3 \def\entry#1#2#3{& & &\cr}
7 \halign{\vrule#& \strut\enskip\hfil#\hfil\enskip&
8 \vrule#& \strut\enskip#\hfil\enskip&
9 \vrule#& \strut\enskip\hfil#\hfil\enskip&
12 height2pt&\omit& &\omit& &\omit&\cr
13 \entry {\bf Abbrev.}{\hfil\bf Term}{\bf Context}
14 height2pt&\omit& &\omit& &\omit&\cr
16 height2pt&\omit& &\omit& &\omit&\cr
17 \entry {CBC}{Cipher Block Chaining}{DES}
18 \entry {CBMS}{Computer Based Message System}{}
19 \entry {CKD}{Key Distribution Center}{EFT}
20 \entry {CKS}{Checksumming}{DES}
21 \entry {CSM}{Cryptographic Service Message}{}
22 \entry {DEA}{Data Encryption Algorithm}{}
23 \entry {DES}{Data Encryption Standard}{}
24 \entry {DSM}{Disconnect Service Message}{MCL}
25 \entry {ECB}{Electronic Code Book}{DES}
26 \entry {EFT}{Electronic Funds Transfer}{}
27 \entry {IDK}{Key Identifier}{CSM}
28 \entry {ID}{Identifier}{KDS}
29 \entry {IP}{Internet Protocol}{}
30 \entry {IV}{Initialization Vector}{CSM}
31 \entry {KA}{Authentication Key}{CSM}
32 \entry {KDC}{Key Distribution Center}{CBMS}
33 \entry {KDS}{Key Distribution Server}{CBMS}
34 \entry {KD}{Data-encrypting Key}{CSM}
35 \entry {KK}{Key-encrypting Key}{CSM}
36 \entry {MAC}{Message Authentication Code}{CSM}
37 \entry {MCL}{Message Class}{CSM}
38 \entry {MH}{The Rand Message Handling System}{}
39 \entry {MIC}{Message Integrity Code}{CSM}
40 \entry {MK}{Master Key}{CSM}
41 \entry {MTA}{Message Transport Agent}{CBMS}
42 \entry {MTS}{Message Transport System}{CBMS}
43 \entry {ORG}{Message Originator}{CSM}
44 \entry {RCV}{Message Receiver}{CSM}
45 \entry {RIU}{Request Identified User}{MCL}
46 \entry {RSI}{Request Service Initialization}{MCL}
47 \entry {RUI}{Request User Identification}{MCL}
48 \entry {TCP}{Transmission Control Protocol}{}
49 \entry {TMA}{Trusted Mail Agent}{CBMS}
50 \entry {TTI}{Trusted Technologies, Inc.}{}
51 \entry {UA}{User Agent}{CBMS}
52 height2pt&\omit& &\omit& &\omit&\cr