RSA Security Inc.

FAQ 55

Web site 48

S

salt 49, 94 iterations 207

sample program files berder.c 124 descbc.c 178 dhagree.c 256 dhparam.c 249 dintorex.c 26 dsasign.c 239 ecdh.c 280 ecdsadig.c 285 eces.c 297 ecparam.c 260, 273 encdec.c 172 hmac.c 161 introex.c 9 mdber.c 155 mdigest.c 152 pbe.c 206

rc2.c 184 rc5.c 190 rc6.c 196 rc6fb.c 196 rsapkcs.c 214 rsasign.c 233 scrtshar.c 305

secret key

See symmetric-key cryptography secret sharing 80, 305

algorithm info types 111 example 305–311

key escrow vs. 89 Secure Hash Algorithm

See SHA1 security 91–100

DES weak keys 94 key size 97 passwords and 93 random seed and 92

seed 48, 92, 93, 167 entropy 93 zeroizing 170

sensitive data 123 zeroizing 20, 31, 91, 170, 209

SHA1 48 DSA and 60 ECAES and 76 examples 152–156

random numbers 165–171

hash-based message authentication and 49, 161

Shamir, Adi 52

signature See digital signature 57 six-stepsequence 8, 32 standards

ANSI 6

FIPS 4

NIST 4

PKCS 4

stream cipher 46–47 algorithm info types 104 attacks 95

key 87

See also RC4 subprime 60

surrender context 16, 118–120 example 119

parameter generation 118 symmetric-key cryptography 36–47

algorithm info types 104–107examples 177201 password-based encryption 49 public-key vs. 87

See also block cipher, stream cipher

T

T_free 122

T_malloc 122

TDES See Triple DES threshold scheme 80, 305 timing attack 95, 229 token key See BHAPI Triple DES 38

key 38, 99

V

Verification

digital signature 289 verifying See digital signature

W

word size 39, 190 RC6 40

X

X9.31 313

X9.62 284, 291

Z

zeroizing sensitive data 20, 31, 91, 209 random seed 170

3 5 4

R S A B S A F E C r y p t o - C D e v e l o p e r ’s G u i d e

Page 376
Image 376
RSA Security 5.2.2 manual See also RC4 subprime