TCG Algorithm Registry. Family 2.0" Level 00 Revision April 17, Published. Contact:
|
|
|
- Annabelle Lang
- 9 years ago
- Views:
Transcription
1 Family 2.0" Level 00 Revision April 17, 2014 Published Contact: TCG TCG Published Copyright TCG 2014
2 Disclaimers, Notices, and License Terms THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein. This document is copyrighted by Trusted Computing Group (TCG), and no license, express or implied, is granted herein other than as follows: You may not copy or reproduce the document or distribute it to others without written permission from TCG, except that you may freely do so for the purposes of (a) examining or implementing TCG specifications or (b) developing, testing, or promoting information technology standards and best practices, so long as you distribute the document with these disclaimers, notices, and license terms. Contact the Trusted Computing Group at for information on specification licensing through membership agreements. Any marks and brands contained herein are the property of their respective owners. Page ii Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
3 CONTENTS TCG Published... i 1 Introduction Nomenclature and Notations Normative references TPM_ALG_ID ECC Values Curve ID Values Curve Parameters Introduction NIST P NIST P NIST P NIST P NIST P BN P BN P SM2_P Hash Parameters Introduction SHA SHA SHA SHA SM3_ Symmetric Block Cipher Parameters Introduction AES SM Applicability of this Registry for Other TCG Specifications Family 2.0" Page iii Level 00 Revision Copyright TCG 2014 April 17, 2014
4 TCG Algorithm Registry 1 Introduction The Algorithm Registry lists each algorithm assigned an identifier, allowing it to be unambiguously defined and referenced by other TCG specifications. This document is a compendium of data related to the various algorithms used in specifications created by the Trusted Computing Group (TCG). The compendium of algorithm data is intended to ensure interoperability between devices built to be compliant with TCG specifications. Many TCG specifications use a layered architecture where a single library specification on a bottom layer may be used by numerous platform specific middle layers (e.g. PC Client or Mobile Platform) to enable a variety of top level use cases. TCG specifications support products and solutions for numerous markets with varied requirements for commercial usefulness including features, security, interoperability, globalization, performance, regulatory requirements, compatibility, compliance, intellectual property rights, certification, etc. TCG as an organization does not perform cryptographic analysis of algorithms. The presence of an algorithm in the registry does not endorse its use by TCG for any specific use case or indicate an algorithm s acceptability for meeting any particular requirement set. The TCG endeavors to provide a variety of algorithms of varying strength for various commercial purposes. Ultimately, the TCG adds algorithms to its registry based on the needs of its membership. Security is built into an increasing number of general purpose Information and Communications Technology (ICT) products, and security standards are fundamental to the integrity and sustainability of the global ICT infrastructure. The Trusted Computing Group (TCG) believes that open, interoperable, and internationally vetted standards are critical for the success of trusted computing, and that the multilateral approach to creating such standards is most effective. TCG recognizes international standards in the field of IT security as the most appropriate method to ensure efficacy, interoperability, adoption and user acceptance. TCG takes into consideration international market requirements through international membership and welcomes participation from industry, academia, and governments in a unified, worldwide Trusted Computing standards development process. Commercial implementation of TCG standards is managed by individual product and service providers. Implementers or adopters of any solution using TCG specifications must carefully assess the appropriateness of any algorithms or TCG specification for satisfying their goals. In assessing algorithms, TCG recommends implementers and adopters diligently evaluate available information such as governmental, industrial, and academic research. Solutions involving cryptography are dependent on the solution architecture and on the properties of cryptographic algorithms supported. Over time, cryptographic algorithms can develop deficiencies for reasons like advances in cryptographic techniques or increased computing power. Solutions that support a diversity of algorithms can remain durable when subsets of supported algorithms wane in usefulness. Therefore, implementers intent on providing robust solutions are responsible for evaluating both algorithm appropriateness and diversity. The TCG classifies algorithms listed in this registry according to the following labels: Family 2.0" Page 1 Level 00 Revision Copyright TCG 2014 April 17, 2014
5 TCG Standard - The algorithm is mandatory in one or more TCG specifications that reference this registry. The TCG designates algorithms with this classification in accordance with its goals of promoting international standards and interoperability. TCG Legacy The algorithm is assigned an identifier for compatibility or historical reasons and is unlikely to be referenced by future TCG specifications. The TCG designates an algorithm with this classification based on the goals of the organization to discontinue support for the algorithm and transition solutions to alternative algorithms. Stakeholders using solutions relying on algorithms classified as TCG Legacy are strongly recommended to reevaluate the algorithm s appropriateness based on the current state of the art. Assigned The algorithm is assigned an identifier, allowing it to be unambiguously defined and referenced by other TCG specifications, but is not designated as TCG Standard or TCG Legacy. In terms of algorithm lifecycle in the registry, the TCG will initially assign algorithms to the Assigned classification. Some algorithms will be reclassified as TCG Standard if they become mandatory algorithms in TCG specifications. Eventually, algorithms are expected to transition to the TCG Legacy categorization. 2 Nomenclature and Notations The tables in this document are formatted and decorated using the table styles defined in the Notations clause of Part 2 of the TPM 2.0 Library Specification. Page 2 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
6 3 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GM/T : Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 1: General GM/T : Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 2: Digital Signature Algorithm GM/T : Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 3: Key Exchange Protocol GM/T : Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 5: Parameter definition GM/T : SM3 Cryptographic Hash Algorithm GM/T : SM4 Block Cipher Algorithm IEEE Std 1363 TM -2000, Standard Specifications for Public Key Cryptography IEEE Std 1363a (Amendment to IEEE Std ), IEEE Standard Specifications for Public Key Cryptography- Amendment 1: Additional Techniques IETF RFC 3447, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 ISO/IEC , Information technology Security techniques Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hash-function ISO/IEC 10116, Information technology Security techniques Modes of operation for an n- bit block cipher ISO/IEC , Information technology Security techniques Hash-functions Part 3: Dedicated hash functions ISO/IEC , Information technology -- Security techniques -- Digital signature with appendix -- Part 3: Discrete logarithm based mechanisms ISO/IEC , Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General ISO/IEC , Information technology Security techniques Encryption algorithms Part 3: Block ciphers NIST SP , Recommendation for Key Derivation Using Pseudorandom Functions (Revised) NIST SP800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Family 2.0" Page 3 Level 00 Revision Copyright TCG 2014 April 17, 2014
7 4 TPM_ALG_ID Table 2 is the list of algorithms to which the TCG has assigned an algorithm identifier along with its numeric identifier. An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitive way. The values for TPM_ALG_ID shall be in the range of F FF16. Other structure tags will be in the range FF FF16. An algorithm shall not be assigned a value in the range 00 C C616 in order to prevent any overlap with the command structure tags used in TPM 1.2. The implementation of some algorithms is dependent on the presence of other algorithms. When there is a dependency, the algorithm that is required is listed in column labeled "Dep" (Dependent) in Table 2. EXAMPLE Implementation of TPM_ALG_RSASSA requires that the RSA algorithm be implemented. TPM_ALG_KEYEDHASH and TPM_ALG_NULL are required of all TPM implementations. Table 1 Legend for TPM_ALG_ID Table Column Title Algorithm Name Value Type C Dep Reference Comments Comments the mnemonic name assigned to the algorithm the numeric value assigned to the algorithm The allowed values are: A asymmetric algorithm with a public and private key S symmetric algorithm with only a private key H hash algorithm that compresses input data to a digest value X signing algorithm E an encryption algorithm M a method such as a mask generation function O an object type (Classification) The allowed values are: A Assigned S TCG Standard L TCG Legacy (Dependent) Indicates which other algorithm is required to be implemented if this algorithm is implemented the reference document that defines the algorithm clarifying information Page 4 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
8 Table 2 Definition of (UINT16) TPM_ALG_ID Constants <IN/OUT, S> Family 2.0" Page 5 Level 00 Revision Copyright TCG 2014 April 17, 2014
9 Algorithm Name Value Type Dep C Reference Comments TPM_ALG_ERROR 0x0000 should not occur TPM_ALG_FIRST 0x0001 marker value TPM_ALG_RSA 0x0001 A O A IETF RFC 3447 the RSA algorithm TPM_ALG_SHA 0x0004 H A ISO/IEC the SHA1 algorithm TPM_ALG_SHA1 0x0004 H A ISO/IEC redefinition for documentation consistency TPM_ALG_HMAC 0x0005 H X A ISO/IEC Hash Message Authentication Code (HMAC) algorithm TPM_ALG_AES 0x0006 S A ISO/IEC the AES algorithm with various key sizes TPM_ALG_MGF1 0x0007 H M A IEEE Std 1363 TM IEEE Std 1363a hash-based mask-generation function TPM_ALG_KEYEDHASH 0x0008 H E X O S TCG TPM 2.0 library specification an encryption or signing algorithm using a keyed hash May also refer to a data object that is neither signing nor encrypting TPM_ALG_XOR 0x000A H S A TCG TPM 2.0 library specification the XOR encryption algorithm TPM_ALG_SHA256 0x000B H A ISO/IEC the SHA 256 algorithm TPM_ALG_SHA384 0x000C H A ISO/IEC the SHA 384 algorithm TPM_ALG_SHA512 0x000D H A ISO/IEC the SHA 512 algorithm TPM_ALG_NULL 0x0010 S TCG TPM 2.0 library specification Null algorithm TPM_ALG_SM3_256 0x0012 H A GM/T SM3 hash algorithm TPM_ALG_SM4 0x0013 S A GM/T SM4 symmetric block cipher TPM_ALG_RSASSA 0x0014 A X RSA A IETF RFC 3447 a signature algorithm defined in section 8.2 (RSASSA- PKCS1-v1_5) TPM_ALG_RSAES 0x0015 A E RSA A IETF RFC 3447 a padding algorithm defined in section 7.2 (RSAES- PKCS1-v1_5) TPM_ALG_RSAPSS 0x0016 A X RSA A IETF RFC 3447 a signature algorithm defined in section 8.1 (RSASSA-PSS) TPM_ALG_OAEP 0x0017 A E RSA A IETF RFC 3447 a padding algorithm defined in section 7.1 (RSAES_OAEP) TPM_ALG_ECDSA 0x0018 A X ECC A ISO/IEC signature algorithm using elliptic curve cryptography (ECC) Page 6 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
10 Algorithm Name Value Type Dep C Reference Comments TPM_ALG_ECDH 0x0019 A M ECC A NIST SP800-56A secret sharing using ECC Based on context, this can be either One-Pass Diffie- Hellman, C(1, 1, ECC CDH) defined in or Full Unified Model C(2, 2, ECC CDH) defined in TPM_ALG_ECDAA 0x001A A X ECC A TCG TPM 2.0 library specification elliptic-curve based, anonymous signing scheme TPM_ALG_SM2 0x001B A X E ECC A GM/T GM/T GM/T GM/T TPM_ALG_ECSCHNORR 0x001C A X ECC A TCG TPM 2.0 library specification SM2 depending on context, either an elliptic-curve based, signature algorithm or a key exchange protocol elliptic-curve based Schnorr signature TPM_ALG_ECMQV 0x001D A E ECC A NIST SP800-56A two-phase elliptic-curve key exchange C(2, 2, ECC MQV) section TPM_ALG_KDF1_SP800_56a 0x0020 H M ECC A NIST SP800-56A concatenation key derivation function (approved alternative 1) section TPM_ALG_KDF2 0x0021 H M A IEEE Std 1363a-2004 key derivation function KDF2 section 13.2 TPM_ALG_KDF1_SP800_108 0x0022 H M A NIST SP a key derivation method Section 5.1 KDF in Counter Mode TPM_ALG_ECC 0x0023 A O A ISO/IEC prime field ECC TPM_ALG_SYMCIPHER 0x0025 O A TCG TPM 2.0 library specification the object type for a symmetric block cipher TPM_ALG_CTR 0x0040 S E A ISO/IEC Counter mode if implemented, all symmetric block ciphers (S type) implemented shall be capable of using this mode. TPM_ALG_OFB 0x0041 S E A ISO/IEC Output Feedback mode if implemented, all symmetric block ciphers (S type) implemented shall be capable of using this mode. TPM_ALG_CBC 0x0042 S E A ISO/IEC Cipher Block Chaining mode if implemented, all symmetric block ciphers (S type) implemented shall be capable of using this mode. Family 2.0" Page 7 Level 00 Revision Copyright TCG 2014 April 17, 2014
11 Algorithm Name Value Type Dep C Reference Comments TPM_ALG_CFB 0x0043 S E A ISO/IEC Cipher Feedback mode if implemented, all symmetric block ciphers (S type) implemented shall be capable of using this mode. TPM_ALG_ECB 0x0044 S E A ISO/IEC Electronic Codebook mode if implemented, all symmetric block ciphers (S type) implemented shall be capable of using this mode. TPM_ALG_LAST 0x0044 marker value NOTE This mode is not recommended for uses unless the key is frequently rotated such as in video codecs reserved reserved 0x00C1 through 0x00C6 0x8000 through 0xFFFF 0x00C1 0x00C6 are reserved to prevent any overlap with the command structure tags used in TPM 1.2 reserved for other structure tags Page 8 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
12 5 ECC Values 5.1 Curve ID Values Table 3 is the list of identifiers for TCG-registered curve ID values for elliptic curve cryptography. Table 3 Definition of (UINT16) TPM_ECC_CURVE Constants Name Value Classification Comments TPM_ECC_NONE 0x0000 Assigned TPM_ECC_NIST_P192 0x0001 Assigned TPM_ECC_NIST_P224 0x0002 Assigned TPM_ECC_NIST_P256 0x0003 Assigned TPM_ECC_NIST_P384 0x0004 Assigned TPM_ECC_NIST_P521 0x0005 Assigned TPM_ECC_BN_P256 0x0010 Assigned curve to support ECDAA TPM_ECC_BN_P638 0x0011 Assigned curve to support ECDAA TPM_ECC_SM2_P256 0x0020 Assigned #TPM_RC_CURVE has meaning for TPM 2.0 library specification unmarshaling function Family 2.0" Page 9 Level 00 Revision Copyright TCG 2014 April 17, 2014
13 5.2 Curve Parameters Introduction The tables in this section contain the curve parameter data associated with the curves listed in Table NIST P192 Table 4 Defines for NIST_P192 ECC Values Parameter Value Description curveid TPM_ECC_NIST_P192 identifier for the curve keysize 192 size in bits of the key kdf {TPM_ALG_KDF1_SP800_56a, TPM_ALG_SHA256} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p a b gx {24, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,0xFF, 0xFF}} {24, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC}} {24, {0x64, 0x21, 0x05, 0x19, 0xE5, 0x9C, 0x80, 0xE7, 0x0F, 0xA7, 0xE9, 0xAB, 0x72, 0x24, 0x30, 0x49, 0xFE, 0xB8, 0xDE, 0xEC, 0xC1, 0x46, 0xB9, 0xB1}} {24, {0x18, 0x8D, 0xA8, 0x0E, 0xB0, 0x30, 0x90, 0xF6, 0x7C, 0xBF, 0x20, 0xEB, 0x43, 0xA1, 0x88, 0x00, 0xF4, 0xFF, 0x0A, 0xFD, 0x82, 0xFF, 0x10, 0x12}} gy {24, {0x07, 0x19, 0x2B, 0x95, 0xFFC, 0x8D, 0xA7, 0x86, 0x31, 0x01, 0x1ED, 0x6B, 0x24, 0xCD, 0xD5, 0x73, 0xF9, 0x77, 0xA1, 0x1E, 0x79, 0x48, 0x11}} n {24, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x99, 0xDE, 0xF8, 0x36, 0x14, 0x6B, 0xC9, 0xB1, 0xB4, 0xD2, 0x28, 0x31}} Fp (the modulus) coefficient of the linear term in the constant term for x coordinate of y coordinate of order of G h {1,{1}} cofactor (a size of zero indicates a cofactor of 1) Page 10 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
14 5.2.3 NIST P224 Table 5 Defines for NIST_P224 ECC Values Parameter Value Description curveid TPM_ECC_NIST_P224 identifier for the curve keysize 224 Size in bits of the key kdf {TPM_ALG_KDF1_SP800_56a, TPM_ALG_SHA256} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p a b {28, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }} {28, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE }} {28, {0xB4, 0x05, 0x0A, 0x85, 0x0C, 0x04, 0xB3, 0xAB, 0xF5, 0x41, 0x32, 0x56, 0x50, 0x44, 0xB0, 0xB7, 0xD7, 0xBF, 0xD8, 0xBA, 0x27, 0x0B, 0x39, 0x43, 0x23, 0x55, 0xFF, 0xB4 }} gx {28, {0xB7, 0x0E, 0x0C, 0xBD, 0x6B, 0xB4, 0xBF, 0x7F, 0x32, 0x13, 0x90, 0xB9, 0x4A, 0x03, 0xC1, 0xD3, 0x56, 0xC2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xD6, 0x11, 0x5C, 0x1D, 0x21 }} gy n {28, {0xBD, 0x37, 0x63, 0x88, 0xB5, 0xF7, 0x23, 0xFB, 0x4C, 0x22, 0xDF, 0xE6, 0xCD, 0x43, 0x75, 0xA0, 0x5A, 0x07, 0x47, 0x64, 0x44, 0xD5, 0x81, 0x99, 0x85, 0x00, 0x7E, 0x34 }} {28, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x16, 0xA2, 0xE0, 0xB8, 0xF0, 0x3E, 0x13, 0xDD, 0x29, 0x45, 0x5C, 0x5C, 0x2A, 0x3D }} Fp (the modulus) coefficient of the linear term in the constant term for x coordinate of y coordinate of order of G h {1,{1}} cofactor Family 2.0" Page 11 Level 00 Revision Copyright TCG 2014 April 17, 2014
15 5.2.4 NIST P256 Table 6 Defines for NIST_P256 ECC Values Parameter Value Description curveid TPM_ECC_NIST_P256 identifier for the curve keysize 256 Size in bits of the key kdf {TPM_ALG_KDF1_SP800_56a, TPM_ALG_SHA256} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p {32, {0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }} a {32, {0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }} b gx gy n {32, {0x5A, 0xC6, 0x35, 0xD8, 0xAA, 0x3A, 0x93, 0xE7, 0xB3, 0xEB, 0xBD, 0x55, 0x76, 0x98, 0x86, 0xBC, 0x65, 0x1D, 0x06, 0xB0, 0xCC, 0x53, 0xB0, 0xF6, 0x3B, 0xCE, 0x3C, 0x3E, 0x27, 0xD2, 0x60, 0x4B }} {32, {0x6B, 0x17, 0xD1, 0xF2, 0xE1, 0x2C, 0x42, 0x47, 0xF8, 0xBC, 0xE6, 0xE5, 0x63, 0xA4, 0x40, 0xF2, 0x77, 0x03, 0x7D, 0x81, 0x2D, 0xEB, 0x33, 0xA0, 0xF4, 0xA1, 0x39, 0x45, 0xD8, 0x98, 0xC2, 0x96 }} {32, {0x4F, 0xE3, 0x42, 0xE2, 0xFE, 0x1A, 0x7F, 0x9B, 0x8E, 0xE7, 0xEB, 0x4A, 0x7C, 0x0F, 0x9E, 0x16, 0x2B, 0xCE, 0x33, 0x57, 0x6B, 0x31, 0x5E, 0xCE, 0xCB, 0xB6, 0x40, 0x68, 0x37, 0xBF, 0x51, 0xF5 }} {32, {0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xBC, 0xE6, 0xFA, 0xAD, 0xA7, 0x17, 0x9E, 0x84, 0xF3, 0xB9, 0xCA, 0xC2, 0xFC, 0x63, 0x25, 0x51 }} Fp (the modulus) coefficient of the linear term in the constant term for x coordinate of y coordinate of order of G h {1,{1}} cofactor Page 12 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
16 5.2.5 NIST P384 Table 7 Defines for NIST_P384 ECC Values Parameter Value Description curveid TPM_ECC_NIST_P384 identifier for the curve keysize 384 size in bits of the key kdf {TPM_ALG_KDF1_SP800_56a, TPM_ALG_SHA384} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p a {48, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF }} {48, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFC }} b {48, {0xB3, 0x31, 0x2F, 0xA7, 0xE2, 0x3E, 0xE7, 0xE4, 0x98, 0x8E, 0x05, 0x6B, 0xE3, 0xF8, 0x2D, 0x19, 0x18, 0x1D, 0x9C, 0x6E, 0xFE, 0x81, 0x41, 0x12, 0x03, 0x14, 0x08, 0x8F, 0x50, 0x13, 0x87, 0x5A, 0xC6, 0x56, 0x39, 0x8D, 0x8A, 0x2E, 0xD1, 0x9D, 0x2A, 0x85, 0xC8, 0xED, 0xD3, 0xEC, 0x2A, 0xEF }} gx gy n {48, {0xAA, 0x87, 0xCA, 0x22, 0xBE, 0x8B, 0x05, 0x37, 0x8E, 0xB1, 0xC7, 0x1E, 0xF3, 0x20, 0xAD, 0x74, 0x6E, 0x1D, 0x3B, 0x62, 0x8B, 0xA7, 0x9B, 0x98, 0x59, 0xF7, 0x41, 0xE0, 0x82, 0x54, 0x2A, 0x38, 0x55, 0x02, 0xF2, 0x5D, 0xBF, 0x55, 0x29, 0x6C, 0x3A, 0x54, 0x5E, 0x38, 0x72, 0x76, 0x0A, 0xB7 }} {48, {0x36, 0x17, 0xDE, 0x4A, 0x96, 0x26, 0x2C, 0x6F, 0x5D, 0x9E, 0x98, 0xBF, 0x92, 0x92, 0xDC, 0x29, 0xF8, 0xF4, 0x1D, 0xBD, 0x28, 0x9A, 0x14, 0x7C, 0xE9, 0xDA, 0x31, 0x13, 0xB5, 0xF0, 0xB8, 0xC0, 0x0A, 0x60, 0xB1, 0xCE, 0x1D, 0x7E, 0x81, 0x9D, 0x7A, 0x43, 0x1D, 0x7C, 0x90, 0xEA, 0x0E, 0x5F }} {48, {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC7, 0x63, 0x4D, 0x81, 0xF4, 0x37, 0x2D, 0xDF, 0x58, 0x1A, 0x0D, 0xB2, 0x48, 0xB0, 0xA7, 0x7A, 0xEC, 0xEC, 0x19, 0x6A, 0xCC, 0xC5, 0x29, 0x73 }} Fp (the modulus) coefficient of the linear term in the constant term for x coordinate of y coordinate of order of G h {1,{1}} cofactor Family 2.0" Page 13 Level 00 Revision Copyright TCG 2014 April 17, 2014
17 5.2.6 NIST P521 Table 8 Defines for NIST_P521 ECC Values Parameter Value Description curveid TPM_ECC_NIST_P521 identifier for the curve keysize 521 size in bits of the key kdf {TPM_ALG_KDF1_SP800_56a, TPM_ALG_SHA512} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p {66, {0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, Fp (the modulus) 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }} a b gx gy n {66, {0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }} {66, {0x00, 0x51, 0x95, 0x3E, 0xB9, 0x61, 0x8E, 0x1C, 0x9A, 0x1F, 0x92, 0x9A, 0x21, 0xA0, 0xB6, 0x85, 0x40, 0xEE, 0xA2, 0xDA, 0x72, 0x5B, 0x99, 0xB3, 0x15, 0xF3, 0xB8, 0xB4, 0x89, 0x91, 0x8E, 0xF1, 0x09, 0xE1, 0x56, 0x19, 0x39, 0x51, 0xEC, 0x7E, 0x93, 0x7B, 0x16, 0x52, 0xC0, 0xBD, 0x3B, 0xB1, 0xBF, 0x07, 0x35, 0x73, 0xDF, 0x88, 0x3D, 0x2C, 0x34, 0xF1, 0xEF, 0x45, 0x1F, 0xD4, 0x6B, 0x50, 0x3F, 0x00 }} {66, {0x00, 0xC6, 0x85, 0x8E, 0x06, 0xB7, 0x04, 0x04, 0xE9, 0xCD, 0x9E, 0x3E, 0xCB, 0x66, 0x23, 0x95, 0xB4, 0x42, 0x9C, 0x64, 0x81, 0x39, 0x05, 0x3F, 0xB5, 0x21, 0xF8, 0x28, 0xAF, 0x60, 0x6B, 0x4D, 0x3D, 0xBA, 0xA1, 0x4B, 0x5E, 0x77, 0xEF, 0xE7, 0x59, 0x28, 0xFE, 0x1D, 0xC1, 0x27, 0xA2, 0xFF, 0xA8, 0xDE, 0x33, 0x48, 0xB3, 0xC1, 0x85, 0x6A, 0x42, 0x9B, 0xF9, 0x7E, 0x7E, 0x31, 0xC2, 0xE5, 0xBD, 0x66 }} {66, {0x01, 0x18, 0x39, 0x29, 0x6A, 0x78, 0x9A, 0x3B, 0xC0, 0x04, 0x5C, 0x8A, 0x5F, 0xB4, 0x2C, 0x7D, 0x1B, 0xD9, 0x98, 0xF5, 0x44, 0x49, 0x57, 0x9B, 0x44, 0x68, 0x17, 0xAF, 0xBD, 0x17, 0x27, 0x3E, 0x66, 0x2C, 0x97, 0xEE, 0x72, 0x99, 0x5E, 0xF4, 0x26, 0x40, 0xC5, 0x50, 0xB9, 0x01, 0x3F, 0xAD, 0x07, 0x61, 0x35, 0x3C, 0x70, 0x86, 0xA2, 0x72, 0xC2, 0x40, 0x88, 0xBE, 0x94, 0x76, 0x9F, 0xD1, 0x66, 0x50 }} {66, {0x01, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFA, 0x51, 0x86, 0x87, 0x83, 0xBF, 0x2F, 0x96, 0x6B, 0x7F, 0xCC, 0x01, 0x48, 0xF7, 0x09, 0xA5, 0xD0, 0x3B, 0xB5, 0xC9, 0xB8, 0x89, 0x9C, 0x47, 0xAE, 0xBB, 0x6F, 0xB7, 0x1E, 0x91, 0x38, 0x64, 0x09 }} coefficient of the linear term in the constant term for x coordinate of y coordinate of order of G h {1,{1}} cofactor Page 14 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
18 5.2.7 BN P256 Table 9 Defines for BN_P256 ECC Values Parameter Value Description curveid TPM_ECC_BN_P256 identifier for the curve keysize 256 size in bits of the key kdf {TPM_ALG_NULL, TPM_ALG_NULL} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p {32, {0xFF, 0XFF, 0XFF, 0XFF, 0XFF, 0XFC, 0XF0, 0XCD, 0X46, 0XE5, 0XF2, 0X5E, 0XEE, 0X71, 0XA4, 0X9F, 0X0C, 0XDC, 0X65, 0XFB, 0X12, 0X98, 0X0A, 0X82, 0XD3, 0X29, 0X2D, 0XDB, 0XAE, 0XD3, 0X30, 0X13 }} Fp (the modulus) a {1,{0}} coefficient of the linear term in the b {1,{3}} constant term for gx {1,{1}} x coordinate of gy {1,{2}}; y coordinate of n {32, {0xFF, 0XFF, 0XFF, 0XFF, 0XFF, 0XFC, 0XF0, 0XCD, 0X46, 0XE5, 0XF2, 0X5E, 0XEE, 0X71, 0XA4, 0X9E, 0X0C, 0XDC, 0X65, 0XFB, 0X12, 0X99, 0X92, 0X1A, 0XF6, 0X2D, 0X53, 0X6C, 0XD1, 0X0B, 0X50, 0X0D }} order of G h {1,{1}} cofactor Family 2.0" Page 15 Level 00 Revision Copyright TCG 2014 April 17, 2014
19 5.2.8 BN P638 Table 10 Defines for BN_P638 ECC Values Parameter Value Description curveid TPM_ECC_BN_P638 identifier for the curve keysize 638 size in bits of the key kdf {TPM_ALG_NULL, TPM_ALG_NULL} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p {80, {0x23, 0xFF, 0xFF, 0xFD, 0xC0, 0x00, 0x00, 0x0D, 0x7F, 0xFF, 0xFF, 0xB8, 0x00, 0x00, 0x01, 0xD3, 0xFF, 0xFF, 0xF9, 0x42, 0xD0, 0x00, 0x16, 0x5E, 0x3F, 0xFF, 0x94, 0x87, 0x00, 0x00, 0xD5, 0x2F, 0xFF, 0xFD, 0xD0, 0xE0, 0x00, 0x08, 0xDE, 0x55, 0xC0, 0x00, 0x86, 0x52, 0x00, 0x21, 0xE5, 0x5B, 0xFF, 0xFF, 0xF5, 0x1F, 0xFF, 0xF4, 0xEB, 0x80, 0x00, 0x00, 0x00, 0x4C, 0x80, 0x01, 0x5A, 0xCD, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xEC, 0xE0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x67 }} Fp (the modulus) a {1,{0}} coefficient of the linear term in the b {2,{0x01, 0x01}} constant term for gx {80, {0x23, 0xFF, 0xFF, 0xFD, 0xC0, 0x00, 0x00, 0x0D, 0x7F, 0xFF, 0xFF, 0xB8, 0x00, 0x00, 0x01, 0xD3, 0xFF, 0xFF, 0xF9, 0x42, 0xD0, 0x00, 0x16, 0x5E, 0x3F, 0xFF, 0x94, 0x87, 0x00, 0x00, 0xD5, 0x2F, 0xFF, 0xFD, 0xD0, 0xE0, 0x00, 0x08, 0xDE, 0x55, 0xC0, 0x00, 0x86, 0x52, 0x00, 0x21, 0xE5, 0x5B, 0xFF, 0xFF, 0xF5, 0x1F, 0xFF, 0xF4, 0xEB, 0x80, 0x00, 0x00, 0x00, 0x4C, 0x80, 0x01, 0x5A, 0xCD, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xEC, 0xE0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x66 }} x coordinate of gy {1,{0x10}} y coordinate of n {80, {0x23, 0xFF, 0xFF, 0xFD, 0xC0, 0x00, 0x00, 0x0D, 0x7F, 0xFF, 0xFF, 0xB8, 0x00, 0x00, 0x01, 0xD3, 0xFF, 0xFF, 0xF9, 0x42, 0xD0, 0x00, 0x16, 0x5E, 0x3F, 0xFF, 0x94, 0x87, 0x00, 0x00, 0xD5, 0x2F, 0xFF, 0xFD, 0xD0, 0xE0, 0x00, 0x08, 0xDE, 0x55, 0x60, 0x00, 0x86, 0x55, 0x00, 0x21, 0xE5, 0x55, 0xFF, 0xFF, 0xF5, 0x4F, 0xFF, 0xF4, 0xEA, 0xC0, 0x00, 0x00, 0x00, 0x49, 0x80, 0x01, 0x54, 0xD9, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xED, 0xA0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x61 }} order of G h {1,{1}} cofactor Page 16 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
20 5.2.9 SM2_P256 Table 11 Defines for SM2_P256 ECC Values Parameter Value Description curveid TPM_ECC_SM2_P256 identifier for the curve keysize 256 size in bits of the key kdf {TPM_ALG_KDF1_SP800_56a, TPM_ALG_SM3_256} the default KDF and hash sign {TPM_ALG_NULL, TPM_ALG_NULL} mandarory signing scheme p a b gx {32, {0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }} {32, {0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFC }} {32, {0x28, 0xE9, 0xFA, 0x9E, 0x9D, 0x9F, 0x5E, 0x34, 0x4D, 0x5A, 0x9E, 0x4B, 0xCF, 0x65, 0x09, 0xA7, 0xF3, 0x97, 0x89, 0xF5, 0x15, 0xAB, 0x8F, 0x92, 0xDD, 0xBC, 0xBD, 0x41, 0x4D, 0x94, 0x0E, 0x93 }} {32, {0x32, 0xC4, 0xAE, 0x2C, 0x1F, 0x19, 0x81, 0x19, 0x5F, 0x99, 0x04, 0x46, 0x6A, 0x39, 0xC9, 0x94, 0x8F, 0xE3, 0x0B, 0xBF, 0xF2, 0x66, 0x0B, 0xE1, 0x71, 0x5A, 0x45, 0x89, 0x33, 0x4C, 0x74, 0xC7 }} gy {32, {0xBC, 0x37, 0x36, 0xA2, 0xF4, 0xF6, 0x77, 0x9C, 0x59, 0xBD, 0xCE, 0xE3, 0x6B, 0x69, 0x21, 0x53, 0xD0, 0xA9, 0x87, 0x7C, 0xC6, 0x2A, 0x47, 0x40, 0x02, 0xDF, 0x32, 0xE5, 0x21, 0x39, 0xF0, 0xA0 }} n {32, {0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x72, 0x03, 0xDF, 0x6B, 0x21, 0xC6, 0x05, 0x2B, 0x53, 0xBB, 0xF4, 0x09, 0x39, 0xD5, 0x41, 0x23 }} Fp (the modulus) coefficient of the linear term in the constant term for x coordinate of y coordinate of order of G h {1,{1}} cofactor Family 2.0" Page 17 Level 00 Revision Copyright TCG 2014 April 17, 2014
21 6 Hash Parameters 6.1 Introduction The tables in this clause define the basic parameters associated with the TCG-registered hash algorithms listed in Table SHA1 Table 12 Defines for SHA1 Hash Values Parameter Value Description alg TPM_ALG_SHA1 hash algorithm ID digestsize 20 size of digest in octets blocksize 64 size of hash block in octets dersize 15 size of the DER in octets der 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02, 0x1A, 0x05, 0x00, 0x04, 0x14 the DER 6.3 SHA256 Table 13 Defines for SHA256 Hash Values Parameter Value Description alg TPM_ALG_SHA256 hash algorithm ID digestsize 32 size of digest blocksize 64 size of hash block dersize 19 size of the DER in octets der 0x30, 0x31, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20 the DER 6.4 SHA384 Table 14 Defines for SHA384 Hash Values Parameter Value Description alg TPM_ALG_SHA384 hash algorithm ID digestsize 48 size of digest in octets blocksize 128 size of hash block in octets dersize 19 size of the DER in octets der 0x30, 0x41, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30 the DER Page 18 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
22 6.5 SHA512 Table 15 Defines for SHA512 Hash Values Name Value Description alg TPM_ALG_SHA512 hash algorithm ID digestsize 64 size of digest in octets blocksize 128 size of hash block in octets dersize 19 size of the DER in octets der 0x30, 0x51, 0x30, 0x0d, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40 the DER 6.6 SM3_256 Table 16 Defines for SM3_256 Hash Values Name Value Description alg TPM_ALG_SM3_256 hash algorithm ID digestsize 32 size of digest in octets blocksize 64 size of hash block in octets dersize 18 size of the DER in octets der 0x30, 0x30, 0x30, 0x0c, 0x06, 0x08, 0x2A, 0x81, 0x1C, 0x81, 0x45, 0x01, 0x83, 0x11, 0x05, 0x00, 0x04, 0x20 the DER Family 2.0" Page 19 Level 00 Revision Copyright TCG 2014 April 17, 2014
23 7 Symmetric Block Cipher Parameters 7.1 Introduction The tables in this section define the parameters for each of the TCG-registered block ciphers listed in Table AES Table 17 Defines for AES Symmetric Cipher Algorithm Constants Key Size in Bits Block Size in Bits Rounds Comments the AES block size is the same for all key sizes SM3 Table 18 Defines for SM3 Symmetric Cipher Algorithm Constants Key Size in Bits Block Size in Bits Rounds Comments Page 20 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
24 8 Applicability of this Registry for Other TCG Specifications As a best practice, TCG specifications that have a dependency on this registry will reference it. To assist readers in understanding what TCG specifications contain cryptographic algorithms, but do not reference this registry, the TCG maintains the list in Table 19. For example, for historical reasons, the TPM Main Specifications for TPM version 1.2 did not reference the registry because they were published before it. # TCG Specification Table 19 TCG specifications that do not reference this registry 1 BSI-CC-PP for PC Client Specific Trusted Platform Module Family 1.2; Level 2 Version 1.1 (Part A) 2 BSI-CC-PP for PC Client Specific Trusted Platform Module Family 1.2; Level 2 Version 1.1 (Part B) 3 Infrastructure Work Group Integrity Report Schema Specification, Version Infrastructure Work Group Reference Architecture for Interoperability Specification (Part 1), Version Infrastructure Work Group Reference Manifest (RM) Schema Specification, Version Infrastructure Work Group Security Qualities Schema Specification Version 1.0, Revision Infrastructure Work Group Security Qualities Schema Specification Version 1.1, Revision Infrastructure Work Group TCG Credential Profiles Specification Version 1.0, Revision Infrastructure Work Group TCG Credential Profiles Specification Version 1.1, Revision Infrastructure Work Group Verification Result Schema Specification, Version TCG Infrastructure Working Group Core Integrity Schema Specification 12 Infrastructure Work Group Architecture Part II - Integrity Management, Version Infrastructure Work Group Core Integrity Schema Specification, Version Infrastructure Work Group Platform Trust Services Interface Specification (IF-PTS) Version 1.0 (PDF) 15 Infrastructure Work Group Simple Object Schema Specification, Version Infrastructure Work Group Subject Key Attestation Evidence Extension, Version Mobile Phone Work Group Mobile Reference Architecture 18 Mobile Phone Work Group Mobile Trusted Module Specification, Version Mobile Phone Work Group Mobile Trusted Module Specification, Version 1.0, Revision PC Client Work Group EFI Platform Specification, Version PC Client Work Group EFI Protocol Specification, Version PC Client Work Group PC Specific Implementation Specification, Version PC Client Work Group Specific Implementation Specification for Conventional Bios, Version PC Client Work Group Specific Implementation Specification for Conventional Bios, Version 1.21 Errata, Revision 1.00 for TPM Family 1.2; Level 2 25 Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2; Level 2 Revision 116 Version: Server Work Group Itanium Architecture Based Server Specification, Version 1.0 Family 2.0" Page 21 Level 00 Revision Copyright TCG 2014 April 17, 2014
25 # TCG Specification 27 Storage Work Group Storage Security Subsystem Class: Enterprise Specification Version 1.00 Final, Revision Storage Work Group Storage Security Subsystem Class: Enterprise, Version 1.0, Revision 3.00 and Storage Work Group Storage Security Subsystem Class: Opal, Version 1.00 Final, Revision 1.00 to Storage Work Group Storage Security Subsystem Class: Opal, Version 2.00 Final, Revision Storage Work Group Storage Security Subsystem Class: Optical, Version TCG Attestation PTS Protocol: Binding to TNC IF-M, Version 1.0, Revision TCG Infrastructure Working Group A CMC Profile for AIK Certificate Enrollment, Version 1.0, Revision 7 34 TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification 35 TCG Software Stack (TSS) Specification Version TCG Software Stack (TSS) Specification Version TCG Software Stack (TSS) Specification, Version 1.2, Errata A 38 TCG Storage Architecture Core Specification, Version 1.00, Revision TCG Storage Architecture Core Specification, Version 2.00, Revision 1.00 and TCG Storage Opal SSC Feature Set: Single User Mode Specification, Version 1.00, Revision TNC IF-T Binding to TLS Version 1.0, Revision TNC IF-T Binding to TLS Version 2.0, Revision 7 43 TPM Main Specification Level 2 Version 1.2, all revisions Page 22 Family 2.0" April 17, 2014 Copyright TCG 2014 Level 00 Revision 01.15
Fault attack on the DVB Common Scrambling Algorithm
Fault attack on the DVB Common Scrambling Algorithm Kai Wirt Technical University Darmstadt Department of Computer Science Darmstadt, Germany [email protected] Abstract. The Common Scrambling
Soft-Starter SSW-06 V1.6X
Motors Energy Automation Coatings Soft-Starter SSW-06 V1.6X Serial Communication Manual Language: English Document: 0899.5731 / 04 Serial Communication Manual Series: SSW-06 V1.6X Language: English Document
CTNET Field Protocol Specification November 19, 1997 DRAFT
CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol
Security of EnOcean Radio Networks
V1.9 / Page 1 / 37 V1.1 Content 1... 6 1.1 Terms & Abbreviations... 6 2 Introduction... 6 3 Scenarios... 6 3.1 Attacker scenarios... 7 3.2 System Architecture... 10 4 Specification... 10 4.1 Security for
CMUX User Guide 30268ST10299A Rev. 3 19/01/09
This document is referred to the following products: APPLICABILITY TABLE PRODUCT PART NUMBER (1) GT864-QUAD 4990150069 GT864-PY 4990150070 GM862-GPS GM862-QUAD-PY GM862-QUAD GC864-QUAD GC864-PY GC864-QUAD-C2
On the Security of Digital Video Broadcast Encryption
On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis Ruhr-Universität Bochum Chair for Communication Security (COSY) Prof. Dr.-Ing. Christof Paar Dipl.-Inf.
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
TCG. TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC. Specification Version 1.00 Final Revision 1.
TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC Specification Version 1.00 Final Revision 1.00 December 21, 2009. Contacts: [email protected] TCG Copyright
Network Configuration Example
Network Configuration Example OSPF Version 3 for IPv6 Feature Guide Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
TCG. Trusted Platform Module Library Part 2: Structures. TCG Published. Family 2.0. Level 00 Revision 01.16. October 30, 2014.
Family 2.0 Level 00 Revision 01.16 October 30, 2014 Published Contact: [email protected] TCG Published Copyright TCG 2006-2014 TCG Licenses and Notices 1. Copyright Licenses: Trusted Computing
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
APC APPLICATION NOTE #156
#156 StruxureWare Data Center Expert v7.2.0 Building Management System Integration By Kevin Kosko Abstract Building Management Systems (BMS) are implemented in a building's infrastructure to collect data
Dialogic DSI Protocol Stacks MAP Programmer's Manual
Dialogic DSI Protocol Stacks MAP Programmer's Manual April 2015 U14SSS www.dialogic.com Section 1 Introduction Copyright and Legal Notice Copyright 1997-2015 Dialogic Corporation. All Rights Reserved.
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-56C Recommendation for Key Derivation through Extraction-then-Expansion Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
NIST Special Publication 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Elaine Barker, Don Johnson, and Miles Smid C O M P U T E R S E C
Brunata Optuna W (171)
Brunata Optuna W (171) Communication description Edition 1.1 UK-QB101414 / 26.02.2013 Brunata a/s is a Danish owned company. We have more than 90 years of experience within developing and producing meters,
Command Param1 Param2 Return1 Return2 Description. 0xE9 0..0x7F (id) speed pos_high pos_low Set servo #id speed & read position
set Description 0..0x7F (id) Set servo #id target position 0xE1 Read EEPROM 0xE2 Write EEPROM 0xE3 Read memory 0xE4 Write memory 0xE5 Read position 0xE6 Set target position 0xE7 version id Read version
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
ANR INSTRUCTION MANUAL ELECTRICAL MULTIFUNCTION ANALYZER RECORDER COMMUNICATION PROTOCOL. ASCII standard ANR MODBUS-RTU
INSTRUCTION MANUAL IM145-U-A v5.8 ANR ELECTRICAL MULTIFUNCTION ANALYZER RECORDER COMMUNICATION PROTOCOL ASCII standard ANR MODBUS-RTU INSTRUCTION MANUAL IM 145-U-A v. 5.8 Firmware Vers. X.11.1E ANR protocol
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
TLS Specification for Storage Systems
TLS Specification for Storage Systems ABSTRACT: This document specifies the requirements and guidance for use of the Transport Layer Security (TLS) protocol in conjunction with data storage technologies.
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
CA DLP. Release Notes for Advanced Encryption. r12.0
CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
Apple Cryptographic Service Provider Functional Specification
Apple Cryptographic Service Provider Functional Specification apple 2005-03-10 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored
Suite B Implementer s Guide to NIST SP 800-56A July 28, 2009
1. Introduction Suite B Implementer s Guide to NIST SP 800-56A July 28, 2009 This document specifies the Elliptic Curve Diffie-Hellman (ECDH) key-agreement schemes from NIST SP 800-56A: Recommendation
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Security Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Intel NetStructure SS7 Protocols SCCP Sub-System Monitor (SSM) User Guide. Document Reference: U28SSS
Intel NetStructure SS7 Protocols SCCP Sub-System Monitor (SSM) User Guide Document Reference: U28SSS Disclaimer The product may contain design defects or errors known as errata, which may cause the product
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
Encryption Key Management for Microsoft SQL Server 2008/2014
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Intel EP80579 Software for Security Applications on Intel QuickAssist Technology Cryptographic API Reference
Intel EP80579 Software for Security Applications on Intel QuickAssist Technology Cryptographic API Reference Automatically generated from sources, May 19, 2009. Reference Number: 320184, Revision -003
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
A Survey of the Elliptic Curve Integrated Encryption Scheme
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract
Hierarchies. Three Persistent Hierarchies. Chapter 9
Chapter 9 Hierarchies A hierarchy is a collection of entities that are related and managed as a group. Those entities include permanent objects (the hierarchy handles), primary objects at the root of a
A Java implementation of the Elliptic Curve Integrated Encryption Scheme
A Java implementation of the Elliptic Curve Integrated Encryption Scheme V. Gayoso Martínez 1, L. Hernández Encinas 1, and C. Sánchez Ávila 2 1 Department of Information Processing and Coding Institute
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America
On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724 United States of America Website: http://www.on-core.com Technical Support: [email protected] Information: [email protected] Phone: (732)
IDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
Secure Device Identity Tutorial
Mike Borza John Viega with Charles Qi Karen Zelenko 2005-07-18 Page 1 Agenda Secure Device Identity 100,000 foot view The 5 criteria The 10,000 foot view Related technologies Related presentations Charles
The Keyed-Hash Message Authentication Code (HMAC)
FIPS PUB 198-1 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory
ONLINEHELP. Flexi Soft RK512. RK512 Telegram-Listing. RK512 Telegram-Listing
ONLINEHELP Flexi Soft RK512 RK512 Telegram-Listing RK512 Telegram-Listing GB This document is protected by the law of copyright, whereby all rights established therein remain with the company SICK AG.
OCRA Validation Server Profile
OCRA Validation Server Profile Version 1.0 Feb. 22, 2013 Page 1 of 18 1 Overview This document defines the technical requirements for compliance with an OCRA Validation Server profile for OATH Certification.
AN730. CRC Generating and Checking INTRODUCTION THEORY OF OPERATION EXAMPLE 1: MODULO-2 CALCULATION. Example Calculation. Microchip Technology Inc.
CRC Generating and Checking AN730 Authors: Thomas Schmidt INTRODUCTION This application note describes the Cyclic Redundancy Check (CRC) theory and implementation. The CRC check is used to detect errors
Tamper protection with Bankgirot HMAC Technical Specification
Mars 2014 Tamper protection with Bankgirot HMAC Technical Specification Bankgirocentralen BGC AB 2013. All rights reserved. www.bankgirot.se Innehåll 1 General...3 2 Tamper protection with HMAC-SHA256-128...3
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:
Designing Hash functions and message authentication codes Reviewing... We have seen how to authenticate messages: Using symmetric encryption, in an heuristic fashion Using public-key encryption in interactive
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
BlackBerry Enterprise Server Express for IBM Domino. October 7, 2014 Version: 5.0 Service Pack: 4. Compatibility Matrix
BlackBerry Enterprise Server Express for IBM Domino October 7, 2014 Version: 5.0 Service Pack: 4 Compatibility Matrix Published: 2014-10-08 SWD-20141008134243982 Contents 1...4 Legend... 4 Operating system...
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Wireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
PSM/SAK Event Log Error Codes
PSM Error Codes PSM/SAK Event Log Error Codes If you experience a problem using Persistent Storage Manager, the following list of event log messages can be used to troubleshoot. Error codes are logged
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
Dialogic SS7 Protocols SCCP Sub-System Monitor (SSM) User Guide. Document Reference U28SSS
Dialogic SS7 Protocols SCCP Sub-System Monitor (SSM) User Guide Document Reference U28SSS Section 1 Introduction Copyright 2005-2007 Dialogic Corporation. All Rights Reserved. You may not reproduce this
HDMI Matrix Switch USER MANUAL VM0404H
HDMI Matrix Switch USER MANUAL VM0404H FCC Information This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
CCNP CISCO CERTIFIED NETWORK PROFESSIONAL LAB MANUAL
CCNP CISCO CERTIFIED NETWORK PROFESSIONAL LAB MANUAL VER 2.0 Page 1 of 315 ACKNOWLEDGEMENT We can write a 1000 page book, but we can t find enough words to describe the credit Mr. Siddiq Ahmed deserves
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
Opal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
Security Protocols and Infrastructures. h_da, Winter Term 2011/2012
Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation Elaine Barker Allen Roginsky http://dx.doi.org/10.6028/nist.sp.800-133 C O M P U T E R S E C U R I T Y NIST Special Publication
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
CSEE 4840. 128-bit AES decryption
CSEE 4840 Project Report May 2008 CSEE 4840 128-bit AES decryption Shrivathsa Bhargav Larry Chen Abhinandan Majumdar Shiva Ramudit CSEE 4840 Embedded System Design Spring 2008, Columbia University 128-bit
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
RSA Two Factor Authentication
RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..
