List of abbreviations

A list of abbreviations used in this document.

ADB
Actual Data Block
AES
Advanced Encryption Standard
AESKW
AES Key Wrap (ANS X9.102)
AIX®
Advanced Interactive Executive operating system
ANS
American National Standards
ANSI
American National Standards Institute
API
Application Programming Interface
APAR

Authorized Problem Analysis Report

ASCII
American National Standard Code for Information Interchange
ASN
Abstract Syntax Notation
ATC
Application Transaction Counter
ATM
Automated Teller Machine
BC
Block Contents
BDK
Base Derivation Key
BER
ASN.1 Basic Encoding Rules
CA
Certification Authority
CBC
Cipher block chaining
CCA
Common Cryptographic Architecture
CKDS
Cryptographic Key Data Set
CKSN
Current-Key Serial Number
CMAC
Block Cipher-based Message Authentication Code Algorithm (analogous to HMAC), NIST SP 800-38B
CMB
Combined key storage
CMK
Current Master Key
CMS
Cryptographic Message Syntax
CNI
Coprocessor Node Initialization
CNM
Cryptographic Node Management (utility)
CPACF
Central Processor Assist for Cryptographic Functions
CRDL-DSA
CRYSTALS-Dilithium Digital Signature Algorithm
CRT
Chinese Remainder Theorem
CSC
Card Security Code
CV
Control Vector
CVC
Card verification code used by MasterCard
CVK
Card Verification Key
CVV
Card verification value used by VISA
DEA
Data Encryption Algorithm
DES
Data Encryption Standard
DK
Deutsche Kreditwirtschaft (German Banking Industry Committee). Formerly known as ZKA.
DMA
Direct Memory Access
DOW
Day of the Week
DRBG
Deterministic Random Bit Generator
DRBGVS
Deterministic Random Bit Generator Validation System (NIST SP 800-90A)
DSA
Digital Signature Algorithm
DSS
Digital Signature Standard
DUKPT
Derived Unique Key Per Transaction
EBCDIC
Extended Binary Coded Decimal Interchange Code
EC
Elliptic Curve
ECB
Electronic codebook
ECC
Elliptic Curve Cryptography
ECDH
Elliptic Curve Diffie-Hellman
ECDSA
Elliptic Curve Digital Signature Algorithm
ECI
Eurocheque International
EDE
Encipher-Decipher-Encipher
EEPROM
Electrically Erasable, Programmable Read-Only Memory
EID
Environment Identification
EPP
Encrypting PIN PAD
FCV
function control vector
FIPS
Federal Information Processing Standards
FPE
Format Preserving Encryption
GBP
German Bank Pool
HMAC
Keyed Hash MAC
HSM
Hardware Security Module
IBM®
International Business Machines
ICSF
Integrated Cryptographic Service Facility.
ICV
Initial Chaining Value
IEC
International Electrotechnical Commission
IETF
Internet Engineering Task Force
I/O
Input/Output
IPEK
Initial PIN Encryption Key
IPL
initial program load
ISO
International Organization for Standardization.
ISO/DIS
International Organization for Standardization/Draft International Standard
ISO/FDIS
International Organization for Standardization/Final Draft International Standard
JNI
Java™ Native Interface
KC
Key Confirmation
KDF
Key Derivation Function
KEK
Key-Encrypting Key
KVP
key verification pattern
LRC
longitudinal redundancy check
LSB
least significant bit
MAC
Message Authentication Code
MD5
Message Digest-5 Hash Algorithm
MDC
Modification Detection Code
MDK
Master-Derivation Key
MFK
Master File Key
MK
Master Key
MKVP
Master-Key Verification Pattern
MSB
Most significant bit
NIST
US National Institute of Science and Technology
NMK
New Master Key
OAEP
Optimal asymmetric encryption padding
OCSP
Open Certificate Status Protocol
OEM
Original Equipment Manufacturer
OID
Object Identifier
OMK
Old Master Key
OPK
Object Protection Key
PAN
Personal Account Number
PBF
PIN Block Format
PCI
Peripheral Component Interconnect
PCIe
PCI Express
PCI-X
PCI Extended
PCICA
PCI Cryptographic Accelerator
PCICC
PCI Cryptographic Coprocessor
PCIXCC
PCI X Cryptographic Coprocessor
PIN
Personal Identification Number
PKA
public key algorithm
PKCS
Public Key Cryptographic Standards (RSA Data Security, Inc.)
PKDS
Public key data set (PKA cryptographic key data set)
PKI
public key infrastructure
POST
Power-On Self Test
PRNG
Pseudo Random Number Generator
PROM
Programmable Read-Only Memory
PRW
PIN reference word/value
PVV
PIN Validation Value
RA
Registration Authority
RACF®
Resource Access Control Facility
RAM
Random Access Memory
RFC
Request for Comments
RHEL
Red Hat Enterprise Linux®
RNG
Random Number Generator
ROM
Read-Only Memory
RPM
RPM Package Manager (originally: Red Hat Package Manager)
RSA
Rivest, Shamir, and Adleman
SEC 2
Standards for Efficient Cryptography 2
SECG
Standards for Efficient Cryptography Group
SET
Secure Electronic Transaction
SHA
Secure Hash Algorithm
SLES
SUSE Linux Enterprise Server
SNA
Systems Network Architecture
SSL
Secure Sockets Layer
TDEA
Triple Data Encryption Algorithm (see also TDES)
TDES
Triple DES (Data Encryption Standard) or TDEA
TKE
Trusted key entry
TLS
Transport Layer Security
TLV
Tag, Length, Value
TMK
Terminal Master Key
TVV
Token-validation value
UAT
UDX Authority Table
UDF
User-defined function
UDK
User-derived key
UDP
User Developed Program
UDX
User Defined Extension
UKPT
Unique Key Per Transaction
UTC
Coordinated Universal Time
VIS
Visa Integrated Circuit Card Specification
XOR
Exlusive-OR