Section 9
Glossary
GUID-2282AE1E-7E51-4F9F-8066-70614FB38695 v1.1.1
AES
Advanced Encryption Standard (AES) is a specification for the
encryption of electronic data. The key size used for an AES
cipher specifies the number of repetitions of transformation
rounds that convert the input, called the plaintext, into the final
output, called the ciphertext. The number of cycles of repetition
are as follows: 10 cycles of repetition for 128-bit keys. 12
cycles of repetition for 192-bit keys. 14 cycles of repetition for
256-bit keys.
AGSAL
Generic security application
ANSI
American National Standards Institute
ASCII
American Standard Code for Information Interchange (ASCII)
is a character-encoding scheme originally based on the English
alphabet. ASCII codes represent text in computers,
communications equipment, and other devices that use text.
CA
In cryptography, certificate authority, or certification authority,
(CA) is an entity that issues digital certificates. The digital
certificate certifies the ownership of a public key by the named
subject of the certificate
CMT
Communication Management tool in PCM600
CPU
Central processor unit
CRC
Cyclic redundancy check
DARPA
Defense Advanced Research Projects Agency (The US
developer of the TCP/IP protocol etc.)
DHCP
Dynamic Host Configuration Protocol
DNP3
DNP3 (Distributed Network Protocol) is a set of
communications protocols used between components in
process automation systems. Its main use is in utilities such as
electric and water companies. It plays a crucial role in SCADA
systems, where it is used by SCADA Master Stations (aka
Control Centers), Remote Terminal Units (RTUs), and
Intelligent Electronic Devices (IEDs). It is primarily used for
communications between a master station and RTUs or IEDs'.
EMC
Electromagnetic compatibility
EN 50263
Electromagnetic compatibility (EMC) - Product standard for
measuring relays and protection equipment.
EN 60255-26
Electromagnetic compatibility (EMC) - Product standard for
measuring relays and protection equipment.
1MRK 511 454-UEN A
Section 9
Glossary
GMS600 1.3
51
Cyber security deployment guideline