Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual page 823

Table of Contents

Advertisement

PKCS #11 The public-key cryptography standard that governs cryptographic
tokens such as smart cards.
PKCS #11 module A driver for a cryptographic device that provides
cryptographic services, such as encryption and decryption, via the PKCS #11
interface. A PKCS #11 module (also called a cryptographic module or cryptographic
service provider) can be implemented in either hardware or software. A PKCS #11
module always has one or more slots, which may be implemented as physical
hardware slots in some form of physical reader (for example, for smart cards) or as
conceptual slots in software. Each slot for a PKCS #11 module can in turn contain a
token, which is the hardware or software device that actually provides
cryptographic services and optionally stores certificates and keys. Netscape
provides a built-in PKCS #11 module with Certificate Management System.
PCKS #12 The public-key cryptography standard that governs key portability.
policy module A rule (implemented as a Java class) that validates the contents of
a certificate request for that rule and formulates the contents of the certificate to be
issued.
private key One of a pair of keys used in public-key cryptography. The private
key is kept secret and is used to decrypt data encrypted with the corresponding
public key.
proof-of-Archival (POA) Data signed with the private Data Recovery Manager
transport key that contains information about an archived end-entity key,
including key serial number, name of the Data Recovery Manager, subject name of
the corresponding certificate, and date of archival. The signed proof-of-archival
data is the response returned by the Data Recovery Manager to the Registration
Manager or Certificate Manager after a successful key archival operation. See also
Data Recovery Manager transport certificate.
public key One of a pair of keys used in public-key cryptography. The public key
is distributed freely and published as part of a certificate. It is typically used to
encrypt data sent to the public key's owner, who then decrypts the data with the
corresponding private key.
public-key cryptography A set of well-established techniques and standards that
allow an entity to verify its identity electronically or to sign and encrypt electronic
data. Two keys are involved: a public key and a private key. A public key is
published as part of a certificate, which associates that key with a particular
identity. The corresponding private key is kept secret. Data encrypted with the
public key can be decrypted only with the private key.
Glossary
823

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents