Information Technology Reference
In-Depth Information
which is a cryptographic protocol that allows two
parties that have no prior knowledge of each other
to jointly establish a shared secret key over an
insecure communications channel. PKCS #4 is
withdrawn and PKCS #5 is the Password-based
Encryption Standard [RFC 2898 and PBKDF2].
PKCS #6 is the Extended-Certificate Syntax
Standard Defines extensions to the old v1 X.509
certificate specification. PKCS #7 is the Crypto-
graphic Message Syntax Standard [RFC 2315]
which is used to sign and/or encrypt messages
under a PKI and also for certificate dissemination
(for instance as a response to a PKCS#10 message).
PKCS #8 is the Private-Key Information Syntax
Standard [RFC 5208] which is used to carry private
certificate keypairs (encrypted or unencrypted).
PKCS #9 is the Selected Attribute Types which
defines selected attribute types for use in PKCS
#6 extended certificates, PKCS #7 digitally signed
messages, PKCS #8 private-key information, and
PKCS #10 certificate-signing requests. PKCS
#10 is the Certification Request Standard [RFC
2986] which is the format of messages sent to a
certification authority to request certification of a
public key. PKCS #11 is the Cryptographic Token
Interface (Cryptoki) which is an API defining a
generic interface to cryptographic tokens. PKCS
#12 is the Personal Information Exchange Syntax
Standard which defines a file format commonly
used to store private keys with accompanying
public key certificates, protected with a password-
based symmetric key. PKCS #13 is the Elliptic
Curve Cryptography Standard and PKCS #14 is
the Pseudo-random Number Generation. PKCS
#15 is the Cryptographic Token Information
Format Standard which defines a standard al-
lowing users of cryptographic tokens to identify
themselves to applications, independent of the
application's Cryptoki implementation (PKCS
#11) or other API.
PKI: It is an abbreviation of Public Key In-
frastructure, which is a set of hardware such as
servers, client devices like mobile terminals, PCs,
etc., software, people, policies and procedures re-
quired to issue, manage, distribute, use, store and
revoke the digital certificates. In cryptography, a
PKI is an arrangement that binds public keys such
as RSA, ECC, etc. with respective user identities
by means of a certificate authority (CA). The user
identity must be unique within each CA domain.
The binding is established through the registra-
tion and issuance process, which, depending on
the level of assurance the binding has, may be
carried out by software at a CA, or under human
supervision. The PKI role that assures this bind-
ing is called the Registration Authority (RA). For
each user, the user identity, the public key, their
binding, validity conditions and other attributes
are made unforgetable in public key certificates
issued by the CA.
TLS/SSL: Transport Layer Security (TLS)
and its predecessor, Secure Sockets Layer (SSL),
are cryptographic protocols that provide security
for communications over networks. TLS and SSL
encrypt the segments of network connections at
the Application Layer to ensure secure end-to-end
transit at the Transport Layer.
UICC: Universal Integrated Circuit Card is a
smartcard inserted into UMTS mobile phones for
user authentication to access UMTS networks and
an ideal medium for various UICC-based security
services with supporting of Java Card Platform
and GlobalPlatform.
USF: UICC-based Service Security Frame-
work is designed and developed for mobile op-
erators to provide UICC-based security services
such as PKI, DRM, TLS/SSL and Anti-Virus and
so forth. This framework supports lots of security
functionalities via API called by UICC-based ap-
plications such as applet and servlet.
Search WWH ::




Custom Search