Reference Guide

Acronyms 39
RSA BSAFE Crypto-J JSAFE and JCE Software Module 6.2.5 Security Policy Level 1
CRNG Continuous Random Number Generation.
CSP Critical Security Parameters.
CTR Counter mode of encryption, which turns a block cipher into a stream
cipher. It generates the next keystream block by encrypting successive
values of a counter.
CTS Cipher Text Stealing. A mode of encryption which enables block ciphers
to be used to process data not evenly divisible into blocks, without the
length of the ciphertext increasing.
DES Data Encryption Standard. A symmetric encryption algorithm which uses
a 56-bit key with eight parity bits.
DH,
Diffie-Hellman
The Diffie-Hellman asymmetric key exchange algorithm. There are many
variants, but typically two entities exchange some public information (for
example, public keys or random values) and combines them with their
own private keys to generate a shared session key. As private keys are not
transmitted, eavesdroppers are not privy to all of the information that
composes the session key.
DPK Data Protection Key.
DRBG Deterministic Random Bit Generator.
DSA Digital Signature Algorithm. An asymmetric algorithm for creating
digital signatures.
EC Elliptic Curve.
ECB Electronic Code Book. A mode of encryption in which identical
plaintexts are encrypted to identical ciphertexts, given the same key.
ECC Elliptic Curve Cryptography.
ECDH Elliptic Curve Diffie-Hellman.
ECDHC
Elliptic Curve Cryptography Diffie-Hellman
ECDSA Elliptic Curve Digital Signature Algorithm.
ECIES Elliptic Curve Integrated Encryption Scheme.
Encryption The transformation of plaintext into an apparently less readable form
(called ciphertext) through a mathematical process. The ciphertext may
be read by anyone who has the key that decrypts (undoes the encryption)
the ciphertext.
FFC Finite Field Cryptography
FIPS Federal Information Processing Standards.
Table 11 Acronyms used with the JCM (continued)
Acronym Definition