Back to Results
First PageMeta Content
Microsoft CryptoAPI / Cryptographic Service Provider / PKCS11 / FIPS 140-2 / Security token / CSSM / PKCS / BATON / Application programming interface / Cryptography / Cryptography standards / Cryptographic software


A Comparison of CDSA to Cryptoki Ruth Taylor ([removed]), National Security Agency February 16, 1999 Keywords: CDSA, Cryptoki, CAPI, port Abstract
Add to Reading List

Document Date: 1999-11-05 00:00:00


Open Document

File Size: 78,56 KB

Share Result on Facebook

Company

IBM / CDSA / Hewlett-Packard / SKIPJACK / Cryptoki / Motorola / Sun / BATON / CAPI / TIS / JUNIPER / KEA / Netscape / Microsoft / Intel Architecture Labs / /

/

Facility

Cryptoki library / Data Store / port Abstract The Common Data Security Architecture / /

IndustryTerm

cryptographic software / network operating systems / auxiliary services / individual software module / cryptographic context management / set-up services / layered infrastructure / software cryptographic modules / cryptographic algorithm / desired cryptographic algorithms / bitmask describing services / e.g. algorithm / direct interface to hardware / direct hardware / software architects / software cryptographic module / module management / cryptographic algorithms / security services / software tokens / cryptographic services / authentication device / security services infrastructure / correct services / signed manifest credentials to applications / encryption algorithm / memory management / official algorithms / software cryptomodule / /

Organization

Defense Advanced Research Projects Agency / National Security Agency / CDSA’s CSP / SPI’s CSP / /

Person

Ruth Taylor / /

Position

driver / Cryptographic Services Manager / system administrator / cryptographically-aware programmer / private / sensitive or always sensitive / application programmer / but Cryptoki does not / official algorithms / security officer / Cryptographic Application Programmer / General / cryptographically aware programmer / experienced programmer / model for administration / Cryptoki General / model for CSP administration / Common Security Services Manager / application programmer / driver writer / programmer / /

Product

Cryptoki / CSSM / /

ProgrammingLanguage

C / /

Technology

specific algorithm / desired cryptographic algorithms / encryption algorithm / Information Technology / API / private key / secret key / operating system / MISSI algorithms / operating systems / cryptographic algorithm / encryption / Cryptography / Public Key / seventy algorithms / cryptographic algorithms / e.g. algorithm / /

SocialTag