Glossary of terms

A

AckNack

TBD

AES

Advanced Encryption Standard

AES-GCM

AES using GCM. A block cipher mode of operation that provides high speed of authenticated encryption and data integrity.

AES-GMAC

AES using GMAC

B

C

CDR

Common Data Representation

CRL

Certificate Revocation List

CSR

Certificate Signing Request

D

Datagram

TBD

DataReader

A DCPS equivalent of a DDSI Reader. Each DDSI Reader is the combination of the corresponding DCPS DataReader and the DCPS Subscriber it belongs to.

DataWriter

A DCPS equivalent of a DDSI Writer. Each DDSI Writer is a combination of the corresponding DCPS DataWriter and DCPS Publisher.

DDSI participants

TBD

DCPS

Data-Centric Publish-Subscribe

DDSI

Data Distribution Service Interoperability. DDSI specification: DDSI-RTPS 2.1, DDSI-RTPS 2.2, DDSI-RTPS 2.5.

DDS

Data Distribution Service. OMG DDS specification

Domain ID

TBD

E

F

G

GCM

Galois Counter Mode

GMAC

Galois Message Authentication Code

H

Heartbeat

TBD

HSM

Hardware Security Module. A physical device that safeguards cryptographic keys and performs cryptographic operations. HSMs provide tamper-resistant storage where private keys can be used for signing and decryption without ever leaving the device.

I

IDL

Interface Definition Language

IPv4

TBD

IPv6

TBD

J

K

L

TBD

Liveliness

TBD

Loopback

TBD

M

MAC

Message Authentication Code

Multicast

In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution.

N

NACK

O

OpenSplice

TBD

P

Participant

TBD

Peer Node

TBD

PKCS#7

Public-Key Cryptography Standards #7. A standard for signing and encrypting data, also known as Cryptographic Message Syntax (CMS). Used in DDS Security to sign governance and permissions documents, ensuring their integrity and authenticity.

PKCS#11

Public-Key Cryptography Standards #11. A platform-independent API (also known as “Cryptoki”) for interfacing with cryptographic tokens such as HSMs, smart cards, and USB security keys. Defined originally by RSA Security.

PKI

Public Key Infrastructure

PoC

Proof of Concept

Publisher

TBD

Q

R

Reader

TBD

RSA

Rivest-Shamir-Adleman. A public-key cryptosystem that is widely used for secure data transmission.

RTI

TBD

RTPS

Real-Time Publish Subscribe

S

Samples

TBD

SEDP

Simple Endpoint Discovery Protocol

SPI

Service Plugin Interface

SPDP

Simple Participant Discovery Protocol

StatefulWriter

TBD

T

TCP

Transmission Control Protocol

TLS

Thread-Local Storage

Topic

TBD

TSN

Time Sensitive Network

U

UDP

User Datagram Protocol

Unicast

TBD

V

Vendors

TBD

Volatile

TBD

W

Writer

TBD

WHC

Writer History Cache

X

X.509

A standard defining the format of public key certificates, defined in RFC 5280. X.509 certificates bind a public key to an identity (subject) and are signed by a Certificate Authority. DDS Security uses X.509 certificates for participant authentication.

Y

Z