Reference Guide

54 Acronyms and Definitions
RSA BSAFE Crypto-C Micro Edition 4.1.4 Security Policy Level 1
PRF PseudoRandom Function
Private Key The secret key in public key cryptography. Primarily used for decryption
but also used for encryption with digital signatures.
PRNG Pseudo-random Number Generator.
Public Key TBA
RC2 Block cipher developed by Ron Rivest as an alternative to the DES. It has a
block size of 64 bits and a variable key size. It is a legacy cipher and RC5
should be used in preference.
RC4 Symmetric algorithm designed by Ron Rivest using variable length keys
(usually 40-bit or 128-bit).
RC5 Block cipher designed by Ron Rivest. It is parameterizable in its word size,
key length, and number of rounds. Typical use involves a block size of 64
bits, a key size of 128 bits, and either 16 or 20 iterations of its round
function.
RFC 2246 The TLS Protocol.
RFC 2313 PKCS #1: RSA Encryption.
RFC 2998 PKCS #5: Password-Based Cryptography Specification.
RFC 4086 Randomness Requirements for Security.
RFC 4346 The Transport Layer Security (TLS) Protocol.
RFC 5246 The Transport Layer Security (TLS) Protocol.
RFC 5488 AES Galois Counter Mode (GCM) Cipher Suites for TLS.
RNG Random Number Generator.
RSA Public key (asymmetric) algorithm providing the ability to encrypt data
and create and verify digital signatures. RSA stands for Rivest, Shamir,
and Adleman, the developers of the RSA public key cryptosystem.
SEED SEED symmetric key encryption algorithm developed by the Korean
Information Security Agency.
SHA Secure Hash Algorithm. An algorithm, which creates a unique hash value
for each possible input. SHA takes an arbitrary input, which is hashed into
a 160-bit digest.
SHA-1 A revision to SHA to correct a weakness. It produces 160-bit digests.
SHA-1 takes an arbitrary input, which is hashed into a 20-byte digest.
Table 14 Acronyms and Definitions (continued)
Term Definition