Terms and abbreviations

This publication uses the terms and abbreviations listed here.

CA
Certificate authority. A trusted entity, external or internal to your organization, that issues digital certificates. Digital certificates are data files used to prove the identity of a website, person, or device by certifying the ownership of a public key by the named subject of the certificate.
CBC
Cipher block chaining. A method of reducing repetitive patterns in ciphertext by performing an exclusive-OR operation on each 8-byte block of data with the previously encrypted 8-byte block before it is encrypted.
CCA mode
Common Cryptographic Architecture. Crypto Express adapters can work in different modes, whereof CCA is one.
CSR
Certificate signing request. An electronic message that an organization sends to a CA to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key.
dm-crypt
dm-crypt is the device mapper crypto target of the Linux kernel crypto target. It is a disk encryption subsystem, and is part of the device mapper infrastructure.
EKMF
IBM Enterprise Key Management Foundation. EKMF provides centralized key management for IBM cryptographic products on multiple platforms.
EKMF Web
IBM Enterprise Key Management Foundation Web is a web application that you use to manage keys on IBM Z and LinuxONE systems.
HSM
Hardware security module. A tamper-protected cryptographic device that protects master keys from being inspected. IBM Crypto Express CCA coprocessors and EP11 coprocessors are certified as HSMs. Each domain of an IBM Crypto Express coprocessor constitutes a virtual HSM and maintains a domain-specific master key or a set of master keys.
HSM master key
Each domain of a Crypto Express cryptographic coprocessor can contain active master keys which are used to generate secure keys.
KMIP
Key Management Interoperability Protocol (KMIP) is a client/server communication protocol for the storage and maintenance of key, certificate, and secret objects.
KMS
Key management system
LUKS2
Linux Unified Key Setup version 2 is used for disk encryption management.
protected key
A protected key is a key encrypted by a firmware master key.
secure key
A secure key is a key encrypted by an HSM master key.
TLS
Transport Layer Security. A set of encryption rules that uses verified certificates and encryption keys to secure communications over the Internet. TLS is an update to the SSL protocol.
zkey repository
An access-controlled list of secure keys managed by the zkey utility.