Skip to content

Glossary

TermDefinition
ML-DSAModule-Lattice Digital Signature Algorithm (FIPS 204). Post-quantum signature scheme based on lattices. Replaces RSA/ECDSA for signatures.
ML-KEMModule-Lattice Key Encapsulation Mechanism (FIPS 203). Post-quantum key exchange. Replaces ECDH/RSA for key establishment.
SLH-DSAStateless Hash-based Digital Signature Algorithm (FIPS 205). Post-quantum signature based on hash functions. Conservative alternative to ML-DSA.
ECDSAElliptic Curve Digital Signature Algorithm. Classical signature scheme vulnerable to quantum attacks.
ECDHElliptic Curve Diffie-Hellman. Classical key exchange vulnerable to quantum attacks.
X25519Curve25519-based key exchange. Fast classical algorithm, vulnerable to quantum.
Ed25519Edwards-curve Digital Signature Algorithm. Fast classical signatures, vulnerable to quantum.
TermDefinition
CACertificate Authority. Entity that issues and signs digital certificates.
Root CATop-level CA in a hierarchy. Self-signed, trust anchor.
Issuing CAIntermediate CA that issues end-entity certificates. Signed by Root CA.
CRLCertificate Revocation List. Signed list of revoked certificate serial numbers.
OCSPOnline Certificate Status Protocol. Real-time certificate validity check.
TSATimestamp Authority. Trusted service that provides cryptographic proof of when data existed (RFC 3161).
CSR AttestationRFC 9883 mechanism where a signing certificate attests for a KEM key that cannot sign its own CSR.
mTLSMutual TLS. Both client and server authenticate with certificates.
SANSubject Alternative Name. Certificate extension for multiple identities (DNS, IP, email).
TermDefinition
PQCPost-Quantum Cryptography. Algorithms resistant to quantum computer attacks.
SNDLStore Now, Decrypt Later. Threat where adversaries capture encrypted data today to decrypt with future quantum computers.
TNFLTrust Now, Forge Later. Threat where classical signatures can be forged retroactively once quantum computers exist.
HybridCombining classical + post-quantum algorithms for defense in depth.
CatalystITU-T X.509 9.8 hybrid certificate format with dual signatures.
CompositeAlternative hybrid format combining keys/signatures into single objects.
Crypto-AgilityAbility to switch cryptographic algorithms without major infrastructure changes.
LTVLong-Term Validation. Signatures that remain verifiable for decades.
TermDefinition
TLS CertificateServer identity certificate for HTTPS/TLS connections.
Client CertificateEnd-user or device identity for mTLS authentication.
Code SigningCertificate for signing software releases.
TimestampingCertificate for trusted time authority (TSA).
KEM CertificateCertificate containing ML-KEM public key for key encapsulation.
TermDefinition
FIPS 203NIST standard for ML-KEM (key encapsulation).
FIPS 204NIST standard for ML-DSA (digital signatures).
FIPS 205NIST standard for SLH-DSA (hash-based signatures).
X.509ITU-T standard for public key certificates.
RFC 3161Time-Stamp Protocol (TSP). Standard for trusted timestamping services.
RFC 9883Use of Post-Quantum KEM in CMS. Defines CSR attestation for KEM keys.
CMSCryptographic Message Syntax (RFC 5652). Format for signed/encrypted data.
S/MIMESecure email standard using CMS.