User's Manual

55
HASH
Message
Message Digest
Figure 8.2 – Operating layout of hash algorithms
Examples of hashing algorithm are SHA-1, MD2, MD4, MD5.
8.6 Glossary
User-Id User identity dependent on the key personal data ad univocal data.
PIN Alternative name for indicating the User-Id. Please refer to the User-Id definition.
Label Identifier assigned to each service that is necessary for identifying the token on the bus.
Server Secret Server secret that allows secure operations.
Password Server Alternative name for indicating the Server Secret. See the definition of Server Secret.
password Alternative name for indicating the Server Secret. See the definition of Server Secret.
Challenge Random Session String; the most univocal string possible used for generating authentications that
are always univocal and unforeseeable.
Response Response that the client processes following an authentication attempt.
Hash Function describer in the appendix Errore. L'origine riferimento non è stata trovata..
Sync Number Synchronization number used in the write remote operation.
8.7 Bibliography
[AES197] Announcing the ADVANCED ENCRYPTION STANDARD - AES FIPS PUB 197, November 2001.
[RFC1319] B. Kaliski, “The MD2 Message-Digest Algorithm”, Request for Comment 1319, April 1992.
[RFC1320] R. Rivest, “The MD4 _Message-Digest Algorithm”, Request for Comment 1320, April 1992.
[RFC1321] R. Rivest, “The MD5 _Message-Digest Algorithm”, Request for Comment 1321, April 1992.
[FLAN98] D. Flanagan, “JavaScript The Definitive Guide - Third Edition”, O’REILLY, June 1998.
[BASP99] D. Bruser, J. Kauffman, J. T.Llibre, B. Francis, D. Sussman, C. Ullman, J. Duckett, “Beginning
Active Server Pages 3.0”, Wrox Press Ltd., 1999
[PASP99] A. Homer, D. Sussman, B. Francis, D. Esposito, A. Chiarelli, S. Robinson, R. Anderson, G. Reilly, C.
McQueen, C. Blexrud, D. Denault, J. Schenken, B. Kropog, D. Sonderegger, M. Gibbs, “Professional
Active Server Pages 3.0”, Wrox Press Ltd., 1999
[SCH96] B. Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, Second Edition,
Iohn Wiley & Sons Inc., 1996.
[SMIT97] R. E. Smith, “Internet Cryptography”, Addison-Wesley, 1997.