background image
Acronyms
23
RSA BSAFE Crypto-J 4.1 Security Policy
4 Acronyms
The following table lists the acronyms used with Crypto-J and their definitions.
Table 6
Acronyms used with Crypto-J
Acronym
Definition
3DES
Refer to Triple-DES
AES
Advanced Encryption Standard. A fast block cipher with a 128-bit
block, and keys of lengths 128, 192 and 256 bits. This will replace
DES as the US symmetric encryption standard.
API
Application Programming Interface.
Attack
Either a successful or unsuccessful attempt at breaking part or all of
a cryptosystem. Attack types include an algebraic attack, birthday
attack, brute force attack, chosen ciphertext attack, chosen plaintext
attack, differential cryptanalysis, known plaintext attack, linear
cryptanalysis, middleperson attack and timing attack.
CBC
Cipher Block Chaining. A mode of encryption in which each
ciphertext depends upon all previous ciphertexts. Changing the
Initialization Vector (IV) alters the ciphertext produced by
successive encryptions of an identical plaintext.
CFB
Cipher Feedback. A mode of encryption that produces a stream of
ciphertext bits rather than a succession of blocks. In other respects,
it has similar properties to the CBC mode of operation.
CRNG
Continuous Random Number Generation.
CSP
Critical Security Parameters.
DES
Data Encryption Standard. A symmetric encryption algorithm with
a 56-bit key.
Diffie-Hellman
The Diffie-Hellman asymmetric key exchange algorithm. There are
many variants, but typically two entities exchange some public
information (for example, public keys or random values) and
combines them with their own private keys to generate a shared
session key. As private keys are not transmitted, eavesdroppers are
not privy to all of the information that composes the session key.
DRBG
Deterministic Random Bit Generator.
DSA
Digital Signature Algorithm. An asymmetric algorithm for creating
digital signatures.
EC
Elliptic Curve.
ECAES
Elliptic Curve Asymmetric Encryption Scheme.