Skip to content

Glossary

TermDefinition
ML-DSAModule-Lattice Digital Signature Algorithm (FIPS 204). Post-quantum signature scheme based on lattices. Replaces RSA/ECDSA for signatures. Security levels: ML-DSA-44 (Level 1), ML-DSA-65 (Level 3), ML-DSA-87 (Level 5).
ML-KEMModule-Lattice Key Encapsulation Mechanism (FIPS 203). Post-quantum key exchange. Replaces ECDH/RSA for key establishment. Security levels: ML-KEM-512 (Level 1), ML-KEM-768 (Level 3), ML-KEM-1024 (Level 5).
SLH-DSAStateless Hash-based Digital Signature Algorithm (FIPS 205). Post-quantum signature based on hash functions. Conservative alternative to ML-DSA with larger signatures but different security assumptions.
ECDSAElliptic Curve Digital Signature Algorithm. Classical signature scheme using elliptic curves (P-256, P-384, P-521). Vulnerable to quantum attacks.
Ed25519Edwards-curve Digital Signature Algorithm. Fast classical signatures using Curve25519. Vulnerable to quantum attacks.
RSARivest-Shamir-Adleman. Classical asymmetric algorithm for signatures and encryption. Vulnerable to quantum attacks (Shor’s algorithm).
TermDefinition
CACertificate Authority. Entity that issues and signs digital certificates.
Root CATop-level CA in a hierarchy. Self-signed certificate, trust anchor for the PKI.
Issuing CAIntermediate/subordinate CA that issues end-entity certificates. Signed by Root CA or another Issuing CA.
End-EntityThe subject of a certificate (server, client, user). Not a CA.
CSRCertificate Signing Request. A message sent to a CA to request a signed certificate. Contains the public key and identity information.
CRLCertificate Revocation List. Signed list of revoked certificate serial numbers published by the CA.
OCSPOnline Certificate Status Protocol (RFC 6960). Real-time certificate validity check as alternative to CRL.
TSATimestamp Authority (RFC 3161). Trusted service that provides cryptographic proof of when data existed.
SANSubject Alternative Name. X.509 extension for multiple identities (DNS names, IP addresses, email).
SKI/AKISubject/Authority Key Identifier. Extensions linking certificates in a chain.
Path LengthConstraint on how many CAs can exist below an issuing CA in the chain.
TermDefinition
PQCPost-Quantum Cryptography. Algorithms designed to be secure against quantum computer attacks.
SNDLStore Now, Decrypt Later. Threat where adversaries capture encrypted data today to decrypt with future quantum computers. Affects confidentiality.
HNDLHarvest Now, Decrypt Later. Alternative term for SNDL, emphasizing data harvesting.
TNFLTrust Now, Forge Later. Threat where classical signatures can be forged retroactively once quantum computers exist. Affects long-term signature validity.
HybridCombining classical + post-quantum algorithms for defense in depth. If either algorithm is secure, the hybrid is secure.
CatalystITU-T X.509 9.8 hybrid certificate format. Dual signatures stored in X.509 extensions, allowing graceful fallback to classical.
CompositeIETF hybrid format combining keys/signatures into single cryptographic objects. Both algorithms must be verified together.
Crypto-AgilityAbility to switch cryptographic algorithms without major infrastructure changes. Essential for PQC migration.
LTVLong-Term Validation. Signatures that remain verifiable for decades, even after algorithm deprecation.
NIST LevelsSecurity strength categories (1, 3, 5) corresponding to AES-128, AES-192, AES-256 equivalent security.
TermDefinition
SSH CertificateOpenSSH certificate format (PROTOCOL.certkeys). Signed by a CA, contains principals, validity period, and extensions. Alternative to authorized_keys.
PrincipalAn identity a certificate authorizes. For user certificates: usernames (alice, deploy). For host certificates: hostnames or IPs.
Critical OptionSSH certificate restriction enforced by sshd. If the server does not recognize a critical option, it rejects the certificate. Examples: force-command, source-address.
ExtensionSSH certificate permission (user certificates only). Controls allowed operations: permit-pty, permit-port-forwarding, permit-agent-forwarding, etc.
KRLKey Revocation List. OpenSSH binary format for efficiently revoking SSH certificates by serial number or key. Checked via ssh-keygen -Q.
TrustedUserCAKeyssshd configuration directive specifying the CA public key file. All certificates signed by this CA are accepted for user authentication.
TermDefinition
ProfileYAML template defining certificate policies (algorithm, validity, extensions, constraints). One profile = one certificate type.
CredentialManaged bundle of private key(s) + certificate(s) with coupled lifecycle management (enrollment, renewal, revocation).
AttestationRFC 9883 mechanism where a signing certificate attests for a KEM key that cannot sign its own CSR. Required for ML-KEM certificates.
Related CertificateX.509 extension linking separate classical and PQC certificates for the same subject.
TermDefinition
TLS ServerCertificate for HTTPS server identity. Contains DNS names in SAN.
TLS ClientCertificate for client authentication in mTLS. May contain email or user identifier.
Code SigningCertificate for signing software releases. Proves software authenticity.
TimestampingCertificate for TSA service. Contains id-kp-timeStamping extended key usage.
OCSP ResponderCertificate for OCSP service. Contains id-kp-OCSPSigning extended key usage.
KEM CertificateCertificate containing ML-KEM public key for key encapsulation (encryption).
Signature CertificateCertificate containing signing key (ECDSA, ML-DSA, etc.) for digital signatures.
TermDefinition
FIPS 203NIST standard for ML-KEM (key encapsulation). August 2024.
FIPS 204NIST standard for ML-DSA (digital signatures). August 2024.
FIPS 205NIST standard for SLH-DSA (hash-based signatures). August 2024.
X.509ITU-T standard for public key certificates. Foundation of PKI.
RFC 5280Internet X.509 PKI Certificate and CRL Profile.
RFC 6960Online Certificate Status Protocol (OCSP).
RFC 3161Time-Stamp Protocol (TSP). Standard for trusted timestamping services.
RFC 5652Cryptographic Message Syntax (CMS). Format for signed/encrypted data.
RFC 9883Use of Post-Quantum KEM in CMS. Defines CSR attestation for KEM keys.
ITU-T X.509 9.8Alternative public-key and signature algorithms extension. Basis for Catalyst certificates.