Reference Guide

Acronyms and Definitions 53
RSA BSAFE Crypto-C Micro Edition 4.1.4 Security Policy Level 1
Key A string of bits used by cryptographic algorithms. There are a variety of
cryptographic key types. These keys might be used for operations such as
encryption or decryption, cryptographic signing or verification, or key
agreement. Some types of keys are intended to be kept secret, and other
keys are intended to be public.
Key wrapping A method of encrypting key data for protection on untrusted storage
devices or during transmission over an insecure channel.
L The bit length of the prime field size.
MAC Message Authentication Code.
MD2 A message digest algorithm, which hashes an arbitrary-length input into a
16-byte digest.
MD4 A message digest algorithm, which hashes an arbitrary-length input into a
16-byte digest.
MD5 A message digest algorithm, which hashes an arbitrary-length input into a
16-byte digest. Designed as a replacement for MD4.
N The bit length of the subprime field size.
NDRNG Non-deterministic random number generator.
NIST National Institute of Standards and Technology. A division of the US
Department of Commerce (formerly known as the NBS) which produces
security and cryptography-related standards.
OFB Output Feedback. A mode of encryption in which the cipher is decoupled
from its ciphertext.
OS Operating System.
P_HASH A function that uses the HMAC-HASH as the core function in its
construction. Specified in RFC 2246 and RFC 5246.
PBKDF1 Password-based Key Derivation Function 1. A method of password-based
key derivation defined in RFC 2988, which applies a message digest,
MD2, MD5, or SHA-1, to derive the key. PBKDF1 is not recommended
for new applications because the message digest algorithms used have
known vulnerabilities, and the derived keys are limited in length.
PBKDF2 Password-based Key Derivation Function 2. A method of password-based
key derivation, originally defined in RFC 2988, which applies a Message
Authentication Code (MAC) algorithm to derive the key. In RFC 2988 the
PRF used by PBKDF2 is specified as SHA-1. SP 800-132 approves
PBKDF2 where the PRF may be any FIPS approved hash function. In this
document PBKDF2 represents the expanded specification provided in SP
800-132.
PC Personal Computer.
Table 14 Acronyms and Definitions (continued)
Term Definition