Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 1 | |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 2 | <!DOCTYPE html> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 3 | |
| 4 | <html xmlns="http://www.w3.org/1999/xhtml"> |
| 5 | <head> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 6 | <meta charset="utf-8" /> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 7 | <title>About this document — PSA Crypto API 1.0.1 documentation</title> |
| 8 | <link rel="stylesheet" href="_static/alabaster.css" type="text/css" /> |
| 9 | <link rel="stylesheet" href="_static/pygments.css" type="text/css" /> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 10 | <script type="text/javascript" id="documentation_options" data-url_root="./" src="_static/documentation_options.js"></script> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 11 | <script type="text/javascript" src="_static/jquery.js"></script> |
| 12 | <script type="text/javascript" src="_static/underscore.js"></script> |
| 13 | <script type="text/javascript" src="_static/doctools.js"></script> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 14 | <script type="text/javascript" src="_static/language_data.js"></script> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 15 | <link rel="author" title="About these documents" href="#" /> |
| 16 | <link rel="index" title="Index" href="genindex.html" /> |
| 17 | <link rel="search" title="Search" href="search.html" /> |
| 18 | <link rel="next" title="1. Introduction" href="overview/intro.html" /> |
| 19 | <link rel="prev" title="PSA Cryptography API 1.0" href="index.html" /> |
| 20 | |
| 21 | <link rel="stylesheet" href="_static/custom.css" type="text/css" /> |
| 22 | |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 23 | |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 24 | <meta name="viewport" content="width=device-width, initial-scale=0.9, maximum-scale=0.9" /> |
| 25 | |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 26 | </head><body> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 27 | |
| 28 | |
| 29 | <div class="document"> |
| 30 | <div class="documentwrapper"> |
| 31 | <div class="bodywrapper"> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 32 | |
| 33 | |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 34 | <div class="body" role="main"> |
| 35 | |
| 36 | <div class="section" id="about-this-document"> |
| 37 | <span id="id1"></span><h1>About this document</h1> |
| 38 | <div class="section" id="release-information"> |
| 39 | <h2>Release information</h2> |
| 40 | <p>The change history table lists the changes that have been made to this document.</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 41 | <table class="colwidths-given docutils align-default"> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 42 | <colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 43 | <col style="width: 20%" /> |
| 44 | <col style="width: 15%" /> |
| 45 | <col style="width: 20%" /> |
| 46 | <col style="width: 45%" /> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 47 | </colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 48 | <thead> |
| 49 | <tr class="row-odd"><th class="head"><p>Date</p></th> |
| 50 | <th class="head"><p>Version</p></th> |
| 51 | <th class="head"><p>Confidentiality</p></th> |
| 52 | <th class="head"><p>Change</p></th> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 53 | </tr> |
| 54 | </thead> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 55 | <tbody> |
| 56 | <tr class="row-even"><td><p>January 2019</p></td> |
| 57 | <td><p>1.0 Beta 1</p></td> |
| 58 | <td><p>Non-confidential</p></td> |
| 59 | <td><p>First public beta release.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 60 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 61 | <tr class="row-odd"><td><p>February 2019</p></td> |
| 62 | <td><p>1.0 Beta 2</p></td> |
| 63 | <td><p>Non-confidential</p></td> |
| 64 | <td><p>Update for release with other PSA Dev API specifications.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 65 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 66 | <tr class="row-even"><td><p>May 2019</p></td> |
| 67 | <td><p>1.0 Beta 3</p></td> |
| 68 | <td><p>Non-confidential</p></td> |
| 69 | <td><p>Update for release with other PSA API specifications.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 70 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 71 | <tr class="row-odd"><td><p>February 2020</p></td> |
| 72 | <td><p>1.0 Final</p></td> |
| 73 | <td><p>Non-confidential</p></td> |
| 74 | <td><p>1.0 API finalized.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 75 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 76 | <tr class="row-even"><td><p>August 2020</p></td> |
| 77 | <td><p>1.0.1 Final</p></td> |
| 78 | <td><p>Non-confidential</p></td> |
| 79 | <td><p>Update to fix errors and provide clarifications.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 80 | </tr> |
| 81 | </tbody> |
| 82 | </table> |
| 83 | <p>The detailed changes in each release are described in <a class="reference internal" href="appendix/history.html#changes"><span class="secref">Document change history</span></a>.</p> |
| 84 | </div> |
| 85 | <p><span class="sectiontitle">PSA Cryptography API</span></p> |
| 86 | <p>Copyright © 2018-2020, Arm Limited or its affiliates. All rights reserved. The copyright statement reflects the fact that some |
| 87 | draft issues of this document have been released, to a limited circulation.</p> |
| 88 | <div class="section" id="arm-non-confidential-document-licence-licence"> |
| 89 | <h2>Arm Non-Confidential Document Licence (“Licence”)</h2> |
| 90 | <div class="license docutils container"> |
| 91 | <p>This Licence is a legal agreement between you and Arm Limited (“<strong>Arm</strong>”) for the use of Arm’s intellectual property (including, without limitation, any copyright) embodied in the document accompanying this Licence (“<strong>Document</strong>”). Arm licenses its intellectual property in the Document to you on condition that you agree to the terms of this Licence. By using or copying the Document you indicate that you agree to be bound by the terms of this Licence.</p> |
| 92 | <p>“<strong>Subsidiary</strong>” means any company the majority of whose voting shares is now or hereafter owner or controlled, directly or indirectly, by you. A company shall be a Subsidiary only for the period during which such control exists.</p> |
| 93 | <p>This Document is <strong>NON-CONFIDENTIAL</strong> and any use by you and your Subsidiaries (“Licensee”) is subject to the terms of this Licence between you and Arm.</p> |
| 94 | <p>Subject to the terms and conditions of this Licence, Arm hereby grants to Licensee under the intellectual property in the Document owned or controlled by Arm, a non-exclusive, non-transferable, non-sub-licensable, royalty-free, worldwide licence to:</p> |
| 95 | <ol class="lowerroman simple"> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 96 | <li><p>use and copy the Document for the purpose of designing and having designed products that comply with the Document;</p></li> |
| 97 | <li><p>manufacture and have manufactured products which have been created under the licence granted in (i) above; and</p></li> |
| 98 | <li><p>sell, supply and distribute products which have been created under the licence granted in (i) above.</p></li> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 99 | </ol> |
| 100 | <p><strong>Licensee hereby agrees that the licences granted above shall not extend to any portion or function of a product that is not itself compliant with part of the Document.</strong></p> |
| 101 | <p>Except as expressly licensed above, Licensee acquires no right, title or interest in any Arm technology or any intellectual property embodied therein.</p> |
| 102 | <p>THE DOCUMENT IS PROVIDED “AS IS”. ARM PROVIDES NO REPRESENTATIONS AND NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE WITH RESPECT TO THE DOCUMENT. Arm may make changes to the Document at any time and without notice. For the avoidance of doubt, Arm makes no representation with respect to, and has undertaken no analysis to identify or understand the scope and content of, third party patents, copyrights, trade secrets, or other rights.</p> |
| 103 | <p>NOTWITHSTANDING ANYTHING TO THE CONTRARY CONTAINED IN THIS LICENCE, TO THE FULLEST EXTENT PERMITTED BY LAW, IN NO EVENT WILL ARM BE LIABLE FOR ANY DAMAGES, IN CONTRACT, TORT OR OTHERWISE, IN CONNECTION WITH THE SUBJECT MATTER OF THIS LICENCE (INCLUDING WITHOUT LIMITATION) (I) LICENSEE’S USE OF THE DOCUMENT; AND (II) THE IMPLEMENTATION OF THE DOCUMENT IN ANY PRODUCT CREATED BY LICENSEE UNDER THIS LICENCE). THE EXISTENCE OF MORE THAN ONE CLAIM OR SUIT WILL NOT ENLARGE OR EXTEND THE LIMIT. LICENSEE RELEASES ARM FROM ALL OBLIGATIONS, LIABILITY, CLAIMS OR DEMANDS IN EXCESS OF THIS LIMITATION.</p> |
| 104 | <p>This Licence shall remain in force until terminated by Licensee or by Arm. Without prejudice to any of its other rights, if Licensee is in breach of any of the terms and conditions of this Licence then Arm may terminate this Licence immediately upon giving written notice to Licensee. Licensee may terminate this Licence at any time. Upon termination of this Licence by Licensee or by Arm, Licensee shall stop using the Document and destroy all copies of the Document in its possession. Upon termination of this Licence, all terms shall survive except for the licence grants.</p> |
| 105 | <p>Any breach of this Licence by a Subsidiary shall entitle Arm to terminate this Licence as if you were the party in breach. Any termination of this Licence shall be effective in respect of all Subsidiaries. Any rights granted to any Subsidiary hereunder shall automatically terminate upon such Subsidiary ceasing to be a Subsidiary.</p> |
| 106 | <p>The Document consists solely of commercial items. Licensee shall be responsible for ensuring that any use, duplication or disclosure of the Document complies fully with any relevant export laws and regulations to assure that the Document or any portion thereof is not exported, directly or indirectly, in violation of such export laws.</p> |
| 107 | <p>This Licence may be translated into other languages for convenience, and Licensee agrees that if there is any conflict between the English version of this Licence and any translation, the terms of the English version of this Licence shall prevail.</p> |
| 108 | <p>The Arm corporate logo and words marked with ® or ™ are registered trademarks or trademarks of Arm Limited (or its subsidiaries) in the US and/or elsewhere. All rights reserved. Other brands and names mentioned in this document may be the trademarks of their respective owners. No licence, express, implied or otherwise, is granted to Licensee under this Licence, to use the Arm trade marks in connection with the Document or any products based thereon. Visit Arm’s website at <a class="reference external" href="https://www.arm.com/company/policies/trademarks">https://www.arm.com/company/policies/trademarks</a> for more information about Arm’s trademarks.</p> |
| 109 | <p>The validity, construction and performance of this Licence shall be governed by English Law.</p> |
| 110 | <p>Copyright © 2018-2020, Arm Limited or its affiliates. All rights reserved.</p> |
| 111 | <div class="line-block"> |
| 112 | <div class="line">Arm Limited. Company 02557590 registered in England.</div> |
| 113 | <div class="line">110 Fulbourn Road, Cambridge, England CB1 9NJ.</div> |
| 114 | </div> |
| 115 | <p>Arm document reference: LES-PRE-21585 version 4.0</p> |
| 116 | </div> |
| 117 | </div> |
| 118 | <div class="section" id="references"> |
| 119 | <h2>References</h2> |
| 120 | <p>This document refers to the following documents.</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 121 | <table class="longtable colwidths-given docutils align-default" id="id2"> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 122 | <caption><span class="caption-number">Table 1 </span><span class="caption-text">Arm documents referenced by this document</span></caption> |
| 123 | <colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 124 | <col style="width: 15%" /> |
| 125 | <col style="width: 20%" /> |
| 126 | <col style="width: 65%" /> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 127 | </colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 128 | <thead> |
| 129 | <tr class="row-odd"><th class="head"><p>Ref</p></th> |
| 130 | <th class="head"><p>Document Number</p></th> |
| 131 | <th class="head"><p>Title</p></th> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 132 | </tr> |
| 133 | </thead> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 134 | <tbody> |
| 135 | <tr class="row-even"><td><p><span class="target" id="citation-psa-its"></span>[PSA-ITS]</p></td> |
| 136 | <td><p>ARM IHI 0087</p></td> |
| 137 | <td><p><em>PSA Storage API</em>. <a class="reference external" href="https://developer.arm.com/architectures/security-architectures/platform-security-architecture/documentation">https://developer.arm.com/architectures/security-architectures/platform-security-architecture/documentation</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 138 | </tr> |
| 139 | </tbody> |
| 140 | </table> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 141 | <table class="longtable colwidths-given docutils align-default" id="id3"> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 142 | <caption><span class="caption-number">Table 2 </span><span class="caption-text">Other documents referenced by this document</span></caption> |
| 143 | <colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 144 | <col style="width: 15%" /> |
| 145 | <col style="width: 85%" /> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 146 | </colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 147 | <thead> |
| 148 | <tr class="row-odd"><th class="head"><p>Ref</p></th> |
| 149 | <th class="head"><p>Title</p></th> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 150 | </tr> |
| 151 | </thead> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 152 | <tbody> |
| 153 | <tr class="row-even"><td><p><span class="target" id="citation-chacha20"></span>[CHACHA20]</p></td> |
| 154 | <td><p>Bernstein, D., <em>ChaCha, a variant of Salsa20</em>, January 2008. <a class="reference external" href="http://cr.yp.to/chacha/chacha-20080128.pdf">http://cr.yp.to/chacha/chacha-20080128.pdf</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 155 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 156 | <tr class="row-odd"><td><p><span class="target" id="citation-curve25519"></span>[Curve25519]</p></td> |
| 157 | <td><p>Bernstein et al., <em>Curve25519: new Diffie-Hellman speed records</em>, LNCS 3958, 2006. <a class="reference external" href="https://www.iacr.org/archive/pkc2006/39580209/39580209.pdf">https://www.iacr.org/archive/pkc2006/39580209/39580209.pdf</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 158 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 159 | <tr class="row-even"><td><p><span class="target" id="citation-curve448"></span>[Curve448]</p></td> |
| 160 | <td><p>Hamburg, <em>Ed448-Goldilocks, a new elliptic curve</em>, NIST ECC Workshop, 2015. <a class="reference external" href="https://eprint.iacr.org/2015/625.pdf">https://eprint.iacr.org/2015/625.pdf</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 161 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 162 | <tr class="row-odd"><td><p><span class="target" id="citation-fips180-4"></span>[FIPS180-4]</p></td> |
| 163 | <td><p>NIST, <em>FIPS Publication 180-4: Secure Hash Standard (SHS)</em>, August 2015. <a class="reference external" href="https://doi.org/10.6028/NIST.FIPS.180-4">https://doi.org/10.6028/NIST.FIPS.180-4</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 164 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 165 | <tr class="row-even"><td><p><span class="target" id="citation-fips186-4"></span>[FIPS186-4]</p></td> |
| 166 | <td><p>NIST, <em>FIPS Publication 186-4: Digital Signature Standard (DSS)</em>, July 2013. <a class="reference external" href="https://doi.org/10.6028/NIST.FIPS.186-4">https://doi.org/10.6028/NIST.FIPS.186-4</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 167 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 168 | <tr class="row-odd"><td><p><span class="target" id="citation-fips197"></span>[FIPS197]</p></td> |
| 169 | <td><p>NIST, <em>FIPS Publication 197: Advanced Encryption Standard (AES)</em>, November 2001. <a class="reference external" href="https://doi.org/10.6028/NIST.FIPS.197">https://doi.org/10.6028/NIST.FIPS.197</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 170 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 171 | <tr class="row-even"><td><p><span class="target" id="citation-fips202"></span>[FIPS202]</p></td> |
| 172 | <td><p>NIST, <em>FIPS Publication 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</em>, August 2015. <a class="reference external" href="https://doi.org/10.6028/NIST.FIPS.202">https://doi.org/10.6028/NIST.FIPS.202</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 173 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 174 | <tr class="row-odd"><td><p><span class="target" id="citation-frp"></span>[FRP]</p></td> |
| 175 | <td><p>Agence nationale de la sécurité des systèmes d’information, <em>Publication d’un paramétrage de courbe elliptique visant des applications de passeport électronique et de l’administration électronique française</em>, 21 November 2011. <a class="reference external" href="https://www.ssi.gouv.fr/agence/rayonnement-scientifique/publications-scientifiques/articles-ouvrages-actes">https://www.ssi.gouv.fr/agence/rayonnement-scientifique/publications-scientifiques/articles-ouvrages-actes</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 176 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 177 | <tr class="row-even"><td><p><span class="target" id="citation-ieee-xts"></span>[IEEE-XTS]</p></td> |
| 178 | <td><p>IEEE, <em>1619-2018 - IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices</em>, January 2019. <a class="reference external" href="https://ieeexplore.ieee.org/servlet/opac?punumber=8637986">https://ieeexplore.ieee.org/servlet/opac?punumber=8637986</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 179 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 180 | <tr class="row-odd"><td><p><span class="target" id="citation-ietf-sm3"></span>[IETF-SM3]</p></td> |
| 181 | <td><p>IETF, <em>The SM3 Cryptographic Hash Function</em>, November 2017. <a class="reference external" href="https://tools.ietf.org/id/draft-oscca-cfrg-sm3-02.html">https://tools.ietf.org/id/draft-oscca-cfrg-sm3-02.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 182 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 183 | <tr class="row-even"><td><p><span class="target" id="citation-ietf-sm4"></span>[IETF-SM4]</p></td> |
| 184 | <td><p>IETF, <em>The SM4 Blockcipher Algorithm And Its Modes Of Operations</em>, April 2018. <a class="reference external" href="https://tools.ietf.org/html/draft-ribose-cfrg-sm4-10">https://tools.ietf.org/html/draft-ribose-cfrg-sm4-10</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 185 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 186 | <tr class="row-odd"><td><p><span class="target" id="citation-iso10118"></span>[ISO10118]</p></td> |
| 187 | <td><p>ISO/IEC, <em>ISO/IEC 10118-3:2018 IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions</em>, October 2018. <a class="reference external" href="https://www.iso.org/standard/67116.html">https://www.iso.org/standard/67116.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 188 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 189 | <tr class="row-even"><td><p><span class="target" id="citation-iso9797"></span>[ISO9797]</p></td> |
| 190 | <td><p>ISO/IEC, <em>ISO/IEC 9797-1:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher</em>, March 2011. <a class="reference external" href="https://www.iso.org/standard/50375.html">https://www.iso.org/standard/50375.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 191 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 192 | <tr class="row-odd"><td><p><span class="target" id="citation-ntt-cam"></span>[NTT-CAM]</p></td> |
| 193 | <td><p>NTT Corporation and Mitsubishi Electric Corporation, <em>Specification of Camellia — a 128-bit Block Cipher</em>, September 2001. <a class="reference external" href="https://info.isl.ntt.co.jp/crypt/eng/camellia/specifications">https://info.isl.ntt.co.jp/crypt/eng/camellia/specifications</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 194 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 195 | <tr class="row-even"><td><p><span class="target" id="citation-prc-sm3"></span>[PRC-SM3]</p></td> |
| 196 | <td><p>Standardization Administration of the People’s Republic of China, <em>GB/T 32905-2016: Information security techniques — SM3 cryptographic hash algorithm</em>, August 2016. <a class="reference external" href="http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=45B1A67F20F3BF339211C391E9278F5E">http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=45B1A67F20F3BF339211C391E9278F5E</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 197 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 198 | <tr class="row-odd"><td><p><span class="target" id="citation-prc-sm4"></span>[PRC-SM4]</p></td> |
| 199 | <td><p>Standardization Administration of the People’s Republic of China, <em>GB/T 32907-2016: Information security technology — SM4 block cipher algorithm</em>, August 2016. <a class="reference external" href="http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=7803DE42D3BC5E80B0C3E5D8E873D56A">http://www.gb688.cn/bzgk/gb/newGbInfo?hcno=7803DE42D3BC5E80B0C3E5D8E873D56A</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 200 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 201 | <tr class="row-even"><td><p><span class="target" id="citation-rfc1319"></span>[RFC1319]</p></td> |
| 202 | <td><p>IETF, <em>The MD2 Message-Digest Algorithm</em>, April 1992. <a class="reference external" href="https://tools.ietf.org/html/rfc1319.html">https://tools.ietf.org/html/rfc1319.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 203 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 204 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc1320"></span>[RFC1320]</p></td> |
| 205 | <td><p>IETF, <em>The MD4 Message-Digest Algorithm</em>, April 1992. <a class="reference external" href="https://tools.ietf.org/html/rfc1320.html">https://tools.ietf.org/html/rfc1320.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 206 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 207 | <tr class="row-even"><td><p><span class="target" id="citation-rfc1321"></span>[RFC1321]</p></td> |
| 208 | <td><p>IETF, <em>The MD5 Message-Digest Algorithm</em>, April 1992. <a class="reference external" href="https://tools.ietf.org/html/rfc1321.html">https://tools.ietf.org/html/rfc1321.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 209 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 210 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc2104"></span>[RFC2104]</p></td> |
| 211 | <td><p>IETF, <em>HMAC: Keyed-Hashing for Message Authentication</em>, February 1997. <a class="reference external" href="https://tools.ietf.org/html/rfc2104.html">https://tools.ietf.org/html/rfc2104.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 212 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 213 | <tr class="row-even"><td><p><span class="target" id="citation-rfc2315"></span>[RFC2315]</p></td> |
| 214 | <td><p>IETF, <em>PKCS #7: Cryptographic Message Syntax Version 1.5</em>, March 1998. <a class="reference external" href="https://tools.ietf.org/html/rfc2315.html">https://tools.ietf.org/html/rfc2315.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 215 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 216 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc3279"></span>[RFC3279]</p></td> |
| 217 | <td><p>IETF, <em>Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</em>, April 2002. <a class="reference external" href="https://tools.ietf.org/html/rfc3279.html">https://tools.ietf.org/html/rfc3279.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 218 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 219 | <tr class="row-even"><td><p><span class="target" id="citation-rfc3610"></span>[RFC3610]</p></td> |
| 220 | <td><p>IETF, <em>Counter with CBC-MAC (CCM)</em>, September 2003. <a class="reference external" href="https://tools.ietf.org/html/rfc3610">https://tools.ietf.org/html/rfc3610</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 221 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 222 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc3713"></span>[RFC3713]</p></td> |
| 223 | <td><p>IETF, <em>A Description of the Camellia Encryption Algorithm</em>, April 2004. <a class="reference external" href="https://tools.ietf.org/html/rfc3713">https://tools.ietf.org/html/rfc3713</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 224 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 225 | <tr class="row-even"><td><p><span class="target" id="citation-rfc4279"></span>[RFC4279]</p></td> |
| 226 | <td><p>IETF, <em>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</em>, December 2005. <a class="reference external" href="https://tools.ietf.org/html/rfc4279.html">https://tools.ietf.org/html/rfc4279.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 227 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 228 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc5116"></span>[RFC5116]</p></td> |
| 229 | <td><p>IETF, <em>An Interface and Algorithms for Authenticated Encryption</em>, January 2008. <a class="reference external" href="https://tools.ietf.org/html/rfc5116.html">https://tools.ietf.org/html/rfc5116.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 230 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 231 | <tr class="row-even"><td><p><span class="target" id="citation-rfc5246"></span>[RFC5246]</p></td> |
| 232 | <td><p>IETF, <em>The Transport Layer Security (TLS) Protocol Version 1.2</em>, August 2008. <a class="reference external" href="https://tools.ietf.org/html/rfc5246.html">https://tools.ietf.org/html/rfc5246.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 233 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 234 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc5639"></span>[RFC5639]</p></td> |
| 235 | <td><p>IETF, <em>Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation</em>, March 2010. <a class="reference external" href="https://tools.ietf.org/html/rfc5639.html">https://tools.ietf.org/html/rfc5639.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 236 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 237 | <tr class="row-even"><td><p><span class="target" id="citation-rfc5869"></span>[RFC5869]</p></td> |
| 238 | <td><p>IETF, <em>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</em>, May 2010. <a class="reference external" href="https://tools.ietf.org/html/rfc5869.html">https://tools.ietf.org/html/rfc5869.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 239 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 240 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc5915"></span>[RFC5915]</p></td> |
| 241 | <td><p>IETF, <em>Elliptic Curve Private Key Structure</em>, June 2010. <a class="reference external" href="https://tools.ietf.org/html/rfc5915.html">https://tools.ietf.org/html/rfc5915.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 242 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 243 | <tr class="row-even"><td><p><span class="target" id="citation-rfc6979"></span>[RFC6979]</p></td> |
| 244 | <td><p>IETF, <em>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</em>, August 2013. <a class="reference external" href="https://tools.ietf.org/html/rfc6979.html">https://tools.ietf.org/html/rfc6979.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 245 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 246 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc7539"></span>[RFC7539]</p></td> |
| 247 | <td><p>IETF, <em>ChaCha20 and Poly1305 for IETF Protocols</em>, May 2015. <a class="reference external" href="https://tools.ietf.org/html/rfc7539.html">https://tools.ietf.org/html/rfc7539.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 248 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 249 | <tr class="row-even"><td><p><span class="target" id="citation-rfc7748"></span>[RFC7748]</p></td> |
| 250 | <td><p>IETF, <em>Elliptic Curves for Security</em>, January 2016. <a class="reference external" href="https://tools.ietf.org/html/rfc7748.html">https://tools.ietf.org/html/rfc7748.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 251 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 252 | <tr class="row-odd"><td><p><span class="target" id="citation-rfc7919"></span>[RFC7919]</p></td> |
| 253 | <td><p>IETF, <em>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</em>, August 2016. <a class="reference external" href="https://tools.ietf.org/html/rfc7919.html">https://tools.ietf.org/html/rfc7919.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 254 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 255 | <tr class="row-even"><td><p><span class="target" id="citation-rfc8017"></span>[RFC8017]</p></td> |
| 256 | <td><p>IETF, <em>PKCS #1: RSA Cryptography Specifications Version 2.2</em>, November 2016. <a class="reference external" href="https://tools.ietf.org/html/rfc8017.html">https://tools.ietf.org/html/rfc8017.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 257 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 258 | <tr class="row-odd"><td><p><span class="target" id="citation-ripemd"></span>[RIPEMD]</p></td> |
| 259 | <td><p>Dobbertin, Bosselaers and Preneel, <em>RIPEMD-160: A Strengthened Version of RIPEMD</em>, April 1996. <a class="reference external" href="https://homes.esat.kuleuven.be/~bosselae/ripemd160.html">https://homes.esat.kuleuven.be/~bosselae/ripemd160.html</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 260 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 261 | <tr class="row-even"><td><p><span class="target" id="citation-sec1"></span>[SEC1]</p></td> |
| 262 | <td><p>Standards for Efficient Cryptography, <em>SEC 1: Elliptic Curve Cryptography</em>, May 2009. <a class="reference external" href="https://www.secg.org/sec1-v2.pdf">https://www.secg.org/sec1-v2.pdf</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 263 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 264 | <tr class="row-odd"><td><p><span class="target" id="citation-sec2"></span>[SEC2]</p></td> |
| 265 | <td><p>Standards for Efficient Cryptography, <em>SEC 2: Recommended Elliptic Curve Domain Parameters</em>, January 2010. <a class="reference external" href="https://www.secg.org/sec2-v2.pdf">https://www.secg.org/sec2-v2.pdf</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 266 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 267 | <tr class="row-even"><td><p><span class="target" id="citation-sec2v1"></span>[SEC2v1]</p></td> |
| 268 | <td><p>Standards for Efficient Cryptography, <em>SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0</em>, September 2000. <a class="reference external" href="https://www.secg.org/SEC2-Ver-1.0.pdf">https://www.secg.org/SEC2-Ver-1.0.pdf</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 269 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 270 | <tr class="row-odd"><td><p><span class="target" id="citation-sp800-38a"></span>[SP800-38A]</p></td> |
| 271 | <td><p>NIST, <em>NIST Special Publication 800-38A: Recommendation for Block Cipher Modes of Operation: Methods and Techniques</em>, December 2001. <a class="reference external" href="https://doi.org/10.6028/NIST.SP.800-38A">https://doi.org/10.6028/NIST.SP.800-38A</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 272 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 273 | <tr class="row-even"><td><p><span class="target" id="citation-sp800-38b"></span>[SP800-38B]</p></td> |
| 274 | <td><p>NIST, <em>NIST Special Publication 800-38B: Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication</em>, May 2005. <a class="reference external" href="https://doi.org/10.6028/NIST.SP.800-38B">https://doi.org/10.6028/NIST.SP.800-38B</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 275 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 276 | <tr class="row-odd"><td><p><span class="target" id="citation-sp800-38d"></span>[SP800-38D]</p></td> |
| 277 | <td><p>NIST, <em>NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</em>, November 2007. <a class="reference external" href="https://doi.org/10.6028/NIST.SP.800-38D">https://doi.org/10.6028/NIST.SP.800-38D</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 278 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 279 | <tr class="row-even"><td><p><span class="target" id="citation-sp800-56a"></span>[SP800-56A]</p></td> |
| 280 | <td><p>NIST, <em>NIST Special Publication 800-56A: Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography</em>, April 2018. <a class="reference external" href="https://doi.org/10.6028/NIST.SP.800-56Ar3">https://doi.org/10.6028/NIST.SP.800-56Ar3</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 281 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 282 | <tr class="row-odd"><td><p><span class="target" id="citation-sp800-67"></span>[SP800-67]</p></td> |
| 283 | <td><p>NIST, <em>NIST Special Publication 800-67: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher</em>, November 2017. <a class="reference external" href="https://doi.org/10.6028/NIST.SP.800-67r2">https://doi.org/10.6028/NIST.SP.800-67r2</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 284 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 285 | <tr class="row-even"><td><p><span class="target" id="citation-x9-62"></span>[X9-62]</p></td> |
| 286 | <td><p>ANSI, <em>Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)</em>. <a class="reference external" href="https://standards.globalspec.com/std/1955141/ANSI%20X9.62">https://standards.globalspec.com/std/1955141/ANSI%20X9.62</a></p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 287 | </tr> |
| 288 | </tbody> |
| 289 | </table> |
| 290 | </div> |
| 291 | <div class="section" id="terms-and-abbreviations"> |
| 292 | <h2>Terms and abbreviations</h2> |
| 293 | <p>This document uses the following terms and abbreviations.</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 294 | <table class="longtable colwidths-given docutils align-default"> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 295 | <colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 296 | <col style="width: 25%" /> |
| 297 | <col style="width: 75%" /> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 298 | </colgroup> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 299 | <thead> |
| 300 | <tr class="row-odd"><th class="head"><p>Term</p></th> |
| 301 | <th class="head"><p>Meaning</p></th> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 302 | </tr> |
| 303 | </thead> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 304 | <tbody> |
| 305 | <tr class="row-even"><td><span><span class="target" id="term-aead"></span><span><span>AEAD</span></span></span></td> |
| 306 | <td><span>See <a class="reference internal" href="#term-authenticated-encryption-with-associated-data"><span class="term">Authenticated Encryption with Associated Data</span></a>.</span></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 307 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 308 | <tr class="row-odd"><td><span><span class="target" id="term-algorithm"></span><span>Algorithm</span></span></td> |
| 309 | <td><p>A finite sequence of steps to perform a particular operation.</p> |
| 310 | <p>In this specification, an algorithm is a <a class="reference internal" href="#term-cipher"><span class="term">cipher</span></a> or a related function. |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 311 | Other texts call this a cryptographic mechanism.</p> |
| 312 | </td> |
| 313 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 314 | <tr class="row-even"><td><span><span class="target" id="term-api"></span><span>API</span></span></td> |
| 315 | <td><p>Application Programming Interface.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 316 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 317 | <tr class="row-odd"><td><span><span class="target" id="term-asymmetric"></span><span>Asymmetric</span></span></td> |
| 318 | <td><p>See <a class="reference internal" href="#term-public-key-cryptography"><span class="term">Public-key cryptography</span></a>.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 319 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 320 | <tr class="row-even"><td><span><span class="target" id="term-authenticated-encryption-with-associated-data"></span><span>Authenticated Encryption with Associated Data (AEAD)</span></span></td> |
| 321 | <td><p>A type of encryption that |
| 322 | provides confidentiality and authenticity of data using <a class="reference internal" href="#term-symmetric"><span class="term">symmetric</span></a> keys.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 323 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 324 | <tr class="row-odd"><td><span><span class="target" id="term-byte"></span><span>Byte</span></span></td> |
| 325 | <td><p>In this specification, a unit of storage comprising eight bits, also called an octet.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 326 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 327 | <tr class="row-even"><td><span><span class="target" id="term-cipher"></span><span>Cipher</span></span></td> |
| 328 | <td><p>An algorithm used for encryption or decryption with a <a class="reference internal" href="#term-symmetric"><span class="term">symmetric</span></a> key.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 329 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 330 | <tr class="row-odd"><td><span><span class="target" id="term-cryptoprocessor"></span><span>Cryptoprocessor</span></span></td> |
| 331 | <td><p>The component that performs cryptographic operations. |
| 332 | A cryptoprocessor might contain a <a class="reference internal" href="#term-keystore"><span class="term">keystore</span></a> and countermeasures against a range of physical and timing attacks.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 333 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 334 | <tr class="row-even"><td><span><span class="target" id="term-hash"></span><span>Hash</span></span></td> |
| 335 | <td><p>A cryptographic hash function, or the value returned by such a function.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 336 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 337 | <tr class="row-odd"><td><span><span class="target" id="term-hmac"></span><span>HMAC</span></span></td> |
| 338 | <td><p>A type of <a class="reference internal" href="#term-mac"><span class="term">MAC</span></a> that uses a cryptographic key with a <a class="reference internal" href="#term-hash"><span class="term">hash</span></a> function.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 339 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 340 | <tr class="row-even"><td><span><span class="target" id="term-implementation-defined"></span><span class="sc">Implementation defined</span></span></td> |
| 341 | <td><p>Behavior that is not defined by the architecture, but is defined and documented by individual implementations.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 342 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 343 | <tr class="row-odd"><td><span><span class="target" id="term-initialization-vector"></span><span>Initialization vector (IV)</span></span></td> |
| 344 | <td><p>An additional input that is not part of the message. It is used to prevent an attacker from making any |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 345 | correlation between cipher text and plain text.</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 346 | <p>This specification uses the term for such initial inputs |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 347 | in all contexts. For example, the initial counter in CTR mode is called the IV.</p> |
| 348 | </td> |
| 349 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 350 | <tr class="row-even"><td><span><span class="target" id="term-iv"></span><span><span>IV</span></span></span></td> |
| 351 | <td><span>See <a class="reference internal" href="#term-initialization-vector"><span class="term">Initialization vector</span></a>.</span></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 352 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 353 | <tr class="row-odd"><td><span><span class="target" id="term-kdf"></span><span><span>KDF</span></span></span></td> |
| 354 | <td><span>See <a class="reference internal" href="#term-key-derivation-function"><span class="term">Key Derivation Function</span></a>.</span></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 355 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 356 | <tr class="row-even"><td><span><span class="target" id="term-key-agreement"></span><span>Key agreement</span></span></td> |
| 357 | <td><p>An algorithm for two or more parties to establish a common secret key.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 358 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 359 | <tr class="row-odd"><td><span><span class="target" id="term-key-derivation-function"></span><span>Key Derivation Function (KDF)</span></span></td> |
| 360 | <td><p>Key Derivation Function. An algorithm for deriving keys from secret material.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 361 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 362 | <tr class="row-even"><td><span><span class="target" id="term-key-identifier"></span><span>Key identifier</span></span></td> |
| 363 | <td><p>A reference to a cryptographic key. Key identifiers in the PSA Crypto API are 32-bit integers.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 364 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 365 | <tr class="row-odd"><td><span><span class="target" id="term-key-policy"></span><span>Key policy</span></span></td> |
| 366 | <td><p>Key metadata that describes and restricts what a key can be used for.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 367 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 368 | <tr class="row-even"><td><span><span class="target" id="term-key-size"></span><span>Key size</span></span></td> |
| 369 | <td><p>The size of a key as defined by common conventions for each key type. |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 370 | For keys that are built from several numbers of strings, this is the size of a particular one of these numbers or strings.</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 371 | <p>This specification expresses key sizes in bits.</p> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 372 | </td> |
| 373 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 374 | <tr class="row-odd"><td><span><span class="target" id="term-key-type"></span><span>Key type</span></span></td> |
| 375 | <td><p>Key metadata that describes the structure and content of a key.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 376 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 377 | <tr class="row-even"><td><span><span class="target" id="term-keystore"></span><span>Keystore</span></span></td> |
| 378 | <td><p>A hardware or software component that protects, stores, and manages cryptographic keys.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 379 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 380 | <tr class="row-odd"><td><span><span class="target" id="term-lifetime"></span><span>Lifetime</span></span></td> |
| 381 | <td><p>Key metadata that describes when a key is destroyed.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 382 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 383 | <tr class="row-even"><td><span><span class="target" id="term-mac"></span><span><span>MAC</span></span></span></td> |
| 384 | <td><span>See <a class="reference internal" href="#term-message-authentication-code"><span class="term">Message Authentication Code</span></a>.</span></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 385 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 386 | <tr class="row-odd"><td><span><span class="target" id="term-message-authentication-code"></span><span>Message Authentication Code (MAC)</span></span></td> |
| 387 | <td><p>A short piece of information used to authenticate a message. |
| 388 | It is created and verified using a <a class="reference internal" href="#term-symmetric"><span class="term">symmetric</span></a> key.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 389 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 390 | <tr class="row-even"><td><span><span class="target" id="term-message-digest"></span><span>Message digest</span></span></td> |
| 391 | <td><p>A <a class="reference internal" href="#term-hash"><span class="term">hash</span></a> of a message. Used to determine if a message has been tampered.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 392 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 393 | <tr class="row-odd"><td><span><span class="target" id="term-multi-part-operation"></span><span>Multi-part operation</span></span></td> |
| 394 | <td><p>An <a class="reference internal" href="#term-api"><span class="term">API</span></a> which splits a single cryptographic operation into a sequence of separate steps.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 395 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 396 | <tr class="row-even"><td><span><span class="target" id="term-non-extractable-key"></span><span>Non-extractable key</span></span></td> |
| 397 | <td><p>A key with a <a class="reference internal" href="#term-key-policy"><span class="term">key policy</span></a> that prevents it from being read by ordinary means.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 398 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 399 | <tr class="row-odd"><td><span><span class="target" id="term-nonce"></span><span>Nonce</span></span></td> |
| 400 | <td><p>Used as an input for certain <a class="reference internal" href="#term-aead"><span class="term">AEAD</span></a> algorithms. |
| 401 | Nonces must not be reused with the same key because this can break a cryptographic protocol.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 402 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 403 | <tr class="row-even"><td><span><span class="target" id="term-persistent-key"></span><span>Persistent key</span></span></td> |
| 404 | <td><p>A key that is stored in protected non-volatile memory.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 405 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 406 | <tr class="row-odd"><td><span><span class="target" id="term-psa"></span><span>PSA</span></span></td> |
| 407 | <td><p>Platform Security Architecture</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 408 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 409 | <tr class="row-even"><td><span><span class="target" id="term-public-key-cryptography"></span><span>Public-key cryptography</span></span></td> |
| 410 | <td><p>A type of cryptographic system that uses key pairs. A keypair consists of a (secret) private key |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 411 | and a public key (not secret). A public key cryptographic algorithm can be used for key distribution |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 412 | and for digital signatures.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 413 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 414 | <tr class="row-odd"><td><span><span class="target" id="term-salt"></span><span>Salt</span></span></td> |
| 415 | <td><p>Used as an input for certain algorithms, such as key derivations.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 416 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 417 | <tr class="row-even"><td><span><span class="target" id="term-signature"></span><span>Signature</span></span></td> |
| 418 | <td><p>The output of a digital signature scheme that uses an <a class="reference internal" href="#term-asymmetric"><span class="term">asymmetric</span></a> keypair. Used to establish who produced a message.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 419 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 420 | <tr class="row-odd"><td><span><span class="target" id="term-single-part-function"></span><span>Single-part function</span></span></td> |
| 421 | <td><p>An <a class="reference internal" href="#term-api"><span class="term">API</span></a> that implements the cryptographic operation in a single function call.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 422 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 423 | <tr class="row-even"><td><span><span class="target" id="term-specification-defined"></span><span class="sc">Specification defined</span></span></td> |
| 424 | <td><p>Behavior that is defined by this specification.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 425 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 426 | <tr class="row-odd"><td><span><span class="target" id="term-symmetric"></span><span>Symmetric</span></span></td> |
| 427 | <td><p>A type of cryptographic algorithm that uses a single key. A symmetric key can be used with |
| 428 | a block cipher or a stream cipher.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 429 | </tr> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 430 | <tr class="row-even"><td><span><span class="target" id="term-volatile-key"></span><span>Volatile key</span></span></td> |
| 431 | <td><p>A key that has a short lifespan and is guaranteed not to exist after a restart of an application instance.</p></td> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 432 | </tr> |
| 433 | </tbody> |
| 434 | </table> |
| 435 | </div> |
| 436 | <div class="section" id="potential-for-change"> |
| 437 | <h2>Potential for change</h2> |
| 438 | <p>The contents of this specification are stable for version 1.0.</p> |
| 439 | <p>The following may change in updates to the version 1.0 specification:</p> |
| 440 | <ul class="simple"> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 441 | <li><p>Small optional feature additions.</p></li> |
| 442 | <li><p>Clarifications.</p></li> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 443 | </ul> |
| 444 | <p>Significant additions, or any changes that affect the compatibility of the |
| 445 | interfaces defined in this specification will only be included in a new major or |
| 446 | minor version of the specification.</p> |
| 447 | </div> |
| 448 | <div class="section" id="conventions"> |
| 449 | <h2>Conventions</h2> |
| 450 | <div class="section" id="typographical-conventions"> |
| 451 | <h3>Typographical conventions</h3> |
| 452 | <p>The typographical conventions are:</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 453 | <dl> |
| 454 | <dt><em>italic</em></dt><dd><p>Introduces special terminology, and denotes citations.</p> |
| 455 | </dd> |
| 456 | <dt><code class="docutils literal notranslate"><span class="pre">monospace</span></code></dt><dd><p>Used for assembler syntax descriptions, pseudocode, and source code examples.</p> |
| 457 | <p>Also used in the main text for instruction mnemonics and for references to |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 458 | other items appearing in assembler syntax descriptions, pseudocode, and |
| 459 | source code examples.</p> |
| 460 | </dd> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 461 | <dt><span class="sc">small capitals</span></dt><dd><p>Used for some common terms such as <span class="sc">implementation defined</span>.</p> |
| 462 | <p>Used for a few terms that have specific technical meanings, and are included |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 463 | in the <em>Terms and abbreviations</em>.</p> |
| 464 | </dd> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 465 | <dt><span class="issue">Red text</span></dt><dd><p>Indicates an open issue.</p> |
| 466 | </dd> |
| 467 | <dt><span class="anchor">Blue text</span></dt><dd><p>Indicates a link. This can be</p> |
| 468 | <ul class="simple"> |
| 469 | <li><p>A cross-reference to another location within the document</p></li> |
| 470 | <li><p>A URL, for example <a class="reference external" href="http://infocenter.arm.com">http://infocenter.arm.com</a></p></li> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 471 | </ul> |
| 472 | </dd> |
| 473 | </dl> |
| 474 | </div> |
| 475 | <div class="section" id="numbers"> |
| 476 | <h3>Numbers</h3> |
| 477 | <p>Numbers are normally written in decimal. Binary numbers are preceded by 0b, and |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 478 | hexadecimal numbers by <code class="docutils literal notranslate"><span class="pre">0x</span></code>.</p> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 479 | <p>In both cases, the prefix and the associated value are written in a monospace |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 480 | font, for example <code class="docutils literal notranslate"><span class="pre">0xFFFF0000</span></code>. To improve readability, long numbers can be |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 481 | written with an underscore separator between every four characters, for example |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 482 | <code class="docutils literal notranslate"><span class="pre">0xFFFF_0000_0000_0000</span></code>. Ignore any underscores when interpreting the value of |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 483 | a number.</p> |
| 484 | </div> |
| 485 | </div> |
| 486 | <div class="section" id="pseudocode-descriptions"> |
| 487 | <h2>Pseudocode descriptions</h2> |
| 488 | <p>This book uses a form of pseudocode to provide precise descriptions of the |
| 489 | specified functionality. This pseudocode is written in a monospace font. The |
| 490 | pseudocode language is described in the Arm Architecture Reference Manual.</p> |
| 491 | </div> |
| 492 | <div class="section" id="assembler-syntax-descriptions"> |
| 493 | <h2>Assembler syntax descriptions</h2> |
| 494 | <p>This book is not expected to contain assembler code or pseudo code examples.</p> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 495 | <p>Any code examples are shown in a <code class="docutils literal notranslate"><span class="pre">monospace</span></code> font.</p> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 496 | </div> |
| 497 | <div class="section" id="feedback"> |
| 498 | <h2>Feedback</h2> |
| 499 | <p>Arm welcomes feedback on its documentation.</p> |
| 500 | <div class="section" id="feedback-on-this-book"> |
| 501 | <h3>Feedback on this book</h3> |
| 502 | <p>If you have comments on the content of this book, send an e-mail to |
| 503 | <a class="reference external" href="mailto:arm.psa-feedback%40arm.com">arm<span>.</span>psa-feedback<span>@</span>arm<span>.</span>com</a>. Give:</p> |
| 504 | <ul class="simple"> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 505 | <li><p>The title (PSA Cryptography API).</p></li> |
| 506 | <li><p>The number and issue (IHI 0086 1.0.1).</p></li> |
| 507 | <li><p>The page numbers to which your comments apply.</p></li> |
| 508 | <li><p>The rule identifiers to which your comments apply, if applicable.</p></li> |
| 509 | <li><p>A concise explanation of your comments.</p></li> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 510 | </ul> |
| 511 | <p>Arm also welcomes general suggestions for additions and improvements.</p> |
| 512 | </div> |
| 513 | </div> |
| 514 | </div> |
| 515 | |
| 516 | |
| 517 | </div> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 518 | |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 519 | </div> |
| 520 | </div> |
| 521 | <div class="sphinxsidebar" role="navigation" aria-label="main navigation"> |
| 522 | <div class="sphinxsidebarwrapper"><h3><a href="index.html"><b>PSA Crypto API</b></a></h3> |
| 523 | IHI 0086<br/> |
| 524 | Non-confidential<br/> |
| 525 | Version 1.0.1 |
| 526 | <span style="color: red; font-weight: bold;"></span> |
| 527 | <ul class="current"> |
| 528 | <li class="toctree-l1 current"><a class="current reference internal" href="#">About this document</a><ul> |
| 529 | <li class="toctree-l2"><a class="reference internal" href="#release-information">Release information</a></li> |
| 530 | <li class="toctree-l2"><a class="reference internal" href="#arm-non-confidential-document-licence-licence">Arm Non-Confidential Document Licence (“Licence”)</a></li> |
| 531 | <li class="toctree-l2"><a class="reference internal" href="#references">References</a></li> |
| 532 | <li class="toctree-l2"><a class="reference internal" href="#terms-and-abbreviations">Terms and abbreviations</a></li> |
| 533 | <li class="toctree-l2"><a class="reference internal" href="#potential-for-change">Potential for change</a></li> |
| 534 | <li class="toctree-l2"><a class="reference internal" href="#conventions">Conventions</a></li> |
| 535 | <li class="toctree-l2"><a class="reference internal" href="#pseudocode-descriptions">Pseudocode descriptions</a></li> |
| 536 | <li class="toctree-l2"><a class="reference internal" href="#assembler-syntax-descriptions">Assembler syntax descriptions</a></li> |
| 537 | <li class="toctree-l2"><a class="reference internal" href="#feedback">Feedback</a></li> |
| 538 | </ul> |
| 539 | </li> |
| 540 | </ul> |
| 541 | <ul> |
| 542 | <li class="toctree-l1"><a class="reference internal" href="overview/intro.html">1. Introduction</a></li> |
| 543 | <li class="toctree-l1"><a class="reference internal" href="overview/goals.html">2. Design goals</a></li> |
| 544 | <li class="toctree-l1"><a class="reference internal" href="overview/functionality.html">3. Functionality overview</a></li> |
| 545 | <li class="toctree-l1"><a class="reference internal" href="overview/sample-arch.html">4. Sample architectures</a></li> |
| 546 | <li class="toctree-l1"><a class="reference internal" href="overview/conventions.html">5. Library conventions</a></li> |
| 547 | <li class="toctree-l1"><a class="reference internal" href="overview/implementation.html">6. Implementation considerations</a></li> |
| 548 | <li class="toctree-l1"><a class="reference internal" href="overview/usage.html">7. Usage considerations</a></li> |
| 549 | <li class="toctree-l1"><a class="reference internal" href="api/library/index.html">8. Library management reference</a></li> |
| 550 | <li class="toctree-l1"><a class="reference internal" href="api/keys/index.html">9. Key management reference</a></li> |
| 551 | <li class="toctree-l1"><a class="reference internal" href="api/ops/index.html">10. Cryptographic operation reference</a></li> |
| 552 | </ul> |
| 553 | <ul> |
| 554 | <li class="toctree-l1"><a class="reference internal" href="appendix/example_header.html">Example header file</a></li> |
| 555 | <li class="toctree-l1"><a class="reference internal" href="appendix/specdef_values.html">Example macro implementations</a></li> |
| 556 | <li class="toctree-l1"><a class="reference internal" href="appendix/history.html">Changes to the API</a></li> |
| 557 | </ul> |
| 558 | <ul> |
| 559 | <li class="toctree-l1"><a class="reference internal" href="psa_c-identifiers.html">Index of API elements</a></li> |
| 560 | </ul> |
| 561 | <div id="searchbox" style="display: none" role="search"> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 562 | <h3 id="searchlabel">Quick search</h3> |
| 563 | <div class="searchformwrapper"> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 564 | <form class="search" action="search.html" method="get"> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 565 | <input type="text" name="q" aria-labelledby="searchlabel" /> |
| 566 | <input type="submit" value="Go" /> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 567 | </form> |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 568 | </div> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 569 | </div> |
| 570 | <script type="text/javascript">$('#searchbox').show(0);</script> |
| 571 | </div> |
| 572 | </div> |
| 573 | <div class="clearer"></div> |
| 574 | </div> |
| 575 | <div class="footer"> |
| 576 | © 2018-2020, Arm Limited or its affiliates. All rights reserved. |
| 577 | |
| 578 | | |
Bence Szépkúti | e26ccad | 2021-02-01 14:26:11 +0100 | [diff] [blame^] | 579 | Powered by <a href="http://sphinx-doc.org/">Sphinx 2.1.2</a> |
| 580 | & <a href="https://github.com/bitprophet/alabaster">Alabaster 0.7.12</a> |
Gilles Peskine | c2db5f0 | 2021-01-18 20:36:53 +0100 | [diff] [blame] | 581 | |
| 582 | </div> |
| 583 | |
| 584 | |
| 585 | |
| 586 | |
| 587 | </body> |
| 588 | </html> |