Many
Manuals
search
Categorias
Marcas
Inicio
RSA Security
Manuales de software
Projection Television 5.2.2
Manual de usuario
RSA Security Projection Television 5.2.2 Manual de usuario Pagina 12
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
376
Tabla de contenidos
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
xii
RSA BSAFE Crypto-C Dev
eloper
’
s Guide
1
2
...
7
8
9
10
11
12
13
14
15
16
17
...
375
376
Crypto-C
1
First printing: May 2001
2
Contents
3
Quick Start 7
4
Cryptography 35
4
Using Crypto-C 101
6
Symmetric-Key Operations 177
8
Public-Key Operations 213
8
Secret Sharing Operations 305
9
Command-Line Demos 327
10
Glossary 339
10
Index 349
10
List of Figures
11
List of Tables
13
What’s New in Version 5.2.2?
16
Organization of This Manual
17
Terms and Abbreviations
19
Related Documents
20
How to Contact RSA Security
22
Introduction
23
The Crypto-C Toolkit
24
Hardware Support
25
PKCS Standards and Crypto-C
26
NIST Standards and Crypto-C
26
PKCS Compared with NIST
27
Quick Start
29
The Six-Step Sequence
30
Introductory Example
31
Chapter 2 Quick Start 11
33
Chapter 2 Quick Start 13
35
Chapter 2 Quick Start 15
37
Chapter 2 Quick Start 17
39
Chapter 2 Quick Start 21
43
Putting It All Together
44
Chapter 2 Quick Start 25
47
Multiple Updates
51
Chapter 2 Quick Start 31
53
Summary of the Six Steps
54
Cryptography
57
Cryptography Overview
58
Ciphers in Crypto-C
59
Triple DES
60
• word size
61
• rounds
61
• key size (in bytes)
61
Modes of Operation
63
Cipher Feedback (CFB) Mode
65
Output Feedback (OFB) Mode
67
Public-Key Cryptography
72
Modular Math
74
Prime Numbers
74
MultiPrime Numbers
74
Security
76
Digital Envelopes
77
Figure 3-10 Digital Envelope
78
Chapter 3 Cryptography 57
79
• A message
80
Chapter 3 Cryptography 59
81
Digital Certificates
83
The Algorithm
84
Parameter Generation
85
Elliptic Curve Cryptography
87
Elliptic Curve Parameters
88
Odd Prime Fields
89
Fields of Even Characteristic
89
The Point P and its Order
91
The Order of a Point
92
A Point of Prime Order
92
The Cofactor
93
ECDSA Signature Scheme
95
Verifying a Signature
96
98
98
The Math
101
Secret Sharing
102
Working with Keys
103
Key Management
104
Key Escrow
104
Applications of Cryptography
105
Point-to-Point Applications
106
Client/Server Applications
107
Peer-to-Peer Applications
108
Choosing Algorithms
109
Secret Sharing and Key Escrow
111
Elliptic Curve Algorithms
111
Interoperability
112
Security Considerations
113
Temporary Buffers
114
Choosing Passwords
115
DES Weak Keys
116
Stream Ciphers
117
Timing Attacks and Blinding
117
· s mod n
118
Choosing Key Sizes
119
RSA Keys
120
RC2 Effective Key Bits
121
RC4 Key Bits
121
RC5 Key Bits and Rounds
121
Triple DES Keys
121
Elliptic Curve Keys
122
Using Crypto-C
123
Basic Algorithm Info Types
124
Summary of AIs
125
Table 4-3 ASCII Encoding
126
Algorithms in Crypto-C
127
Symmetric Block Ciphers
127
Symmetric Stream Ciphers
127
RSA Public-Key Cryptography
129
DSA Public-Key Cryptography
131
Diffie-Hellman Key Agreement
132
Bloom-Shamir Secret Sharing
133
Hardware Interface
133
Keys In Crypto-C
135
RSA Public and Private Keys
136
DSA Public and Private Keys
136
Block Cipher Keys
136
Token Keys
137
Algorithm Choosers
138
An RSA Algorithm Chooser
139
The Surrender Context
140
A Sample Surrender Function
141
Saving State
142
When to Allocate Memory
143
Memory-Management Routines
144
BER/DER Encoding
145
Chapter 4 Using Crypto-C 125
147
Input and Output
148
The RSA Algorithm
149
General Considerations
150
Key Size
151
Private Key Size
152
• Total: 484 bytes
153
Using Cryptographic Hardware
154
B_CreateSessionchooser is
155
PKCS #11 Support
156
Chapter 4 Using Crypto-C 135
157
Chapter 4 Using Crypto-C 137
159
Chapter 4 Using Crypto-C 139
161
Chapter 4 Using Crypto-C 141
163
Advanced PKCS #11
169
Hardware Issues
170
Chapter 4 Using Crypto-C 149
171
Non-Cryptographic Operations
173
Message Digests
174
Step 3: Init
175
Step 4: Update
175
Step 5: Final
176
BER-Encoding the Digest
177
Saved State
178
B_SetAlgorithmInfo call
180
Code (HMAC)
183
Step 6: Destroy
186
Generating Random Numbers
187
Step 5: Generate
191
Step 1: Create
192
Step 2: Set
192
Steps 4, 5, 6
193
Encoding Binary Data To ASCII
194
Decoding ASCII-Encoded Data
196
Symmetric-Key Operations
199
Block Ciphers
200
Cipher KIs
203
Decrypting
205
The RC2 Cipher
206
The RC5 Cipher
212
The RC6 Cipher
218
The AES Cipher
223
Step 3b: Setting the Key Data
225
Password-Based Encryption
228
Public-Key Operations
235
Performing RSA Operations
236
MultiPrime
240
How Many Primes?
241
Structure
244
Crypto-C Format
246
RSA Public-Key Encryption
248
RSA Private-Key Decryption
251
RSA Digital Signatures
255
Verifying a Digital Signature
258
Performing DSA Operations
261
Generating a DSA Key Pair
264
DSA Signatures
265
Computing a Digital Signature
266
BER Format
276
Step 4: Phase 1
279
Step 5: Phase 2
280
Saving the Object State
281
The following procedure
288
Step 3: Initialize
292
Step 5: Phase 2
306
Generating EC Parameters
307
Generating an EC Key Pair
307
Step 3: Init
312
Using ECAES
319
Using an EC Key Pair
320
ECAES Public-Key Encryption
320
ECAES Private-Key Decryption
324
Step 4: Update
324
Secret Sharing Operations
327
Reconstructing the Secret
331
Putting It All Together:
335
An X9.31 Example
335
The X9.31 Sample Program
336
Generating Random Bytes
337
Providing the Seed
339
Generating a Key Pair
340
Verifying the Signature
345
Surrendering Control
347
Printing the Buffer Contents
348
Command-Line Demos
349
Starting BDEMO
350
Specifying User Keys
351
Using BDEMO
351
Create a File Envelope
352
Verify a Signed File
352
Open a File Envelope
352
Generate a Key Pair
353
BDEMODSA
354
Sign a File
355
Running BDEMOEC
356
Using BDEMOEC
356
File Reference
357
Glossary
361
Comentarios a estos manuales
Sin comentarios
Publish
Imprimir documento
Imprimir pagina 12
Comentarios a estos manuales