Reference Guide

58 Acronyms and Definitions
RSA BSAFE Crypto-C Micro Edition 4.1.4 Security Policy Level 1
with Level 2 Roles, Services, and Authentication
SHA-2 The NIST-mandated successor to SHA-1, to complement the Advanced
Encryption Standard. It is a family of hash algorithms (SHA-224,
SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256), which
produce digests of 224, 256, 384, 512, 224, and 256 bits respectively.
SHA-3 SHA-3 is a family of hash algorithms which include SHA-3-224,
SHA-3-256, SHA-3-384 and SHA-3-512 bits. It is an alternative to SHA-2,
as no significant attacks on SHA-2 are currently known.
SEED A symmetric key algorithm developed by the Korean Information Security
Agency.
SP 800-38A NIST Special Publication 800-38A: Recommendation for Block 2001
Edition Cipher Modes of Operation Methods and Techniques
.
SP 800-38C NIST Special Publication 800-38C: Recommendation for Block Cipher
Modes of Operation: The CCM Mode for Authentication and
Confidentiality.
SP 800-38D NIST Special Publication 800-38D: Recommendation for Block Cipher
Modes of Operation: Galois/Counter Mode (GCM) and GMAC.
SP 800-38E NIST Special Publication 800-38E: Recommendation for Block Cipher
Modes of Operation: The XTS-AES Mode for Confidentiality on Storage
Devices.
SP 800-38F NIST Special Publication 800-38F: Recommendation for Block Cipher
Modes of Operation: Methods for Key Wrapping.
SP 800-56A NIST Special Publication 800-56A Revision 2: Recommendation for
Pair-Wise Key Establishment Schemes Using Discrete Logarithm
Cryptography.
SP 800-56B NIST Special Publication 800-56B Revision 2: Recommendation for
Pair-Wise Key Establishment Using Integer Factorization Cryptography.
SP 800-56C NIST Special Publication 800-56C Revision 1: Recommendation for
Key-Derivation Methods in Key-Establishment Schemes.
SP 800-57 Part
1 Rev. 4
NIST Special Publication 800-57 Part 1 Revision 4: Recommendation for
Key Management.
SP 800-67
Rev. 2
NIST Special Publication 800-67 revision 2: Recommendations for The
Triple Data Encryption Block Cipher.
SP 800-89 NIST Special Publication 800-89: Recommendation for Obtaining
Assurances for Digital Signature Applications.
SP 800-90A
Rev. 1
NIST Special Publication 800-90A Revision 1: Recommendation for
Random Number Generation Using Deterministic Random Bit Generators.
SP 800-108 NIST Special Publication 800-108: Recommendation for Key Derivation
Using Pseudorandom Functions (Revised).
Table 14 Acronyms and Definitions (continued)
Term Definition