Common Data Security Architecture (CDSA) White Paper

8 Chapter1
Common Data Security Architecture (CDSA) White Paper
Glossary of CDSA Terms and Acronyms
bulk encryption
Technique used to disguise a large amount of data using symmetric key
algorithms that are relatively “inexpensive” computationally.
bundled modules
HP’s implementation of CDSA includes CSSM, CSP, and CL bundled
modules. No DL or TP module is included in the first release of CDSA.
certificate revocation list (CRL)
A list of certificates that have been revoked or suspended.
cipher block chaining
Cipher block chaining is a technique wherein the output of a previous
encrypted block is exclusive-ORed with an unencrypted block. The result is
then encrypted.
computer security
Computer security consists of four elements: privacy, integrity, authenticity,
and non-repudiation. Privacy is typically implemented by encrypting
information so that only the intended reader may understand it. Data
integrity requires that data is transmitted or stored in a tamperproof
manner and that if data is modified or forged, alterations are readily
detected. Authenticity means that the identity of the user responsible for
the data creation can be verified. Non-repudiation ensures that users who
created or sent data cannot falsely deny their responsibility for having done
so.
cryptographic hash
A hash is a transformation of arbitrary data input into a shorter, fixed-size
series of bits. Cryptographic hashing is in digital signatures. Among the
message-digest hash functions used in cryptography are MD2, MD4, MD5,
and the Secure Hash Algorithm (SHA-1).
cryptography
The science of mathematical algorithms that disguise data.
digital signature
A logical hash of information encoded using an asymmetric key unique to
the signer, used to help authenticate the identify of the sender of a message.
encryption/decryption
Encryption is the scrambling of data into an unrecognizable form.