CryptoSys PKI Pro Manual

A caution about insecure default algorithms

CAUTION: Many of the default algorithms in this Toolkit (originally written nearly 20 years ago) are no longer considered secure. You are recommended explicitly to use at least the following minimum-strength algorithms:

AlgorithmDefaultMinimum recommendedOption to use
Message digestSHA-1SHA-256PKI_HASH_SHA256
HMACHMAC-SHA-1HMAC-SHA-256PKI_HMAC_SHA256
RSA signaturesha1WithRSAEncryptionsha256WithRSAEncryptionPKI_SIG_RSA_SHA256
RSA encryption schemeRSAES-PKCS1-v1_5RSAES-OAEPPKI_EME_OAEP
Password-based encryptionpbeWithSHAAnd3-KeyTripleDES-CBC"pkcs5PBES2" using pkcs5PBKDF2 with "aes128-CBC"PKI_PBE_PBKDF2_AES128
Symmetric encryptiondes-EDE3-CBCaes128-CBC/AES-128-GCM*PKI_BC_AES128/PKI_AEAD_AES_128_GCM

* Use the CIPHER_EncryptAEAD function or Cipher.EncryptAEAD Method for AES-GCM.

We did consider changing the default options to reflect the above recommendations, but realised it would break too many existing applications. So we've just added warnings to the various parts of the manual, which we know you all read in detail.

[PREV: Key Storage Format (ECC)...]   [Contents]   [Index]   
   [NEXT: Installation...]

Copyright © 2004-24 D.I. Management Services Pty Ltd. All rights reserved. Generated 2024-09-23T07:52:09Z.