AES

Advanced Encryption Standard.

algorithm

A series of steps used to complete a task.

Alice

The name traditionally used for the first user of cryptography in a system; Bob's friend.

ANSI

American National Standards Institute.

API

Application Programming Interface.

attack

Either a successful or unsuccessful attempt at breaking part or all of a cryptosystem. See algebraic attack, birthday attack, brute force attack, chosen ciphertext attack, chosen plaintext attack, differential cryptanalysis, known plaintext attack, linear cryptanalysis, and middleperson attack.

authentication

The action of verifying information such as identity, ownership, or authorization.

BER

Basic Encoding Rules. A set of rules for representing ASN.1 objects as strings of ones and zeros. DER is a subset of BER.

bit

A binary digit, either 1 or 0.

block cipher

A symmetric cipher which encrypts a message by breaking it down into fixed size blocks and encrypting each block.

Bob

The name traditionally used for the second user of cryptography in a system; Alice's friend.

CA

See certifying authority.

CAPI

Cryptographic Application

Programming Interface.

certificate

In cryptography, an electronic document binding some pieces of information together, such as a user's identity and public key. Certifying Authorities (CA's) provide certificates.

Certifying Authority (CA)

A person or organization that creates certificates.

checksum

Used in error detection, a checksum is a computation done on the message and transmitted with the message; similar to using parity bits.

cipher

An encryption-decryption algorithm.

ciphertext

Encrypted data.

3 4 0

R S A B S A F E C r y p t o - C D e v e l o p e r ’s G u i d e

Page 362
Image 362
RSA Security 5.2.2 manual Advanced Encryption Standard, Series of steps used to complete a task, Binary digit, either 1 or