A glossary of Security IP terminology and relevant solutions.
Electronic Codebook Mode (ECB)
Elliptic Curve Cryptography (ECC)
Elliptic Curve Digital Authentication Algorithm (ECDAA)
Elliptic Curve Diffie-Hellman (ECDH)
Elliptic Curve Digital Signature Algorithm (ECDSA)
Elliptic Curve Integrated Encryption Scheme (ECIES)
Electronic Control Unit (ECU)
EPS Encryption Algorithm (EEA)
EPS Integrity Algorithm (EIA)
Evolved Packet System (EPS)
E-safety Vehicle Intrusion Protected Applications (EVITA)
First Stage Boot (Fboot)
Fault Injection Attack (FIA)
Federal Information Processing Standards (FIPS)
Failure Modes and Effects Analysis (FMEA)
Failure Modes, Effects and Criticality Analysis (FMECA)
Failure Modes, Effects and Diagnostics Analysis (FMEDA)
Firmware Over-the-Air Update (FOTA)
Field Programmable Gate Array (FPGA)
Finite State Machine (FSM)
Functional Safety (FUSA)
Identity-Based Systems (IBS)
Inline Cipher Engine (ICE)
Integrity and Data Encryption (IDE)
Integrated Hardware Security Module (IHSM)
Inline Memory Encryption (IME)
INDistinguishability under Chosen Ciphertext Attack (IND-CCA)
INDistinguishability under (adaptive) Chosen Plaintext Attack (IND-CPA)
Internet Protocol Security (IPsec)
Personalization Container for CMRT (Perso)
Personalization
Public Key Infrastructure/Accelerator/Engine (PKI/A/E)
Power Management Unit (PMU)
Proof of Concept (PoC)
Power on Reset (POR)
Post-Quantum Crypto (PQC)
Private Key
Provisioning
Arm Platform Security Architecture (PSA)
Public Key
Physically Unclonable Function (PUF)
Second Stage Boot (Sboot)
Side Channel Attack (SCA)
Software Development Kit (SDK)
Secure Boot
Global Platform Security Evaluation Standard for IoT Platforms (SESIP)
Secure Hash Algorithm (SHA)
Secure Hash Algorithm Keccak (SHAKE)
Secure Hardware Extension (SHE, SHE+)
Synthetic IV (SIV)
Stock Keeping Unit (SKU)
SM2
SM3
SM4
System on Chip (SoC)
Sea of Gates (SoG)
Safety of the Intended Functionality (SOTIF)
Secure Socket Layer (SSL)
Symmetric Key
Authenticated Encryption with Associated Data (AEAD)
Advanced Encryption Standard (AES)
Automotive Safety Integrity Level (ASIL)
CryptoManager Root of Trust (CMRT)
Correlated Electromagnetic Attack (CEMA)
Cryptographically Relevant Quantum Computer (CRQC)
DILITHIUM (Lattice-based Digital Signature)
Dhrystone Millions of Instructions per Second (DMIPS)
Differential Power Analysis (DPA)
Deterministic Random Bit Generator (DRBG)
Digital Signature Algorithm (DSA)
Electronic Codebook Mode (ECB)
Elliptic Curve Cryptography (ECC)
Elliptic Curve Digital Authentication Algorithm (ECDAA)
Elliptic Curve Diffie-Hellman (ECDH)
Elliptic Curve Digital Signature Algorithm (ECDSA)
Elliptic Curve Integrated Encryption Scheme (ECIES)
EPS Encryption Algorithm (EEA)
E-safety Vehicle Intrusion Protected Applications (EVITA)
Federal Information Processing Standards (FIPS)
Failure Modes and Effects Analysis (FMEA)
Failure Modes, Effects and Criticality Analysis (FMECA)
Failure Modes, Effects and Diagnostics Analysis (FMEDA)
Firmware Over-the-Air Update (FOTA)
Field Programmable Gate Array (FPGA)
General Purpose Outputs / General Purpose Inputs and Outputs (GPO/GPIO)
Hash-based Message Authentication Code (HMAC)
Hardware Security Module (HSM)
Hierarchical Signature System (HSS)
Integrity and Data Encryption (IDE)
Integrated Hardware Security Module (IHSM)
Inline Memory Encryption (IME)
INDistinguishability under Chosen Ciphertext Attack (IND-CCA)
INDistinguishability under (adaptive) Chosen Plaintext Attack (IND-CPA)
Internet Protocol Security (IPsec)
Leighton-Micali Signature Scheme (LMS)
Leighton-Micali One-Time Signature (LMOTS)
Media Access Control Security (MACsec)
Module-Lattice based Digital Signature Algorithm (ML-DSA)
Module-Lattice based Key Encapsulation Mechanism (ML-KEM)
Magnetic Random Access Memory (MRAM)
National Institute of Standards and Technology (NIST))
Non-deterministic Random Bit Generator (NRBG)
On Demand CMRT Configuration (ODM)
Office of the State Commercial Cryptographic Administration (OSCCA)
Personalization Container for CMRT (Perso)
Public Key Infrastructure/Accelerator/Engine (PKI/A/E)
Arm Platform Security Architecture (PSA)
Physically Unclonable Function (PUF)
Quantum Safe Cryptography (QSC)
Software Development Kit (SDK)
Global Platform Security Evaluation Standard for IoT Platforms (SESIP)
Secure Hash Algorithm Keccak (SHAKE)
Secure Hardware Extension (SHE, SHE+)
Synthetic IV (SIV)
Safety of the Intended Functionality (SOTIF)
Transport Layer Security (TLS)
True Random Number Generator (TRNG)
Test Vector Leakage Assessment (TVLA)
Universal Verification Methodology (UVM)
Extended Merkle Signature Scheme (XMSS)