RSA Security Projection Television 5.2.2 사용자 설명서
3 5 4
R S A B S A F E C r y p t o - C D e v e l o p e r ’s G u i d e
RSA Security Inc.
FAQ 55
Web site 48
iterations 207
sample program files
berder.c 124
descbc.c 178
dhagree.c 256
dhparam.c 249
dintorex.c 26
dsasign.c 239
ecdh.c 280
ecdsadig.c 285
eces.c 297
encdec.c 172
hmac.c 161
introex.c 9
mdber.c 155
mdigest.c 152
pbe.c 206
rc2.c 184
rc5.c 190
rc6.c 196
rc6fb.c 196
rsapkcs.c 214
rsasign.c 233
scrtshar.c 305
secret key
See symmetric-key cryptography
algorithm info types 111
key escrow vs. 89
Secure Hash Algorithm
See SHA1
DES weak keys 94
key size 97
passwords and 93
random seed and 92
entropy 93
zeroizing 170
sensitive data 123
SHA1 48
DSA and 60
ECAES and 76
hash-based message authentication
Shamir, Adi 52
signature See digital signature 57
standards
ANSI 6
FIPS 4
NIST 4
PKCS 4
algorithm info types 104
attacks 95
key 87
See also RC4
subprime 60
example 119
parameter generation 118
password-based encryption 49
public-key vs. 87
See also block cipher, stream cipher
T
T_free 122
T_free 122
T_malloc 122
TDES See Triple DES
token key See BHAPI
Triple DES 38
V
Verification
Verification
digital signature 289
verifying See digital signature
RC6 40
X
X9.31 313
X9.31 313
random seed 170