Crescendo SDK
Loading...
Searching...
No Matches
Glossary

Term                          Definition
ACA Access Control Applet - manages PIN and other authentication methods.
ACR Access Control Rule - logical combination of authentication methods.
AES Advanced Encryption Standard. A symmetric key encryption algorithm established by the U.S. National Institute of Standards and Technology (NIST).
AID Application Identifier identifies an application in a smart card in accordance with ISO/IEC 7816.
APDU Application Protocol Data Unit - messages between the token and the application.
Applet A small, subordinate application on the token designed to perform specific tasks.
ATR An Answer To Reset - message output by a contact Smart Card conforming to ISO/IEC 7816 standards, following electrical reset of the card's chip by a card reader.
BER-TLV Basic Encoding Rules - Type/Tags Length Value. Format for encoding information under types/tags.
CBOR Concise Binary Object Representation (CBOR) - data format used in CTAP communication. See documentation.
Challenge Random number generated by the server API for authentication of a user in the asynchronous (challenge/response) mode.
CTAP Client to Authenticator Protocol - used for FIDO authentication standard.
CUID Card Unique Identifier - a unique identifier for a smart card, typically used to identify the card and its associated applications.
ECC Elliptic curve cryptography. A cryptography approach for public key encryption using the mathematics of elliptic curves that allows smaller keys to provide equivalent security, compared to other cryptosystems such as RSA.
FIDO Fast IDentity Online. A security standard used for online authentication, based on a cryptographic key pair unique to each online service. For more information visit official documentation.
HMAC Hash-Based Message Authentication Code. Message authentication code that uses a cryptographic key in conjunction with a hash function.
HOTP HMAC-Based One-Time Password. A type of one-time password that is algorithmically generated using HMAC and a counter that increases every time a new OTP is generated, providing a dynamic passcode each time it is required.
OATH Initiative for Open Authentication.
OCRA OATH (Initiative for Open Authentication) Challenge-Response Algorithm.
OCRA suite A configuration string used in OATH Challenge-Response Authentication (OCRA) that defines the parameters for generating one-time passwords.
OID Object identifier. Globally unique identifiers standardized by the International Telecommunication Union. OIDs are represented as a series of numbers separated by dots (e.g., 2.5.29.37).
OTP One-Time Password. A password that is valid for only one login session or transaction, used to provide an additional layer of security.
PIN Personal Identification Number. A numeric or alphanumeric code used to authenticate a user to a system, typically known only to the user and the system.
PUK PIN Unblock Key. A code used to reset the personal identification number (PIN) in devices after they have been locked due to multiple incorrect PIN entries.
PIV Personal Identity Verification is a United States federal standard for secure and reliable forms of identification issued by the government to federal employees and contractors.
PKI Public Key Infrastructure. A framework that enables secure, electronic identities through the use of public key cryptography, including the creation, distribution, and management of digital certificates.
PSKC Portable Symmetric Key Container. An extensible markup language (XML) format defined by the OASIS standard that is used for transporting and provisioning symmetric keys to different types of devices.
PSKC file File used to securely transport and provision symmetric keys to cryptographic devices or software, following the Portable Symmetric Key Container (PSKC) format.
RSA Rivest–Shamir–Adleman - asymmetric cryptographic algorithm. Usually identified with a number describing the key size, e.g. RSA2048 or RSA4096.
SKI Secure Key Injection is a FIPS certification-compliant protocol that ensures data protection when importing private keys, OTP secrets, and management keys.
SKI Transport Key RSA-3072 key uniquely bound to a specific token, used to securely transfer data to that token in compliance with the Secure Key Injection protocol.
TDES Triple Data Encryption Standard. An encryption algorithm that uses three separate keys for encryption, providing a higher level of security than its predecessor, the Data Encryption Standard (DES).
Token A physical device, such as a smart card or USB key, that securely stores certificates, cryptographic keys and credentials used for authentication, digital signing, and encryption tasks.
TOTP Time-Based One-Time Password. A variant of the one-time password (OTP) that uses a representation of the current time as a moving factor to ensure that each OTP is unique and valid only for a short period of time.
XAUTH A cryptographic key used to control and manage secure operations on a smart device, such as configuring, updating, or modifying sensitive data using external authentication - challenge/response algorithm.