certificate See digital certificate CFB See modes of operation characteristic See elliptic curve cryptography chooser See algorithm chooser

Cipher Block Chaining See modes of operation

Cipher Feedback See modes of operation collision 48

collision-free 48

communicating with other packages See BER encoding

compatibility BSAFE 2.x 9

D

database applications 85 decoding

BER vs. ASCII 125 DEMO_ALGORITHM_CHOOSER 15, 116 DER See BER encoding

DES 37, 88

communication with other algorithms 87 example 178–183

key 97, 129 parity bits 129

weak and semi-weak keys 94 DESX 38, 88

dictionary attack 50 Diffie, Whitfield 62 Diffie-Hellman Key Agreement

performing 280 Diffie-Hellman key agreement 65, 97

algorithm info types 110 applications 84, 86 base 63

discrete logarithm problem and 65 examples

key agreement 256–259 parameter distribution 253255parameter generation 249–252

key 99 parameters 63, 250 private value 63, 256 public value 63

timing attacks and blinding 96 digest See message digest digital certificate 61, 85, 86 Digital Encryption Standard See DES digital envelope 55, 86, 227

key agreement vs. 88 Digital Signature

verification 289

digital signature 57–59, 73, 213, 227 applications 86

examples

Digital Signature Algorithm 239–248RSA algorithm 233–239

signing 57 verifying 58

See also Digital Signature Algorithm,

ECDSA

Digital Signature Algorithm 57, 60–61algorithm info types 109

base 60 examples

key pair generation 242–243parameter generation 239–241 signing 243–246

verifying 246–248 key 97, 99, 240

generating 60 key info types 114 parameters 60, 239 subprime 60

timing attacks and blinding 96 Digital Signature Standard (DSS) 60 discrete logarithm problem 65 DSA Key Pair Generation

PKCS #11 Support 144

DSA See Digital Signature Algorithm DSS See Digital Signature Standard

E

EC Diffie-Hellman Key Agreement 280 EC Key Pair

generating 293

ECAES

private-key decryption 302 using 297

ECAES See Elliptic Curve Authenticated Encryption Scheme

ECB See modes of operation ECDSA 73–75

example 284–291

output considerations 288 signing 73

verfiying 74 verifying 74 X9.62 284

X9.62 with BER 291 EDE 38

effective key 39, 185, 186

Electronic Codebook (ECB) See modes of operation

Elliptic Curve Authenticated Encryption Scheme 75–77

example 297–303

output considerations 300

3 5 0

R S A B S A F E C r y p t o - C D e v e l o p e r ’s G u i d e

Page 372
Image 372
RSA Security 5.2.2 manual Ecdsa