RSA Security 5.2.2 manual List of Figures

Models: 5.2.2

1 376
Download 376 pages 13.91 Kb
Page 11
Image 11

List of Figures

Figure 3-1Symmetric-Key Encryption and Decryption . . . . . . . . . . . . . . . . . . . . 36

Figure 3-2 Triple DES Encryption as Implemented in Crypto-C. . . . . . . . . . . . . . 38

Figure 3-3 Electronic Codebook (ECB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Figure 3-4Cipher-Block Chaining (CBC) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Figure 3-5 Cipher Feedback (CFB) Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Figure 3-6 Output Feedback Mode (OFB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Figure 3-7 RC4 Encryption or Decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Figure 3-8 DES Key and IV Generation for Password Based Encryption . . . . . . 50

Figure 3-9Public-Key Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Figure 3-10 Digital Envelope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Figure 3-11 RSA Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Figure 3-12 The Diffie-Hellman Key Agreement Protocol . . . . . . . . . . . . . . . . . . 63 Figure 3-13 Elliptic Curve Diffie-Hellman Key Agreement . . . . . . . . . . . . . . . . . . 79 Figure 3-14 Secret Sharing — Key Share Assignment . . . . . . . . . . . . . . . . . . . . 81 Figure 3-15 Secret Sharing — Full Key Generation From Shares . . . . . . . . . . . . 81

Figure 4-1 Algorithm Object in a Software Implementation . . . . . . . . . . . . . . 132

Figure 4-2 Algorithm Object in a Hardware Implementation . . . . . . . . . . . . . . 133

x i

Page 11
Image 11
RSA Security 5.2.2 manual List of Figures