Concepts

algorithm, authentication, authorization, certificate, cryptography, digital signature, entity, identification, risk,

Terms

acceptor
HasPreferred:card acceptor,
access control
Includes:credential, data separation,
accountability
IncludedBy:entity,
acquirer
IncludedBy:entity,
active (key state)
IncludedBy:cryptographic key, key state,
addition rule
address certificate
IncludedBy:certificate,
agent identity
IncludedBy:entity, identification,
algorithm
Includes:Data Encryption Algorithm, Secure Hash Algorithm, Revision 1, algorithm identifier, asymmetric cryptographic algorithm, authentication algorithm, elliptic curve digital signature algorithm, encryption algorithm,
algorithm identifier
IncludedBy:algorithm,
alteration
IncludedBy:risk,
asymmetric cryptographic algorithm
IncludedBy:algorithm, cryptography,
Includes:digital signature, private key, private prime factors, public key, public key certificate,
attribute
IncludedBy:entity,
Includes:Attribute Authority, attribute certificate,
Attribute Authority
IncludedBy:Certification Authority, attribute,
Includes:attribute certificate,
attribute certificate
IncludedBy:Attribute Authority, attribute, certificate,
audit journal
Includes:audit record field,
PreferredFor:audit trail,
audit record field
IncludedBy:audit journal,
audit trail
HasPreferred:audit journal,
authentication
IncludedBy:authorization, entity,
Includes:authentication algorithm, authentication element, authentication key, authentication sequence number, authentication token, entity authentication, identification, identity factor, identity of key for authentication, key authentication, message authentication, message authentication code, notarization, personal authenticating information, simple authentication, strong authentication, transportation authentication data key, verification,
authentication algorithm
IncludedBy:algorithm, authentication,
authentication element
IncludedBy:authentication,
authentication key
IncludedBy:authentication, cryptographic key,
authentication sequence number
IncludedBy:authentication,
authentication token
IncludedBy:authentication,
PreferredFor:token,
authorization
Includes:authentication, authorization certificate, authorization procedure, authorized signatory, signatory authority,
authorization certificate
IncludedBy:authorization, certificate,
authorization procedure
IncludedBy:authorization,
authorized signatory
IncludedBy:Certification Authority, authorization, entity, signatory authority,
base derivation key
IncludedBy:cryptographic key,
base key
IncludedBy:cryptographic key,
base point (G)
basis
BAUDOT
beneficiary party(ies)
biased
big-endian
binary polynomial
binary string
binary string to integer conversion
binary vector
birthday phenomenon
bit string
block
block encryption
IncludedBy:Data Encryption Algorithm, encryption,
bundle
IncludedBy:Data Encryption Algorithm,
Synonym:key bundle,
CA-certificate
IncludedBy:Certification Authority, certificate,
card acceptor
IncludedBy:entity,
PreferredFor:acceptor,
card issuer
IncludedBy:entity,
PreferredFor:issuer,
cascading obsolete flag
certificate
IncludedBy:certification,
Includes:CA-certificate, Certificate Revocation List, Certification Authority, address certificate, attribute certificate, authorization certificate, certificate hold, certificate information, certificate policy, certificate request data, certificate serial number, certificate user, certificate-using system, certification, certification path, certification policy element, certification practice statement, cross certification, device certificate, digital signature, end certificate, intermediate certificates, meta certificate, power of attorney certificate, public key certificate, restriction certificate, role certificate, signatory certificate, sponsor certificate, user certificate,
certificate hold
IncludedBy:certificate,
certificate information
IncludedBy:certificate,
certificate policy
IncludedBy:certificate,
certificate request data
IncludedBy:certificate,
Certificate Revocation List
IncludedBy:Certification Authority, certificate,
Includes:CRL distribution point, delta-CRL,
certificate serial number
IncludedBy:certificate,
certificate user
IncludedBy:certificate,
certificate-using system
IncludedBy:certificate,
certification
IncludedBy:certificate,
Includes:Certification Authority, certificate, certification path, certification practice statement, cross certification,
Certification Authority
IncludedBy:certificate, certification,
Includes:Attribute Authority, CA-certificate, CRL distribution point, Certificate Revocation List, authorized signatory, certification path, certification practice statement, delta-CRL, policy mapping, policy qualifier, subject CA, subscriber,
certification path
IncludedBy:Certification Authority, certificate, certification,
certification policy element
IncludedBy:certificate,
certification practice statement
IncludedBy:Certification Authority, certificate, certification,
characteristic 2 finite field
checkvalue
HasPreferred:checkvalue,
PreferredFor:checkvalue,
cipher block chaining
IncludedBy:Data Encryption Algorithm,
ciphertext
Antonym:cleartext, plaintext,
HasPreferred:ciphertext,
IncludedBy:cryptography, encryption,
Includes:ciphertext encryption element, ciphertext string, ciphertext substring,
PreferredFor:ciphertext,
ciphertext encryption element
IncludedBy:ciphertext,
ciphertext string
IncludedBy:ciphertext,
ciphertext substring
IncludedBy:ciphertext,
cleartext
Antonym:ciphertext,
Synonym:plaintext,
clock cycle
clocking
IncludedBy:Data Encryption Algorithm,
closed-loop response integrity
communicating pair
compressed form
compromise
IncludedBy:threat,
Includes:compromised obsolete (key state), compromised obsolete flag,
compromised obsolete (key state)
IncludedBy:compromise, cryptographic key, key state,
compromised obsolete flag
IncludedBy:compromise,
confidentiality
Synonym:privacy,
corresponding key field
IncludedBy:cryptographic key,
credential
IncludedBy:access control, identification,
credit party
IncludedBy:entity,
CRL distribution point
IncludedBy:Certificate Revocation List, Certification Authority,
cross certification
IncludedBy:certificate, certification,
cryptographic boundary
IncludedBy:Data Encryption Algorithm, cryptography,
cryptographic equipment
IncludedBy:cryptography,
cryptographic hash
IncludedBy:cryptographic hash function,
cryptographic hash function
IncludedBy:cryptography,
Includes:Secure Hash Algorithm, Revision 1, cryptographic hash, hash, hash value,
PreferredFor:hash function,
cryptographic initialization
IncludedBy:Data Encryption Algorithm, cryptography,
cryptographic key
IncludedBy:cryptography,
Includes:active (key state), authentication key, base derivation key, base key, compromised obsolete (key state), corresponding key field, cryptographic key synchronization, data key, derivation key, derived unique key per transaction, discontinued keys, double length key, effective date of key, elliptic curve key pair, elliptic curve private key, elliptic curve public key, encryption key, highest level key, identity of key for authentication, implicitly identified key, irreversible transformation for a key, irreversible transformation of a key, key agreement, key authentication, key bundle, key component, key confirmation, key encrypting key, key encrypting key pair, key establishment, key exchange, key exchange transaction, key generation center, key generator, key granularity, key integrity, key loader, key management, key management facility, key offset, key pair, key pair updating, key security, key service message, key set, key set identifier, key state, key storage, key subtype, key translation, key transport, key type, key usage vector, key validation, keying material, keying relationship, master key, obsolete (key state), pending activation (key state), pending obsolete (key state), polyinstantiation, private key, public key, split knowledge, subscriber key, symmetric key, system key, transaction key, transportation authentication data key, variant of a key, working key,
PreferredFor:key,
cryptographic key synchronization
IncludedBy:cryptographic key,
cryptographic keying material
HasPreferred:keying material,
cryptographic material
HasPreferred:keying material,
cryptographic module
IncludedBy:cryptography,
PreferredFor:module,
cryptographic module facility
IncludedBy:cryptography,
cryptographic service message
IncludedBy:cryptography,
cryptographic synchronization
IncludedBy:cryptography,
cryptographic system
IncludedBy:cryptography,
cryptography
Includes:Data Encryption Algorithm, asymmetric cryptographic algorithm, ciphertext, cryptographic boundary, cryptographic equipment, cryptographic hash function, cryptographic initialization, cryptographic key, cryptographic module, cryptographic module facility, cryptographic service message, cryptographic synchronization, cryptographic system, cryptoperiod, decipherment, decryption, digital signature, elliptic curve, encipherment, encryption, irreversible encipherment, message authentication code, reversible encipherment, reversible public key cryptography,
cryptoperiod
IncludedBy:cryptography,
customer
IncludedBy:entity,
cyclic group
Data Encryption Algorithm
IncludedBy:algorithm, cryptography,
Includes:DEA Decryption Operation, DEA Device, DEA Encryption Operation, DEA Functional Block, DEA Input Block, DEA Key, DEA Output Block, block encryption, bundle, cipher block chaining, clocking, cryptographic boundary, cryptographic initialization, initialization vector, propagation delay,
data integrity
data key
IncludedBy:cryptographic key,
data separation
IncludedBy:access control,
data unit
date of message origination
DEA Decryption Operation
IncludedBy:Data Encryption Algorithm,
DEA Device
IncludedBy:Data Encryption Algorithm,
DEA Encryption Operation
IncludedBy:Data Encryption Algorithm,
DEA Functional Block
IncludedBy:Data Encryption Algorithm,
DEA Input Block
IncludedBy:Data Encryption Algorithm,
DEA Key
IncludedBy:Data Encryption Algorithm,
DEA Output Block
IncludedBy:Data Encryption Algorithm,
debit party
decipher
HasPreferred:decryption,
decipherment
Antonym:encipherment,
IncludedBy:cryptography,
Synonym:decryption,
decrypt
decrypt state
decryption
IncludedBy:cryptography,
PreferredFor:decipher,
Synonym:decipherment,
degauss
delegation
deletion
PreferredFor:loss,
delimiter
delta-CRL
IncludedBy:Certificate Revocation List, Certification Authority,
derivation key
IncludedBy:cryptographic key,
derived unique key per transaction
IncludedBy:cryptographic key, transaction,
design standard
device certificate
IncludedBy:certificate,
Diffie-Hellman numbers
digest information
digital signature
IncludedBy:asymmetric cryptographic algorithm, certificate, cryptography,
Includes:elliptic curve digital signature algorithm, non-repudiation, rDSA, signatory, signed document,
PreferredFor:signature,
directory
discontinued keys
IncludedBy:cryptographic key,
distinguished entity
distinguished name
distinquished entity
IncludedBy:entity,
distinquished name
IncludedBy:entity,
document
domain parameters
double length key
IncludedBy:cryptographic key,
dual control
Includes:split knowledge,
duplication
HasPreferred:replay,
ECDSA
effective date
effective date of key
IncludedBy:cryptographic key,
electronic distribution
elliptic curve
IncludedBy:cryptography,
Includes:elliptic curve digital signature algorithm, elliptic curve discrete logarithm problem, elliptic curve key pair, elliptic curve key pair (Q, d), elliptic curve parameters, elliptic curve point, elliptic curve private key, elliptic curve private key (d), elliptic curve public key, elliptic curve public key (Q), valid elliptic curve parameters, x-coordinate, y-coordinate,
elliptic curve digital signature algorithm
IncludedBy:algorithm, digital signature, elliptic curve,
elliptic curve discrete logarithm problem
IncludedBy:elliptic curve,
elliptic curve key pair (Q, d)
IncludedBy:elliptic curve,
elliptic curve key pair
IncludedBy:cryptographic key, elliptic curve,
elliptic curve parameters
IncludedBy:elliptic curve,
elliptic curve point
IncludedBy:elliptic curve,
elliptic curve private key (d)
IncludedBy:elliptic curve,
elliptic curve private key
IncludedBy:cryptographic key, elliptic curve,
elliptic curve public key (Q)
IncludedBy:elliptic curve,
elliptic curve public key
IncludedBy:cryptographic key, elliptic curve,
encipher
HasPreferred:encryption,
encipherment
Antonym:decipherment,
IncludedBy:cryptography,
Includes:irreversible encipherment, reversible encipherment,
Synonym:encryption,
encrypt
encrypt state
encryption
IncludedBy:cryptography,
Includes:block encryption, ciphertext, encryption algorithm,
PreferredFor:encipher,
Synonym:encipherment,
encryption algorithm
IncludedBy:algorithm, encryption,
encryption element
encryption key
IncludedBy:cryptographic key,
end certificate
IncludedBy:certificate,
end entity
IncludedBy:entity,
entity
Includes:accountability, acquirer, agent identity, attribute, authentication, authorized signatory, card acceptor, card issuer, credit party, customer, distinquished entity, distinquished name, end entity, entity authentication, grantor, identification, initial recipient, institution, legal entity, local registration agent, logical party, node, owner, recipient, relying party, repudiation, sender, signatory, signatory authority, subject, subject end entity, subscriber, user, verifier,
entity authentication
IncludedBy:authentication, entity,
ephemeral data
error service message
exclusive-or
Includes:modulo-2 addition,
explicitly identified
field tag
financial institution
IncludedBy:institution,
financial message
fixed format message
fixed split
IncludedBy:split,
PreferredFor:organization split,
forgery
IncludedBy:risk,
forward secrecy
forwarding
gaussian normal basis
IncludedBy:normal basis,
GF(p)*
grantor
IncludedBy:entity,
hash
IncludedBy:cryptographic hash function,
Includes:hash function, hash value,
hash function
HasPreferred:cryptographic hash function,
IncludedBy:hash,
hash value
IncludedBy:cryptographic hash function, hash,
header
highest level key
IncludedBy:cryptographic key,
hybrid form
identification
IncludedBy:authentication, entity,
Includes:agent identity, credential, identification cards, identification factor, identity factor, personal identification number,
identification cards
IncludedBy:identification,
identification factor
IncludedBy:identification,
identity factor
IncludedBy:authentication, identification,
identity of key for authentication
IncludedBy:authentication, cryptographic key,
immediately activated
implicitly identified key
IncludedBy:cryptographic key,
initial recipient
IncludedBy:entity,
initial text sequence
initialization vector
IncludedBy:Data Encryption Algorithm,
insertion
institution
IncludedBy:entity,
Includes:financial institution,
interactive
interchange
intermediate certificates
IncludedBy:certificate,
interoperability
irreducible binary
irreversible encipherment
Antonym:reversible encipherment,
IncludedBy:cryptography, encipherment,
irreversible transformation for a key
IncludedBy:cryptographic key,
irreversible transformation of a key
IncludedBy:cryptographic key,
issuer
HasPreferred:card issuer,
key
HasPreferred:cryptographic key,
key agreement
IncludedBy:cryptographic key,
key authentication
IncludedBy:authentication, cryptographic key,
key bundle
IncludedBy:cryptographic key,
Synonym:bundle,
key component
IncludedBy:cryptographic key,
key confirmation
IncludedBy:cryptographic key,
key encrypting key
IncludedBy:cryptographic key,
key encrypting key pair
IncludedBy:cryptographic key,
key establishment
IncludedBy:cryptographic key,
key exchange
IncludedBy:cryptographic key,
key exchange transaction
IncludedBy:cryptographic key, transaction,
key generation center
IncludedBy:cryptographic key,
key generator
IncludedBy:cryptographic key,
key granularity
IncludedBy:cryptographic key,
key integrity
IncludedBy:cryptographic key,
key loader
IncludedBy:cryptographic key,
key management
IncludedBy:cryptographic key,
Includes:nonce,
key management facility
IncludedBy:cryptographic key,
key offset
IncludedBy:cryptographic key,
key pair
IncludedBy:cryptographic key,
key pair updating
IncludedBy:cryptographic key,
key security
IncludedBy:cryptographic key,
key service message
IncludedBy:cryptographic key,
key set
IncludedBy:cryptographic key,
Includes:key set identifier,
key set identifier
IncludedBy:cryptographic key, key set,
key state
IncludedBy:cryptographic key,
Includes:active (key state), compromised obsolete (key state), obsolete (key state), pending activation (key state), pending obsolete (key state),
key storage
IncludedBy:cryptographic key,
key subtype
IncludedBy:cryptographic key,
key translation
IncludedBy:cryptographic key,
key transport
IncludedBy:cryptographic key,
key type
IncludedBy:cryptographic key,
key usage vector
IncludedBy:cryptographic key,
key validation
IncludedBy:cryptographic key,
keying material
IncludedBy:cryptographic key,
PreferredFor:cryptographic keying material, cryptographic material,
keying relationship
IncludedBy:cryptographic key,
label
IncludedBy:split,
large prime factors
least significant bit(s)
Antonym:most significant bit(s),
legal entity
IncludedBy:entity,
local registration agent
IncludedBy:entity,
logical party
IncludedBy:entity,
loss
HasPreferred:deletion,
m-bit number
master key
IncludedBy:cryptographic key,
material data integrity
message
message authentication
IncludedBy:authentication,
Includes:message authentication code,
message authentication code
IncludedBy:authentication, cryptography, message authentication,
message digest
message element
message identifier
meta certificate
IncludedBy:certificate,
module
HasPreferred:cryptographic module,
modulo-2 addition
IncludedBy:exclusive-or,
most significant bit(s)
Antonym:least significant bit(s),
multi-threaded
multiple center agent
multiple center group
multiple center subscriber
IncludedBy:subscriber,
nibble
node
IncludedBy:entity,
non-repudiation
Antonym:repudiation,
IncludedBy:digital signature,
non-reversible transformation
non-supersingular
nonce
IncludedBy:key management, replay,
normal basis
Includes:gaussian normal basis, optimal normal basis,
notarization
IncludedBy:authentication,
object
obsolete (key state)
IncludedBy:cryptographic key, key state,
obsolete date
octet
Includes:octet string,
octet string
IncludedBy:octet,
octet string to binary string conversion
offset
offset decrypt
offset encrypt
offset encryption
one-way function
optimal normal basis
IncludedBy:normal basis,
Includes:type I ONB, type II ONB,
optional
order of a curve
order of a point
organization split
HasPreferred:fixed split,
originator
Synonym:sender,
out-of-band notification
owner
IncludedBy:entity,
padding
pair of field elements ( , )
parity
parity bit
party a
party b
pending activation (key state)
IncludedBy:cryptographic key, key state,
pending obsolete (key state)
IncludedBy:cryptographic key, key state,
pending obsolete date
pentanomial
pentanomial basis
perfect forward secrecy
performance
performance standard
personal authenticating information
IncludedBy:authentication,
personal identification number
IncludedBy:identification,
Includes:reference PIN, transaction PIN,
plaintext
Antonym:ciphertext,
HasPreferred:plaintext,
PreferredFor:plaintext,
Synonym:cleartext,
point compression
policy mapping
IncludedBy:Certification Authority,
policy qualifier
IncludedBy:Certification Authority,
polyinstantiation
IncludedBy:cryptographic key,
polynomial
polynomial basis
power of attorney certificate
IncludedBy:certificate,
primary account number
prime finite field
privacy
Synonym:confidentiality,
private key
IncludedBy:asymmetric cryptographic algorithm, cryptographic key,
private prime factors
IncludedBy:asymmetric cryptographic algorithm,
propagation delay
IncludedBy:Data Encryption Algorithm,
protection mapping
protocol
pseudo-random
pseudo-random number
public key
IncludedBy:asymmetric cryptographic algorithm, cryptographic key,
public key certificate
IncludedBy:asymmetric cryptographic algorithm, certificate,
random
random data
random number generator
Includes:seed,
random split
IncludedBy:split,
rDSA
IncludedBy:digital signature, reversible public key cryptography,
reasonable assurance
receiver
Synonym:recipient,
recipient
IncludedBy:entity,
Synonym:receiver,
reduction polynomial
reference PIN
IncludedBy:personal identification number,
relying party
IncludedBy:entity,
remote access
replay
IncludedBy:risk, threat,
Includes:nonce,
PreferredFor:duplication,
repudiation
Antonym:non-repudiation,
IncludedBy:entity,
request for service initiation message
request for service message
requester
response service message
response to request message
restriction certificate
IncludedBy:certificate,
reversible encipherment
Antonym:irreversible encipherment,
IncludedBy:cryptography, encipherment,
Includes:reversible public key cryptography,
reversible encryption
reversible public key cryptography
IncludedBy:cryptography, reversible encipherment,
Includes:rDSA,
risk
Includes:alteration, forgery, replay, risk assessment, threat,
risk assessment
IncludedBy:risk,
role certificate
IncludedBy:certificate,
scalar multiplication
Secure Hash Algorithm, Revision 1
IncludedBy:algorithm, cryptographic hash function,
secured information
security association
security attribute
security exchange
security life
security management information data
security policy
security transformation
seed
IncludedBy:random number generator,
sender
IncludedBy:entity,
Synonym:originator,
shadow
signatory
IncludedBy:digital signature, entity,
signatory authority
IncludedBy:authorization, entity,
Includes:authorized signatory, signatory certificate,
signatory certificate
IncludedBy:certificate, signatory authority,
signature
HasPreferred:digital signature,
signed document
IncludedBy:digital signature,
simple authentication
IncludedBy:authentication,
single threaded
SMID
split
IncludedBy:split knowledge, working key,
Includes:fixed split, label, random split,
split knowledge
IncludedBy:cryptographic key, dual control,
Includes:split,
sponsor certificate
IncludedBy:certificate,
static data
statistically unique
store-and-forward
strong authentication
IncludedBy:authentication,
subject
IncludedBy:entity,
subject CA
IncludedBy:Certification Authority,
subject end entity
IncludedBy:entity,
subscriber
IncludedBy:Certification Authority, entity,
Includes:multiple center subscriber, subscriber a, subscriber b, subscriber key,
subscriber a
IncludedBy:subscriber,
subscriber b
IncludedBy:subscriber,
subscriber data key
HasPreferred:subscriber key,
subscriber key
IncludedBy:cryptographic key, subscriber,
PreferredFor:subscriber data key, subscriber key encrypting key,
subscriber key encrypting key
HasPreferred:subscriber key,
supersingular
switch
symmetric
symmetric key
IncludedBy:cryptographic key,
system key
IncludedBy:cryptographic key,
tamper resistant security module
tampering
IncludedBy:threat,
terminal
IncludedBy:transaction,
TG-17
The Secure Hash Algorithm1, (SHA-1),
threat
IncludedBy:risk,
Includes:compromise, replay, tampering, vulnerability,
time-variant parameter
time-variant value
token
HasPreferred:authentication token,
transaction
Includes:derived unique key per transaction, key exchange transaction, terminal, transaction PIN, transaction initiator, transaction integrity, transaction key, unique key per transaction,
transaction initiator
IncludedBy:transaction,
transaction integrity
IncludedBy:transaction,
transaction key
IncludedBy:cryptographic key, transaction,
transaction PIN
IncludedBy:personal identification number, transaction,
translate
Transportation *KK
transportation authentication data key
IncludedBy:authentication, cryptographic key,
trinomial
trinomial basis
TRSM
trust
type I ONB
IncludedBy:optimal normal basis,
type II ONB
IncludedBy:optimal normal basis,
UKPT
ultimate recipient
uncompressed form
unique key per transaction
IncludedBy:transaction,
unsolicited RTR
user
IncludedBy:entity,
Includes:user certificate,
user certificate
IncludedBy:certificate, user,
valid elliptic curve parameters
IncludedBy:elliptic curve,
value date
variant of a key
IncludedBy:cryptographic key,
verification
IncludedBy:authentication,
verifier
IncludedBy:entity,
vulnerability
IncludedBy:threat,
wire service
working key
IncludedBy:cryptographic key,
Includes:split,
x-coordinate
IncludedBy:elliptic curve,
X3.106
X3.92
X9.17/85
X9.17/95
X9.19
X9.23
X9.24
X9.26
X9.28
X9.30-1
X9.30-2
X9.30-3
X9.31-1
X9.31-2
X9.41
X9.42
X9.44
X9.45
X9.49
X9.50
X9.52
X9.55
X9.57
X9.59
X9.61
X9.62
X9.65
X9.66
X9.69
X9.70
X9.74
X9.76
X9.78
X9.8
X9.80
X9.82
X9.9
y-coordinate
IncludedBy:elliptic curve,
zeroized