31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

March, 2007<br />

PART 1: GENERAL....................................................................................................................15<br />

1 INTRODUCTION ...................................................................................................................15<br />

1.1 Goal/Purpose...................................................................................................................15<br />

1.2 Audience .........................................................................................................................16<br />

1.3 Scope...............................................................................................................................16<br />

1.4 Purpose of FIPS and NIST Recommendations...............................................................17<br />

1.5 Content and Organization ...............................................................................................17<br />

2 GLOSSARY OF TERMS AND ACRONYMS .....................................................................19<br />

2.1 Glossary ..........................................................................................................................19<br />

2.2 Acronyms........................................................................................................................29<br />

3 SECURITY SERVICES .........................................................................................................30<br />

3.1 Confidentiality ................................................................................................................30<br />

3.2 Data Integrity ..................................................................................................................30<br />

3.3 Authentication.................................................................................................................30<br />

3.4 Authorization ..................................................................................................................31<br />

3.5 Non-repudiation ..............................................................................................................31<br />

3.6 Support Services .............................................................................................................31<br />

3.7 Combining Services........................................................................................................31<br />

4 CRYPTOGRAPHIC ALGORITHMS ..................................................................................34<br />

4.1 Classes of Cryptographic Algorithms.............................................................................34<br />

4.2 Cryptographic Algorithm Functionality .........................................................................35<br />

4.2.1 Hash Functions....................................................................................................35<br />

4.2.2 Symmetric Key Algorithms used for Encryption and Decryption......................35<br />

4.2.2.1 Advanced Encryption Standard (AES) ................................................36<br />

4.2.2.2 Triple DEA (TDEA) ............................................................................36<br />

4.2.2.3 Modes of Operation .............................................................................36<br />

4.2.3 Message Authentication Codes (MACs) ............................................................36<br />

4.2.3.1 MACs Using Block Cipher Algorithms...............................................36<br />

4.2.3.2 MACs Using Hash Functions ..............................................................37<br />

4.2.4 Digital Signature Algorithms..............................................................................37<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!