Reference Guide
36 Acronyms and Definitions
RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy
Level 1
SEED SEED symmetric key encryption algorithm developed by the Korean Information Security
Agency.
SHA Secure Hash Algorithm. An algorithm, which creates a unique hash value for each possible
input. SHA takes an arbitrary input, which is hashed into a 160-bit digest.
SHA-1 A revision to SHA to correct a weakness. It produces 160-bit digests. SHA-1 takes an
arbitrary input, which is hashed into a 20-byte digest.
SHA-2 The NIST-mandated successor to SHA-1, to complement the Advanced Encryption
Standard. It is a family of hash algorithms (SHA-224, SHA-256, SHA-384, SHA-512,
SHA-512/224, and SHA-512/256), which produce digests of 224, 256, 384, 512, 224, and
256 bits respectively.
SEED A symmetric key algorithm developed by the Korean Information Security Agency.
Triple DES A variant of DES, which uses three 56-bit keys.
XTS XEX-based Tweaked Codebook mode with ciphertext stealing. A mode of encryption used
with AES.
Table 7 Acronyms and Definitions
Term Definition










