Advanced Encryption Standard
is the new symmetric encryption standard selected by the NIST and the NSA. The selection was a public contest. For 4 years, the cryptographic community thoroughly cryptanalysed the different candidates. From the five remaining algorithms, NIST selected Rijndael. AES is a block cipher with a 128 bit key. It has been designed to be fast both in hardware implementation and software implementation.
AES
see Advanced Encryption Standard
AKE
see Authenticated Key Exchange
Answer To Reset
is part of the communication protocol between the smart card and its reader. The ISO7816 standard fully defines it. After receiving a reset signal, a smart card should issue this normalized answer. It provides useful information to the reader that allows the reader to identify and to communicate with the smart card.
Asymmetric cryptography
ATR
see Answer To Reset
Authenticated Diffie Hellman Key agreement
is an enhancement of the DIFFIE HELLMAN Key Agreement (see DIFFIE HELLMAN Key Agreement Protocol) It defeats the possible middle person attack.
Alice and Bob possess a public/private key pair. Together with her public value gamod p, Alice sends a signature, and her public key certificate. Although Carol can still intercept the message, she is not anymore able to forge signature without Alice s private key.
Authenticated Key Exchange
is a typical process to open a secure session of communication between two devices. In the first step, the two entities authenticate each others. After a successful authentication, they create a common shared session key. A typical protocol is the Authenticated Diffie Hellman Key Agreement.
Authentication
Hardware or software process that aims to establish in an unforgeable way the identification of the two actors of an exchange or transaction. This process implies that the actors confirm and validate their identity by techniques such as password, exchange of secret information, or digital signatures.
To authenticate a principal, it is possible to use three methods, so-called factors:
- What the principal is or does: this is typically the realm of biometrics which measures characteristics such as fingerprints or the way to write on a keyboard.
- What the principal knows: this is typically a password, a passphrase or an answer to a known challenge
- What the principal has: for instance an identification token, or physical key.
A two-factor authentication combines two methods whereas a three-factor authentication combines all three methods. the RSA ID secure token is a typical two-factor authentication method where the user proves he has the token by dialing the displayed code and the user proves he knows his PIN.