Cryptographic Token Interface Standard

PKCS#11


Definitions

AESAdvanced Encryption Standard, as defined in FIPS PUB 197.
APIApplication programming interface.
ASN.1Abstract Syntax Notation One, as defined in X.680.
ApplicationAny computer program that calls the Cryptoki interface.
AttributeA characteristic of an object.
BATONMISSI's BATON block cipher.
BERBasic Encoding Rules, as defined in X.690.
BLOWFISHThe Blowfish Encryption Algorithm of Bruce Schneier, www.schneier.com.
CAMELLIAThe Camellia encryption algorithm, as defined in RFC 3713.
CASTEntrust Technologies' proprietary symmetric block cipher.
CAST128Entrust Technologies' symmetric block cipher.
CAST3Entrust Technologies' proprietary symmetric block cipher.
CAST5Another name for Entrust Technologies' symmetric block cipher CAST128. CAST128 is the preferred name.
CBCCipher-Block Chaining mode, as defined in FIPS PUB 81.
CDMFCommercial Data Masking Facility, a block encipherment method specified by International Business Machines Corporation and based on DES.
CMACCipher-based Message Authenticate Code as defined in [NIST sp800-38b] and [RFC 4493].
CMSCryptographic Message Syntax (see RFC 2630)
CT-KIPCryptographic Token Key Initialization Protocol (as defined in [CT-KIP]3)
CertificateA signed message binding a subject name and a public key, or a subject name and a set of attributes.
Cryptographic DeviceA device storing cryptographic information and possibly performing cryptographic functions. May be implemented as a smart card, smart disk, PCMCIA card, or with some other technology, including software-only.
CryptokiThe Cryptographic Token Interface defined in this standard.
Cryptoki libraryA library that implements the functions specified in this standard.
DERDistinguished Encoding Rules, as defined in X.690.
DESData Encryption Standard, as defined in FIPS PUB 46-3.
DESData Encryption Standard, as defined in FIPS PUB 46-3.
DSADigital Signature Algorithm, as defined in FIPS PUB 186-2.
ECElliptic Curve
ECBElectronic Codebook mode, as defined in FIPS PUB 81.
ECDHElliptic Curve Diffie-Hellman.
ECDSAElliptic Curve DSA, as in ANSI X9.62.
ECMQVElliptic Curve Menezes-Qu-Vanstone
FASTHASHMISSI's FASTHASH message-digesting algorithm.
GOST 28147-89The encryption algorithm, as defined in Part 2 [GOST 28147-89] and [RFC 4357] [RFC 4490], and RFC [4491].
GOST R 34.10-2001The digital signature algorithm, as defined in [GOST R 34.10-2001] and [RFC 4357], [RFC 4490], and [RFC 4491].
GOST R 34.11-94Hash algorithm, as defined in [GOST R 34.11-94] and [RFC 4357], [RFC 4490], and [RFC 4491].
IDEAAscom Systec's symmetric block cipher.
IVInitialization Vector.
JUNIPERMISSI's JUNIPER block cipher.
KEAMISSI's Key Exchange Algorithm.
LYNKSA smart card manufactured by SPYRUS.
MACMessage Authentication Code.
MD2RSA Security's MD2 message-digest algorithm, as defined in RFC 1319.
MD5RSA Security's MD5 message-digest algorithm, as defined in RFC 1321.
MQVMenezes-Qu-Vanstone
MechanismA process for implementing a cryptographic operation.
OAEPOptimal Asymmetric Encryption Padding for RSA.
ObjectAn item that is stored on a token. May be data, a certificate, or a key.
PINPersonal Identification Number.
PKCSPublic-Key Cryptography Standards.
PRFPseudo random function.
PTDPersonal Trusted Device, as defined in MeT-PTD
RC2RSA Security's RC2 symmetric block cipher.
RC4RSA Security's proprietary RC4 symmetric stream cipher.
RC5RSA Security's RC5 symmetric block cipher.
RSAThe RSA public-key cryptosystem.
ReaderThe means by which information is exchanged with a device.
SETThe Secure Electronic Transaction protocol.
SHA-1The (revised) Secure Hash Algorithm with a 160-bit message digest, as defined in FIPS PUB 180-2.
SHA-224The Secure Hash Algorithm with a 224-bit message digest, as defined in RFC 3874. Also defined in FIPS PUB 180-2 with Change Notice 1.
SHA-256The Secure Hash Algorithm with a 256-bit message digest, as defined in FIPS PUB 180-2.
SHA-384The Secure Hash Algorithm with a 384-bit message digest, as defined in FIPS PUB 180-2.
SHA-512The Secure Hash Algorithm with a 512-bit message digest, as defined in FIPS PUB 180-2.
SKIPJACKMISSI's SKIPJACK block cipher.
SOA Security Officer user.
SSLThe Secure Sockets Layer 3.0 protocol.
SessionA logical connection between an application and a token.
SlotA logical reader that potentially contains a token.
Subject NameThe X.500 distinguished name of the entity to which a key is assigned.
TLSTransport Layer Security.
TokenThe logical view of a cryptographic device defined by Cryptoki.
UTF-8Universal Character Set (UCS) transformation format (UTF) that represents ISO 10646 and UNICODE strings with a variable number of octets.
UserThe person using an application that interfaces to Cryptoki.
WIMWireless Identification Module.
WTLSWireless Transport Layer Security.

RSA Security Inc. Public-Key Cryptography Standards - PKCS#11 - v230