CryptoSys PKI Pro Manual

Supported Algorithms

Please note A caution about insecure default algorithms.

Public key encryption and signature algorithms

Elliptic curve cryptography

Symmetric block cipher algorithms for content encryption

In addition, the following algorithm can be read by the CMS_ReadEnvData[ToString] functions:

Block cipher algorithms for key wrapping

Message digest hash algorithms

We keep MD2 here so we can reproduce the examples from RSA Laboratories' 1993 paper [PKCS-EX] and to do tests with some (very old) X.509 certificates. You are recommended to use at least SHA-256 in new applications.

HMAC keyed-hash algorithms

For generating HMAC message authentication codes with the HMAC_ functions.

Password-based encryption algorithms

These algorithms from PKCS#5 and PKCS#12 can be used to create PKCS#8 encrypted private key files:

In addition to those above, the following legacy algorithms can be read by the RSA_ReadEncPrivateKey function:

RSA Key Formats

The above key values can be passed as (a) a binary DER-encoded ASN.1 file, (b) a text file in PEM format, (c) a string containing the key in PEM format.

Also supported are RSA private and public keys represented in XML format to XKMS 2.0 [XKMS] and JSON Web Key (JWK) format [JWK]. For more details, see Key Storage Format.

Elliptic Curve Key Formats

These elliptic curve key values can be passed as (a) a binary DER-encoded ASN.1 file, (b) a text file in PEM format, (c) a string containing the key in PEM format.

[PREV: Theory...]   [Contents]   [Index]   
   [NEXT: Supported CMS Content Types...]

Copyright © 2004-24 D.I. Management Services Pty Ltd. All rights reserved. Generated 2024-09-23T07:52:09Z.