List of abbreviations
A list of abbreviations used in this document.
- ADB
- Actual Data Block
- AES
- Advanced Encryption Standard
- AESKW
- AES Key Wrap (ANS X9.102)
- AIX®
- Advanced Interactive Executive operating system
- ANS
- American National Standards
- ANSI
- American National Standards Institute
- API
- Application Programming Interface
- APAR
-
Authorized Problem Analysis Report
- ASCII
- American National Standard Code for Information Interchange
- ASN
- Abstract Syntax Notation
- ATC
- Application Transaction Counter
- ATM
- Automated Teller Machine
- BC
- Block Contents
- BDK
- Base Derivation Key
- BER
- ASN.1 Basic Encoding Rules
- CA
- Certification Authority
- CBC
- Cipher block chaining
- CCA
- Common Cryptographic Architecture
- CKDS
- Cryptographic Key Data Set
- CKSN
- Current-Key Serial Number
- CMAC
- Block Cipher-based Message Authentication Code Algorithm (analogous to HMAC), NIST SP 800-38B
- CMB
- Combined key storage
- CMK
- Current Master Key
- CMS
- Cryptographic Message Syntax
- CNI
- Coprocessor Node Initialization
- CNM
- Cryptographic Node Management (utility)
- CPACF
- Central Processor Assist for Cryptographic Functions
- CRDL-DSA
- CRYSTALS-Dilithium Digital Signature Algorithm
- CRT
- Chinese Remainder Theorem
- CSC
- Card Security Code
- CV
- Control Vector
- CVC
- Card verification code used by MasterCard
- CVK
- Card Verification Key
- CVV
- Card verification value used by VISA
- DEA
- Data Encryption Algorithm
- DES
- Data Encryption Standard
- DK
- Deutsche Kreditwirtschaft (German Banking Industry Committee). Formerly known as ZKA.
- DMA
- Direct Memory Access
- DOW
- Day of the Week
- DRBG
- Deterministic Random Bit Generator
- DRBGVS
- Deterministic Random Bit Generator Validation System (NIST SP 800-90A)
- DSA
- Digital Signature Algorithm
- DSS
- Digital Signature Standard
- DUKPT
- Derived Unique Key Per Transaction
- EBCDIC
- Extended Binary Coded Decimal Interchange Code
- EC
- Elliptic Curve
- ECB
- Electronic codebook
- ECC
- Elliptic Curve Cryptography
- ECDH
- Elliptic Curve Diffie-Hellman
- ECDSA
- Elliptic Curve Digital Signature Algorithm
- ECI
- Eurocheque International
- EDE
- Encipher-Decipher-Encipher
- EEPROM
- Electrically Erasable, Programmable Read-Only Memory
- EID
- Environment Identification
- EPP
- Encrypting PIN PAD
- FCV
- function control vector
- FIPS
- Federal Information Processing Standards
- FPE
- Format Preserving Encryption
- GBP
- German Bank Pool
- HMAC
- Keyed Hash MAC
- HSM
- Hardware Security Module
- IBM®
- International Business Machines
- ICSF
- Integrated Cryptographic Service Facility.
- ICV
- Initial Chaining Value
- IEC
- International Electrotechnical Commission
- IETF
- Internet Engineering Task Force
- I/O
- Input/Output
- IPEK
- Initial PIN Encryption Key
- IPL
- initial program load
- ISO
- International Organization for Standardization.
- ISO/DIS
- International Organization for Standardization/Draft International Standard
- ISO/FDIS
- International Organization for Standardization/Final Draft International Standard
- JNI
- Java™ Native Interface
- KC
- Key Confirmation
- KDF
- Key Derivation Function
- KEK
- Key-Encrypting Key
- KVP
- key verification pattern
- LRC
- longitudinal redundancy check
- LSB
- least significant bit
- MAC
- Message Authentication Code
- MD5
- Message Digest-5 Hash Algorithm
- MDC
- Modification Detection Code
- MDK
- Master-Derivation Key
- MFK
- Master File Key
- MK
- Master Key
- MKVP
- Master-Key Verification Pattern
- MSB
- Most significant bit
- NIST
- US National Institute of Science and Technology
- NMK
- New Master Key
- OAEP
- Optimal asymmetric encryption padding
- OCSP
- Open Certificate Status Protocol
- OEM
- Original Equipment Manufacturer
- OID
- Object Identifier
- OMK
- Old Master Key
- OPK
- Object Protection Key
- PAN
- Personal Account Number
- PBF
- PIN Block Format
- PCI
- Peripheral Component Interconnect
- PCIe
- PCI Express
- PCI-X
- PCI Extended
- PCICA
- PCI Cryptographic Accelerator
- PCICC
- PCI Cryptographic Coprocessor
- PCIXCC
- PCI X Cryptographic Coprocessor
- PIN
- Personal Identification Number
- PKA
- public key algorithm
- PKCS
- Public Key Cryptographic Standards (RSA Data Security, Inc.)
- PKDS
- Public key data set (PKA cryptographic key data set)
- PKI
- public key infrastructure
- POST
- Power-On Self Test
- PRNG
- Pseudo Random Number Generator
- PROM
- Programmable Read-Only Memory
- PRW
- PIN reference word/value
- PVV
- PIN Validation Value
- RA
- Registration Authority
- RACF®
- Resource Access Control Facility
- RAM
- Random Access Memory
- RFC
- Request for Comments
- RHEL
- Red Hat Enterprise Linux®
- RNG
- Random Number Generator
- ROM
- Read-Only Memory
- RPM
- RPM Package Manager (originally: Red Hat Package Manager)
- RSA
- Rivest, Shamir, and Adleman
- SEC 2
- Standards for Efficient Cryptography 2
- SECG
- Standards for Efficient Cryptography Group
- SET
- Secure Electronic Transaction
- SHA
- Secure Hash Algorithm
- SLES
- SUSE Linux Enterprise Server
- SNA
- Systems Network Architecture
- SSL
- Secure Sockets Layer
- TDEA
- Triple Data Encryption Algorithm (see also TDES)
- TDES
- Triple DES (Data Encryption Standard) or TDEA
- TKE
- Trusted key entry
- TLS
- Transport Layer Security
- TLV
- Tag, Length, Value
- TMK
- Terminal Master Key
- TVV
- Token-validation value
- UAT
- UDX Authority Table
- UDF
- User-defined function
- UDK
- User-derived key
- UDP
- User Developed Program
- UDX
- User Defined Extension
- UKPT
- Unique Key Per Transaction
- UTC
- Coordinated Universal Time
- VIS
- Visa Integrated Circuit Card Specification
- XOR
- Exlusive-OR