key (continued) RC2 39, 99 RC4 87, 99 RC5 99, 190 recovery 89 registering 61 RSA 53, 54, 97, 98 size 97, 98, 129

token (hardware) 111, 132 Triple DES 99

weak and semi-weak DES keys 94 See also public-key cryptography,

symmetric-key cryptography key agreement 77

applications 86

digital envelopes vs. 88

See also Diffie-Hellman key agreement, Elliptic Curve Diffie-Hellman Key Agreement

key derivation function (KDF) 76 key escrow 82

secret sharing vs. 89 key info type 14, 113

block cipher types 113 DSA types 114 elliptic curve types 115 generic key types 113 RSA algorithm types 114

key management 82, 87 key object 13, 113

key size 40

KI See key info type Koblitz, Neal 65

L

local file encryption 83

M

MAC See message authentication code man-in-the-middle 85

MD 48

MD2 48

MD5 48

memory management 121, 122

security considerations 92 T_free 21

T_malloc 18 tstdlib.c and 122

message authentication code 47 algorithm info types 104 HMAC 49, 161 password-based encryption 49 RC4 and 47

message digest 47–48 algorithm info types 103 BER encoding 155 collision 48

digital signature 57, 233 example 152–156

See also MD, MD2, MD5, SHA1 Message digests

uses 48 Miller, Victor 65 modes of operation 41

Cipher Block Chaining (CBC) 43 examples 178–183, 184–190

Cipher Feedback (CFB) 43 Electronic Codebook 42 Output Feedback (OFB) 45

modular math 52

modulus See RSA algorithm MultiPrime

defined 218

Generating an RSA MultiPrime Key 222 how many primes to use 219

Sample 220

N

NIST certification 4

O

OAEP 231 OAEP Protocol

Optimal Asymmetric Encryption Padding (OAEP) 55

OFB (Output Feedback mode) See modes of operation

one-wayhash function See message digest Optimal Asymetric Encryption Padding

(OAEP) 231

optimal normal basis (ONB) See elliptic curve parameters

output considerations 126 ASCII to binary 173, 175 block cipher 37 ECDSA 288

elliptic curve 276

Elliptic Curve Authenticated Encryption Scheme 300

Elliptic Curve Diffie-Hellman key agreement 283

output feedback mode 45

Output Feedback mode (OFB) See modes of operation

3 5 2

R S A B S A F E C r y p t o - C D e v e l o p e r ’s G u i d e

Page 374
Image 374
RSA Security 5.2.2 manual A B S a F E C r y p t o C D e v e l o p e r ’s G u i d e