Acronyms NIST Special Publication 800-63B

Key Management: General 16 User registration A function in the lifecycle of keying material; a process whereby an entity becomes a member of a security domain. X.509 certificate The X.509 public-key certificate or the X.509 attribute certificate, as defined by the ISOITU-T X.509 standard. Most commonly including in this document, an X.509 certificate refers to the X.509 public-key certificate. X.509 public-key certificate A digital certificate containing a public key for an entity and a name for that entity, together with some other information that is rendered un-forgeable by the digital signature of the certification authority that issued the certificate, encoded in the format defined in the ISOITU-T X.509 standard.

2.2 Acronyms

The following abbreviations and acronyms are used in this Recommendation: 2TDEA Two-key Triple Data Encryption Algorithm specified in [SP800-67] . 3TDEA Three-key Triple Data Encryption Algorithm specified in [SP800-67] . AES Advanced Encryption Standard specified in [FIPS197] . ANS American National Standard. ANSI American National Standards Institute. CA Certification Authority. CRC Cyclic Redundancy Check. CRL Certificate Revocation List. DRBG Deterministic Random Bit Generator. DSA Digital Signature Algorithm specified in [FIPS186] . ECC Elliptic Curve Cryptography. ECDSA Elliptic Curve Digital Signature Algorithm specified in [ANSX9.62] and approved in [FIPS186] . FFC Finite Field Cryptography. FIPS Federal Information Processing Standard. HMAC Keyed-Hash Message Authentication Code specified in [FIPS198] . IFC Integer Factorization Cryptography. IV Initialization Vector. MAC Message Authentication Code. NIST National Institute of Standards and Technology. PKI Public-Key Infrastructure. Key Management: General 17 POP Proof of Possession. RA Registration Authority. RBG Random Bit Generator. RNG Random Number Generator. RSA Rivest, Shamir, Adelman; an algorithm approved in [FIPS186] for digital signatures and in [SP800-56B] for key establishment. SMIME Secure Multipurpose Internet Mail Extensions. TDEA Triple Data Encryption Algorithm; Triple DEA specified in [SP800-67] . TLS Transport Layer Security Key Management: General 18 3 Security Services Cryptography may be used to perform or support several basic security services: confidentiality, integrity authentication, source authentication, authorization and non- repudiation. These services may also be required to protect cryptographic keying material. In addition, there are other cryptographic and non-cryptographic mechanisms that are used to support these security services. In general, a single cryptographic mechanism may provide more than one service e.g., the use of digital signatures can provide integrity authentication, and source authentication, but not all services.

3.1 Confidentiality