDSA includes CSSM, CSP, and CL bundled modules. No DL or TP module is included in the first release of CDSA.

certificate revocation list (CRL)

A list of certificates that have been revoked or suspended.

cipher block chaining

Cipher block chaining is a technique wherein the output of a previous encrypted block is exclusive-ORed with an unencrypted block. The result is then encrypted.

computer security

Computer security consists of four elements: privacy, integrity, authenticity, and non-repudiation. Privacy is typically implemented by encrypting information so that only the intended reader may understand it. Data integrity requires that data is transmitted or stored in a tamperproof manner and that if data is modified or forged, alterations are readily detected. Authenticity means that the identity of the user responsible for the data creation can be verified. Non-repudiation ensures that users who created or sent data cannot falsely deny their responsibility for having done so.

cryptographic hash

A hash is a transformation of arbitrary data input into a shorter, fixed-size series of bits. Cryptographic hashing is in digital signatures. Among the message-digest hash functions used in cryptography are MD2, MD4, MD5, and the Secure Hash Algorithm (SHA-1).

cryptography

The science of mathematical algorithms that disguise data.

digital signature

A logical hash of information encoded using an asymmetric key unique to the signer, used to help authenticate the identify of the sender of a message.

encryption/decryption

Encryption is the scrambling of data into an unrecognizable form.

8

Chapter 1

Page 8
Image 8
HP UX Security Products and Features Software manual Glossary of Cdsa Terms and Acronyms