A SERVICE OF

logo

Chapter 4 Using Crypto-C 105
Algorithms in Crypto-C
AI_RC4WithMAC RC4 with message authentication code a
AI_RC4WithMAC_BER RC4 with message authentication code;
BER-encoded algorithm identifier
aa
Table 4-6 Symmetric Block Ciphers
Algorithm Info Type Description Padding BER PEM
General Purpose
AI_FeedbackCipher DES, Triple DES, DESX, RC2, or RC5 in
ECB, CBC, CFB, or OFB feedback modes
DES
AI_DES_CBC_IV8 DES-CBC, 8-byte IV none
AI_DES_CBCPadIV8 DES-CBC, 8-byte IV PKCS #5
AI_DES_CBCPadBER DES-CBC, 8-byte IV, BER-encoded
algorithm identifier
PKCS #5 a
AI_DES_CBCPadPEM DES-CBC, 8-byte IV, PEM-encoded
algorithm identifier
RFC 1423 a
AI_DES_CBC_BSAFE1 DES-CBC, 8-byte IV, padding optional;
backward compatibility with BSAFE 1.x
Triple DES
All 3DES algorithms in Crypto-C use the encrypt-decrypt-encrypt (EDE) sequence.
AI_DES_EDE3_CBC_IV8 3DES-CBC
AI_DES_EDE3_CBCPadIV8 3DES-CBC, 8-byte IV PKCS #5
AI_DES_EDE3_CBCPadBER 3DES-CBC, 8-byte IV, BER-encoded
algorithm identifier
PKCS #5 a
DESX
AI_DESX_CBC_IV8 DESX-CBC, 8-byte IV
AI_DESX_CBCPadIV8 DESX-CBC, 8-byte IV PKCS #5
Table 4-5 Symmetric Stream Ciphers
Some stream ciphers include message authentication codes to detect tampering with the data stream.
Algorithm Info Type Description BER MAC