350 RSA BSAFE Crypto-C Developers Guide
certificate See digital certificate
CFB See modes of operation
characteristic See elliptic curve cryptography
chooser See algorithm chooser
Cipher Block Chaining See modes of
operation
Cipher Feedback See modes of operation
collision 48
collision-free 48
communicating with other packages See BER
encoding
compatibility
BSAFE 2.x 9
D
database applications 85
decoding
BER vs. ASCII 125
DEMO_ALGORITHM_CHOOSER 15, 116
DER See BER encoding
DES 37, 88
communication with other algorithms 87
example 178183
key 97, 129
parity bits 129
weak and semi-weak keys 94
DESX 38, 88
dictionary attack 50
Diffie, Whitfield 62
Diffie-Hellman Key Agreement
performing 280
Diffie-Hellman key agreement 65, 97
algorithm info types 110
applications 84, 86
base 63
discrete logarithm problem and 65
examples
key agreement 256259
parameter distribution 253255
parameter generation 249252
key 99
parameters 63, 250
private value 63, 256
public value 63
timing attacks and blinding 96
digest See message digest
digital certificate 61, 85, 86
Digital Encryption Standard See DES
digital envelope 55, 86, 227
key agreement vs. 88
Digital Signature
verification 289
digital signature 5759, 73, 213, 227
applications 86
examples
Digital Signature Algorithm 239248
RSA algorithm 233239
signing 57
verifying 58
See also Digital Signature Algorithm,
ECDSA
Digital Signature Algorithm 57, 6061
algorithm info types 109
base 60
examples
key pair generation 242243
parameter generation 239241
signing 243246
verifying 246248
key 97, 99, 240
generating 60
key info types 114
parameters 60, 239
subprime 60
timing attacks and blinding 96
Digital Signature Standard (DSS) 60
discrete logarithm problem 65
DSA Key Pair Generation
PKCS #11 Support 144
DSA See Digital Signature Algorithm
DSS See Digital Signature Standard
E
EC Diffie-Hellman Key Agreement 280
EC Key Pair
generating 293
ECAES
private-key decryption 302
using 297
ECAES See Elliptic Curve Authenticated
Encryption Scheme
ECB See modes of operation
ECDSA 7375
example 284291
output considerations 288
signing 73
verfiying 74
verifying 74
X9.62 284
X9.62 with BER 291
EDE 38
effective key 39, 185, 186
Electronic Codebook (ECB) See modes of
operation
Elliptic Curve Authenticated Encryption
Scheme 7577
example 297303
output considerations 300