Back to Contents Page

Glossary of Terms and Acronyms: Broadcom CryptoNetX SSL Accelerator Adapter User Guide




Application Programming Interface

BIOS Basic Input/Output System

CE Mark

Any product that comes under a European Directive and is to be placed on the market in the European Union (EU) must bear CE (European Conformity) marking. CE marking is the manufacturer's claim that the product meets the essential requirements of all relevant EU Directives.

CIM Common Information Model Standards. CIM is a model developed by the Distributed Management Task Force (DTMF) for describing overall management information in a network/enterprise environment. CIM is comprised of a Specification and a Schema. The Specification defines the details for integration with other management models, while the Schema provides the actual model descriptions.
CryptoAPI A technology provided as part of Windows 95, 98, Windows NT, and Windows 2000. It provides a standard way for applications to obtain cryptographic services such as encryption and decryption, digital signing, and so forth.
CSP Cryptographic Service Providers. Software modules in CryptoAPI that provide the actual cryptographic services.
DES Data Encryption Standard. Standard cryptographic algorithm developed by the United States National Institute of Standards and Technology.
Diffie-Hellman Diffie-Hellman key exchange. A public key cryptography protocol that allows two parties to establish a shared secret over insecure communications channels. Diffie-Hellman is used within Internet Key Exchange (IKE) to establish session keys. Diffie-Hellman is a component of Oakley key exchange, a technique of changing encryption techniques on the fly.
DMTF Distributed Management Task Force. The industry organization that is leading the development, adoption, and unification of management standards and initiatives for desktop, enterprise, and Internet environments.


  1. Digital Signal Algorithm
  2. Directory System Agent. Software that provides the X.500 Directory Service for a portion of the directory information base. Generally, each DSA is responsible for the directory information for a single organization or organizational unit.
Failover A functionality that allows automatic switching to a redundant device in the case of a failure.


Federal Communications Commission (United States)


Hash-based Message Authentication Code. HMAC is a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, for example MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.

Hot-Plug PCI Hot-Plug PCI refers to the technology that allows users to install and remove PCI devices while the computer is running. Hot-Plug PCI should not be confused with failover functionality.
IEEE Institute of Electrical and Electronic Engineers
IIS Internet Information Server
IKE Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services (such as IPSec) that require keys. Before any IPSec traffic can be passed, each router/firewall/host must verify the identity of its peer. This can be done by manually entering pre-shared keys into both hosts or by a CA (certification authority) protocol.


Internet Protocol. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing, type-of-service specification, fragmentation and reassembly, and security. Defined in RFC 791.

IPSec IP Security. A framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer. IPSec uses IKE (Internet key exchange) to handle the negotiation of protocols and algorithms based on local policy and to generate the encryption and authentication keys to be used by IPSec. IPSec can protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.


International Organization for Standardization. International organization that is responsible for a wide range of standards, including those relevant to networking. ISO developed the OSI reference model, a popular networking reference model.


International Telecommunication Union Telecommunication Standardization Sector. International body that develops worldwide standards for telecommunications technologies. The ITU-T carries out the functions of the former CCITT (Consultative Committee for International Telegraph and Telephone).


  1. Message Authentication Code
  2. Media-specific Access Control protocol within IEEE 802 specifications
MIB Management Information Base associated with SNMP. An SNMP MIB is a collection of objects that describe an SNMP manageable entity. The MIB does not contain data.


Message Digest 5. An algorithm that takes an input message of arbitrary length and produces an output in the form of a 128-bit fingerprint or message digest. It is intended for digital signature applications where a large file must be compressed in a secure manner before being encrypted with a private key under a public-key algorithm such as RSA.



OffloadModExpo() Function A function available for CryptoAPI CSPs to use when calling hardware accelerators to perform modular exponentiation.


The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography worldwide. A worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation manages the project.


Open System Interconnection. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability.


  1. Peripheral Component Interconnect
  2. Protocol Control Information. Control information added to user data to comprise an OSI packet.


Request for Comments. The set of documents that defines the internal operation of the Internet.


A public-key cryptographic system that can be used for encryption and authentication invented by Rivest, Shamir, and Adelman.


Secure Hash Algorithm 1. Algorithm that takes a message of fewer than 264 bits in length and produces a 160-bit message digest. The large message digest provides security against brute-force collision and inversion attacks. SHA-1 [NIS94c] is a revision to SHA that was published in 1994.


Simple Network Management Protocol


Secure Sockets Layer. Encryption technology for the Web used to provide secure transactions, such as the transmission of credit card numbers for e-commerce.


Transmission Control Protocol/Internet Protocol. Common name for suite of protocols developed by the US DOD to support the construction of worldwide internetworks.


Transport Layer Security. A future IETF protocol to replace SSL.




ITU-T recommendation specifying a standard for distributed maintenance of files and directories.

Back to Top

Please read all restrictions and disclaimers.

Back to Contents