Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Table of Contents<br />
March, 2007<br />
PART 1: GENERAL....................................................................................................................15<br />
1 INTRODUCTION ...................................................................................................................15<br />
1.1 Goal/Purpose...................................................................................................................15<br />
1.2 Audience .........................................................................................................................16<br />
1.3 Scope...............................................................................................................................16<br />
1.4 Purpose of FIPS and NIST Recommendations...............................................................17<br />
1.5 Content and Organization ...............................................................................................17<br />
2 GLOSSARY OF TERMS AND ACRONYMS .....................................................................19<br />
2.1 Glossary ..........................................................................................................................19<br />
2.2 Acronyms........................................................................................................................29<br />
3 SECURITY SERVICES .........................................................................................................30<br />
3.1 Confidentiality ................................................................................................................30<br />
3.2 Data Integrity ..................................................................................................................30<br />
3.3 Authentication.................................................................................................................30<br />
3.4 Authorization ..................................................................................................................31<br />
3.5 Non-repudiation ..............................................................................................................31<br />
3.6 Support Services .............................................................................................................31<br />
3.7 Combining Services........................................................................................................31<br />
4 CRYPTOGRAPHIC ALGORITHMS ..................................................................................34<br />
4.1 Classes of Cryptographic Algorithms.............................................................................34<br />
4.2 Cryptographic Algorithm Functionality .........................................................................35<br />
4.2.1 Hash Functions....................................................................................................35<br />
4.2.2 Symmetric Key Algorithms used for Encryption and Decryption......................35<br />
4.2.2.1 Advanced Encryption Standard (AES) ................................................36<br />
4.2.2.2 Triple DEA (TDEA) ............................................................................36<br />
4.2.2.3 Modes of Operation .............................................................................36<br />
4.2.3 Message Authentication Codes (MACs) ............................................................36<br />
4.2.3.1 MACs Using Block Cipher Algorithms...............................................36<br />
4.2.3.2 MACs Using Hash Functions ..............................................................37<br />
4.2.4 Digital Signature Algorithms..............................................................................37<br />
7