![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/9/c4/9c4432ed-94b6-4f82-9d47-c9fb5f98b613/9c4432ed-94b6-4f82-9d47-c9fb5f98b613-bg174.png)
350 RSA BSAFE Crypto-C Developer’s Guide
certificate See digital certificate
CFB See modes of operation
characteristic See elliptic curve cryptography
chooser See algorithm chooser
Cipher Block Chaining See modes of
operation
Cipher Feedback See modes of operation
collision 48
collision-free 48
communicating with other packages See BER
encoding
compatibility
BSAFE 2.x 9
D
database applications 85
decoding
BER vs. ASCII 125
DEMO_ALGORITHM_CHOOSER 15, 116
DER See BER encoding
DES 37, 88
communication with other algorithms 87
example 178–183
key 97, 129
parity bits 129
weak and semi-weak keys 94
DESX 38, 88
dictionary attack 50
Diffie, Whitfield 62
Diffie-Hellman Key Agreement
performing 280
Diffie-Hellman key agreement 65, 97
algorithm info types 110
applications 84, 86
base 63
discrete logarithm problem and 65
examples
key agreement 256–259
parameter distribution 253–255
parameter generation 249–252
key 99
parameters 63, 250
private value 63, 256
public value 63
timing attacks and blinding 96
digest See message digest
digital certificate 61, 85, 86
Digital Encryption Standard See DES
digital envelope 55, 86, 227
key agreement vs. 88
Digital Signature
verification 289
digital signature 57–59, 73, 213, 227
applications 86
examples
Digital Signature Algorithm 239–248
RSA algorithm 233–239
signing 57
verifying 58
See also Digital Signature Algorithm,
ECDSA
Digital Signature Algorithm 57, 60–61
algorithm info types 109
base 60
examples
key pair generation 242–243
parameter generation 239–241
signing 243–246
verifying 246–248
key 97, 99, 240
generating 60
key info types 114
parameters 60, 239
subprime 60
timing attacks and blinding 96
Digital Signature Standard (DSS) 60
discrete logarithm problem 65
DSA Key Pair Generation
PKCS #11 Support 144
DSA See Digital Signature Algorithm
DSS See Digital Signature Standard
E
EC Diffie-Hellman Key Agreement 280
EC Key Pair
generating 293
ECAES
private-key decryption 302
using 297
ECAES See Elliptic Curve Authenticated
Encryption Scheme
ECB See modes of operation
ECDSA 73–75
example 284–291
output considerations 288
signing 73
verfiying 74
verifying 74
X9.62 284
X9.62 with BER 291
EDE 38
effective key 39, 185, 186
Electronic Codebook (ECB) See modes of
operation
Elliptic Curve Authenticated Encryption
Scheme 75–77
example 297–303
output considerations 300