Used terms


A B C D E F G H I J K L M O P Q R S T U V W X Y Z
A
AID
Application Identifier. Unique application number saved on card. Systems working with a card use AID to find a data on card to perform required operations.
Application Identifier
Refer to AID.
Asymmetric cryptography
It's type of cryptography using two different keys for data encryption and decryption: public and private key. Data encrypted by one of the keys can be decrypted only using of the other key and visa versa.
Only owner knows the private key - it's necessary to keep it in the safe place. On the contrary public key is accessible to anyone. If someone encrypts e.g. e-mail using recipient's public key, the message can be read only by recipient. On the contrary if someone signs a document with his or her private key, recipients of this document can use public key to verify author's authenticity.
RSA and DSA are the best known asymmetric algorithms.
ATR
Answer to reset string of a card. With this string a card identifies into system after power is ON.
Authentication
Process to verify certain subject identity (person, system,…).
C
Certification authority (CA)
Institution issuing certificates.
It verifies subject's identity before a certificate is issued.
Certificate of CA is called root certificate.
Certificate
Electronically signed document that contains owner's public key and certificate owner's personal data. Certificate binds owner's personal data with his or her public key.
Certificate is typically issued by trustworthy certification authority (CA).
Certification path
Every certificate is signed with a private key of certificate issuer. (Root certificate is the only exception. It's signed with its own key.) If you have certificate and issuer's certificate, you can verify using cryptography whether investigated certificate was issued by assumed issuer. Repeatedly in the same way you can verify issuer's certificate, its issuer etc. all the way to the root certificate. This string is called certification path. Some programs can use only certificates whose superior certificates are registered in the system - their certification path is completely verified.
K
Key
Refer to private key and public key.
P
PC/SC
Standard interface to connect smart card readers.
PIN
Personal Identification Number. Numeral code to authorize some operations with smart card.
PIN protects a smart card from abuse. If an operation with a card requires authorization, it's impossible to perform it without correct PIN.
Multiple incorrect PIN entries will block it from further use. PIN can be unblocked with PUK.
PKCS#11
A standard interface for devices that keep confidential information and perform cryptographic operations.
Private key
It's one key of key pair used in asymmetric cryptography. Due to security purposes it's necessary to keep private key in secret.
Private key is used for digital signature or decryption of messages encrypted with corresponding public key.
Public key
It's one key of key pair used in asymmetric cryptography. Public key doesn't have to be kept secret, as the private key does. Public key is used for verification of electronic signature or message encryption. Messages encrypted with public key can be decrypted only with corresponding private key.
PUK
Personal Unblocking Key. Numeral code to unblock PIN.
PIN will be blocked if incorrectly entered multiple times. Enter PUK to unblock it.
PUK will be blocked if incorrectly entered multiple times. There is no way to unblock PUK.