354 RSA BSAFE Crypto-C Developers Guide
RSA Security Inc.
FAQ 55
Web si te 48
S
salt 49, 94
iterations 207
sample program files
berder.c 124
descbc.c 178
dhagree.c 256
dhparam.c 249
dintorex.c 26
dsasign.c 239
ecdh.c 280
ecdsadig.c 285
eces.c 297
ecparam.c 260, 273
encdec.c 172
hmac.c 161
introex.c 9
mdber.c 155
mdigest.c 152
pbe.c 206
rc2.c 184
rc5.c 190
rc6.c 196
rc6fb.c 196
rsapkcs.c 214
rsasign.c 233
scrtshar.c 305
secret key
See symmetric-key cryptography
secret sharing 80, 305
algorithm info types 111
example 305311
key escrow vs. 89
Secure Hash Algorithm
See SHA1
security 91100
DES weak keys 94
key size 97
passwords and 93
random seed and 92
seed 48, 92, 93, 167
entropy 93
zeroizing 170
sensitive data 123
zeroizing 20, 31, 91, 170, 209
SHA1 48
DSA and 60
ECAES and 76
examples 152156
random numbers 165171
hash-based message authentication
and 49, 161
Shamir, Adi 52
signature See digital signature 57
six-step sequence 8, 32
standards
ANSI 6
FIPS 4
NIST 4
PKCS 4
stream cipher 4647
algorithm info types 104
attacks 95
key 87
See also RC4
subprime 60
surrender context 16, 118120
example 119
parameter generation 118
symmetric-key cryptography 3647
algorithm info types 104107
examples 177201
password-based encryption 49
public-key vs. 87
See also block cipher, stream cipher
T
T_free 122
T_malloc 122
TDES See Triple DES
threshold scheme 80, 305
timing attack 95, 229
token key See BHAPI
Tripl e D ES 38
key 38, 99
V
Veri fic ati on
digital signature 289
verifying See digital signature
W
word size 39, 190
RC6 40
X
X9.31 313
X9.62 284, 291
Z
zeroizing sensitive data 20, 31, 91, 209
random seed 170