RSA Security 5.2.2 manual Public-Key Algorithms, Digital Signatures, Secret Sharing

Models: 5.2.2

1 376
Download 376 pages 13.91 Kb
Page 25
Image 25

The Crypto-C Toolkit

Public-Key Algorithms

RSA Public Key Cryptosystem

Diffie-Hellman Key Agreement

Digital Signatures

DSA

RSA Digital Signatures

Elliptic Curve Public-Key Algorithms

Elliptic Curve Digital Signature Algorithm (ECDSA)

Elliptic Curve Diffie-Hellman Key Agreement

Elliptic Curve Authenticated Encryption Scheme (ECAES)

Secret Sharing

Bloom-Shamir Secret Sharing

Hardware Support

In addition to the cryptographic algorithms listed here, Crypto-C offers a hardware interface that allows vendors of cryptographic hardware to support the Crypto-C API. One such vendor is Intel®, whose Intel hardware security primitives include the Intel Random Number Generator.

For information on using the Intel hardware (when present) with Crypto-C, see the Intel Security Hardware User’s Guide, included on the Crypto-C CD-ROM. For information about using Crypto-C with other cryptographic hardware, contact the specific hardware vendor.

RSA BSAFE Crypto-C products include PKCS #11 hardware support to allow communication with hardware like smart cards (for secure key storage) and cryptographic accelerator cards (for performance improvements). PKCS #11 support is in addition to the BHAPI hardware support offered in previous versions of Crypto- C.

C h a p t e r 1 I n t r o d u c t i o n

3

Page 25
Image 25
RSA Security 5.2.2 manual Digital Signatures, Elliptic Curve Public-Key Algorithms, Secret Sharing