RSA Security 5.2.2 manual Elliptic Curve Public-Key Cryptography, 11Bloom-Shamir Secret Sharing

Models: 5.2.2

1 376
Download 376 pages 13.91 Kb
Page 133
Image 133

 

 

Algorithms in Crypto-C

 

 

 

 

Table 4-10Elliptic Curve Public-Key Cryptography (Continued)

 

 

 

 

 

 

Algorithm Info Type

Description

 

 

 

 

 

 

Elliptic Curve DSA

 

 

 

AI_EC_DSA

Raw ECDSA signature/verification

 

 

AI_EC_DSAWithDigest

SHA1 digest followed by ECDSA signature/verification

 

 

Elliptic Curve Authenticated Encryption System

 

 

AI_EC_ES

EC Authenticated Encryption System

 

 

 

 

 

Table 4-11Bloom-Shamir Secret Sharing

Algorithm Info Type

Description

AI_BSSecretSharing

Bloom-Shamir secret sharing

 

 

Table 4-12Hardware Interface

For use with hardware devices, when present. For information on the Intel hardware security primitives, see the Intel Security Hardware User’s Guide, available on the Crypto-C

CD. For information on other hardware devices, see the documentation from your hardware manufacturer.

Algorithm Info Type

Description

AI_HW_Random

Provides access to random bytes generated by a hardware

 

device

AI_KeypairTokenGen

Generates the token form of an RSA or DSA public/private

 

key pair

AI_SymKeyTokenGen

Generates the token form of a DES, RC2, RC4, RC5, or TDES

 

symmetric key

AI_PKCS_OAEPRecode

RSA raw or hardware encryption/decryption with OAEP

 

according to PKCS #1

AI_PKCS_OAEPRecodeBER

RSA raw or hardware encryption/decryption with OAEP

 

according to PKCS #1

 

BER-encoded algorithm identifier

 

 

C h a p t e r 4 U s i n g C r y p t o - C

1 1 1

Page 133
Image 133
RSA Security 5.2.2 manual Elliptic Curve Public-Key Cryptography, 11Bloom-Shamir Secret Sharing, 12Hardware Interface