Accept a
Certificate |
Demonstrate
approval of a Certificate while knowing or having notice of its contents. |
Activation
Data |
Private data,
other than keys, that are required to access cryptographic modules. |
Asymmetric
Cryptosystem |
A system
which generates and employs a secure key consisting of a Private Key for
creating a Digital Signature and a Public Key to verify a Digital Signature. |
Authentication |
A process
used to ascertain the identity of a person or the integrity of specific
information. For a message,
authentication involves ascertaining its source and that it has not been
modified or replaced in transit. |
Certificate |
See Digital
Certificate |
Certificate
Authority (CA) |
See
Certification Authority. |
Certificate
Manufacturer |
The entity
providing certificate management operational services for the Issuing
Authority. |
Certificate
Policy |
A named set
of rules that indicate the applicability of a certificate to a particular
community and/or class of application with common security requirements. A certificate policy may be used by a
Subscriber or Relying Party to help in deciding whether a certificate (and
the binding therein), is sufficiently trustworthy for a particular
application. |
Certificate
Revocation List (CRL) |
A list
maintained by of on behalf of an Issuing Authority of the certificates that
it has issued, that are revoked before their natural expiry time. |
Certificate
Status Information |
Information
that indicates whether Certificates have been revoked or suspended, commonly
provided in bulk by Certificate Revocation Lists, or individually through
specific online enquiries (e.g. OCSP). |
Certification
Authority (CA) |
The software
and hardware system used by the Issuing Authority or it’s designated Certificate
Manufacturer to issue and manage the full lifecycle of certificates. |
Certification
Authority Certificate |
See Issuing
Authority Certificate. |
Certification
Authority Key (CA-Key) |
The private
key used by the Issuing Authority for signing certificates and other objects. |
Certification
Path |
A logical and
ordered sequence of Certificates which, together with the Public Key of the
initial entity in the Certification Path, can be processed to obtain that of
the final entity in the Certification Path. |
Certification
Practice Statement |
A statement
of the policies and practices employed in the issuance of certificates and in
support of one or more Certificate Policies. |
Confirm |
Ascertain
through appropriate inquiry and investigation. |
Corresponding
private key |
Given a
public key taken from a key pair, the corresponding private key is the
private key from that same key pair, (and vice-versa for corresponding public
key). |
Cross-certificate |
A certificate
used to establish a trust relationship between two Issuing Authorities. |
Digital
Certificate |
A collection
of data that at least: 1.
Identifies
the issuing Certification Authority 2.
Names
or identifies its Subscriber 3.
Contains
the Subscriber's Public Key 4.
Identifies
the operational period of Certificate 5.
Bears
the Digital Signature of the Issuing Certification Authority |
Digital
Signature |
The result of
a transformation of a message by means of a cryptographic system and a Hash
function, using keys such that a person who has the initial message and the
signer’s Public Key can determine: 1.
Whether
the transformation was created using the Private Key that corresponds to the
signer's Public Key, and 2.
Whether
the initial Message has been altered since the transformation was made. |
Hash Function |
An algorithm
mapping or translating one sequence of bits into another, generally smaller,
set (the Hash or Message Digest) such that: 1.
A
Message yields the same Hash Result every time the algorithm is executed
using the same Message as input; 2.
It is
computationally infeasible that a Message can be derived or reconstituted
from the Hash Result provided by the algorithm; and 3.
It is
computationally infeasible that two Messages can be found that produce the
same Hash Result using the algorithm |
Hash or
Message Digest |
The output
produced by a Hash Function upon processing a Message. |
High Security
Zone |
An area to which
access is controlled through an entry point and limited to authorised,
appropriately screened personnel and properly escorted visitors. High-Security Zones should be accessible
only from Security Zones, and are separated from Security Zones and Operations
Zones by a perimeter built to the specifications recommended in a threat risk
assessment. High-Security Zones are
monitored 24 hours a day and 7 days a week by security staff, other personnel
or electronic means. |
Hold a
Private Key |
To use or to
be able to use a Private Key. |
Incorporate
by reference |
Make one
Message a part of another Message by:- 1.
Identifying
the Message to be incorporated; 2.
Providing
information which enables the Receiving Party to access and obtain the
incorporated Message in its entirety; and 3.
Expressing
the intention that it be part of the incorporating Message. The
incorporated Message shall have the same effect as if it had been fully
stated in the incorporating Message to the extent permitted by law. |
Issue a
Certificate |
The acts of
an Issuing Authority in creating a Certificate and notifying the Subscriber
identified in the Certificate, of the contents of the Certificate. |
Issuing
Authority |
By
definition, an Issuing Authority is the entity listed in the certificate in
the issuer field. The Issuing
Authority has the responsibility for deciding who may be issued with a
certificate carrying its name. |
Issuing
Authority Certificate. |
A Certificate
for an Issuing Authority’s Public Key, and for use in signing certificates
created by Certification Authority software under its control. |
Key Pair |
In an
Asymmetric Cryptosystem - a Private Key and its mathematically related Public
Key having the property that the Public Key can verify a Digital Signature
that the Private Key creates. |
Local
Registration Authority |
See
Registration Authority |
Message |
A digital
representation of information. |
Message
integrity |
The assurance
of unaltered transmission and receipt of a Message from the sender to the
intended recipient |
Non-repudiation |
Strong and
substantial evidence of the identity of the Signer of a Message and of
Message integrity, sufficient to prevent a party from successfully denying
the original submission or delivery of the Message and the integrity of its
contents. |
Notify |
Communicate
or make available information to another person as required under the
circumstances |
Online
Certificate Status Protocol (OCSP) |
A network
protocol used to ascertain the current validity status of a certificate. |
Operational
Period of Certificate |
The
Operational Period of a Certificate begins on the date and time it is issued
by a Certification Authority (or on a later date and time certain if stated
in the Certificate), and ends on the date and time it expires or is earlier
revoked or suspended. |
Operations
Zone |
An area where
access is limited to personnel who work there and to properly escorted
visitors. Operations Zones should be
monitored at least periodically, based on a threat risk assessment, and
should preferably be accessible from a Reception Zone. |
Policy
Authority |
The entity
that has ultimate responsibility for approving the Certificate Policy used to
govern the issuance, management and usage of a specified set of digital
certificates. |
Private Key |
The private
part of an asymmetric key pair used for public key encryption
techniques. The private key is
typically used for signing via digital signatures or for decrypting messages. |
Public Key |
The public
part of an asymmetric key pair used for public key encryption
techniques. The public key is
typically used for verifying digital signatures or to encrypt messages to the
owner of the private key. |
Public-access
Zone |
An area in
which there is no personnel access control.
Generally surrounds or forms part of a security facility. Examples include the grounds surrounding a
building, and public corridors and elevator lobbies in multiple-occupancy
buildings. Boundary designators such
as signs and direct or remote surveillance may be used to discourage
unauthorised activity. |
Reception
Zone |
The entry to
a facility where the initial contact between the public and the facility
occurs, where services are provided, information is exchanged and access to
restricted (Operations, Security and High-security) zones is controlled. To varying degrees, activity in a Reception
Zone is monitored by the personnel who work there, by other personnel or by
security staff. Access by the public
may be limited to specific times of the day or for specific reasons. Entry beyond the Reception Zone is
indicated by a recognisable perimeter such as a doorway or an arrangement of
furniture and dividers in an open office environment. |
Registration
Authority (RA) |
An entity
which is authorised or licensed by an Issuing Authority to carry out the
practices and procedures for identification and Authentication of Certificate
Subscribers in order to grant requests from subscribers for issuance of
certificates or for their revocation, but without the responsibility for
signing or issuing Certificates or Certificate Revocation Information. |
Relying Party |
An entity
that does not necessarily hold a certificate as a subscriber does, but even
so, during the course of a transaction, may be a recipient of a certificate
and who therefore acts in reliance on that certificate and/or digital signatures
verified using that certificate |
Repository |
The entity
providing a community-wide accessible mechanism by which primarily
subscribers and relying parties can obtain and validate information on
certificates issued under the governing policy. |
Revoke a
Certificate |
Permanently
end the Operational Period of a Certificate from a specified time. |
Security Zone |
An area to
which access is limited to authorised personnel and to authorised and
properly escorted visitors. Security
Zones should preferably be accessible from an Operations Zone, and through a
specific entry point. A Security Zone
need not be separated from an Operations Zone by a secure perimeter. A Security Zone should be monitored 24
hours a day and 7 days a week by security staff, other personnel or
electronic means. |
Signer |
A person who
creates a Digital Signature for a Message. |
Subscriber |
An entity
that: 1.
Is the
subject named or identified in a Certificate issued to such person; and 2.
Holds a
Private Key that corresponds to a Public Key listed in that Certificate. |
Suspend a
Certificate |
Temporarily
suspend the Operational Period of a Certificate for a specified time period. |
Time-stamp |
1.
To
create a notation that indicates, at least, the correct date and time of an
action and the identity of the person that created the notation; or 2.
Such a
notation appended, attached or referenced. |
Time-stamping
Authority |
The Trust
Service Provider operating, controlling and issuing time-stamps for use by
other entities. |
Transactional
Certificate |
A certificate
for a specific transaction incorporating by reference, one or more Digital
Signatures. |
Trust Service |
1.
A trust-enhancing
service offered or performed by a Trust Service Provider that supports the
assurance, integrity or security of electronically executed activities, (e.g.
time-stamping, notarisation, watermarking etc.) 2.
The
service offered or performed by an Issuing Authority, Registration Authority,
Certificate Manufacturer or other trusted intermediary relating to the
issuance and control of Digital Certificates, (e.g. manufacture, issuance,
revocation, publication, registration, validity-checking, policy-making,
etc.) |
Trust Service
Provider |
An entity
that acts as a supplier of Trust Services. |
Trustworthy
System |
Computer
hardware, software and procedures that: 1.
Are
adequately secure from intrusion and misuse; 2.
Provide
an adequate level of availability, reliability and correctness of operation; 3.
Are
adequately suited to performing their intended functions; and 4.
Adhere
to generally accepted security principles. |
Valid
certificate |
A Certificate
which: 1.
A
Certificate Authority has issued 2.
The
Subscriber has accepted 3.
Has not
been revoked or suspended 4.
Has not
expired In addition
for a Transactional Certificate: 1.
The
Subscriber has accepted, but limited to the Digital Signature created
pursuant to the specific transaction to which the Transactional Certificate
relates. |
Validity
Period |
The period
that is defined within a certificate, during which that certificate is
intended to be valid for use in protecting the certificate holder’s allowable
activities. |
Verify a Digital
Signature and message integrity |
In relation
to a given Digital Signature, Message and Public Key, to determine
accurately:- 1.
That
the Digital Signature was created during the Operational Period of a Valid
Certificate by the Private Key corresponding to the Public Key listed in the
Certificate; and 2.
The
Message has not been altered since its Digital Signature was created. |
Copyright © Trustis
Limited 2010. All Rights Reserved
This document is licensed for use only in conjunction with the use of Trustis
Trust Services