background image
Non-Proprietary Security Policy, Version 0.14
November 3, 2014
Software House iSTAR Edge Door Controllers
Page 23 of 24
© 2014 Software House, a brand of Tyco Security Products
This document may be freely reproduced and distributed whole and intact including this copyright notice.
4 Acronyms
Table 10 provides definitions for the acronyms used in this document.
Table 10
­ Acronyms
Acronyn
Description
AC
Alternating Current
ACM
Access Control Module
AES
Advanced Encryption Standard
ANSI
American National Standards Institute
CBC
Cipher Block Chaining
CMVP
Cryptographic Module Validation Program
CO
Crypto Officer
CPU
Central Processing Unit
CSEC
Communications Security Establishment
CSP
Critical Security Parameter
CVL
Component Validation Listing
DRAM
Dynamic Random Access Memory
DRBG
Deterministic Random Bit Generator
DSA
Digital Signature Algorithm
ECC
Elliptic Curve Cryptography
ECC CDH
Elliptic Curve Cryptography Cofactor Diffie-Hellman
ECDSA
Elliptic Curve Digital Signature Algorithm
EDC
Error Detection Code
EEPROM
Electrically Erasable Programmable Read-Only Memory
EMC
Electromagnetic Compatibility
EMI
Electromagnetic Interference
FAI
Fire Alarm Interface
FCC
Federal Communications Commission
FIPS
Federal Information Processing Standard
GCM
General Control Module
HMAC
Keyed-Hash Message Authentication Code
I/O
Input / Output
ICU
iSTAR Configuration Utility
IP
Internet Protocol
KAT
Known Answer Test
KDF
Key Derivation Function
LAN
Local Area Network
LCD
Liquid Crystal Display