Overview of Using Cryptography Extensions
Security and cryptography classes are supported by the RI (cref
). The support for security and cryptography enables you to:
Generate message digests using the
SHA1
algorithmGenerate cryptographic keys on Java Card technology-compliant smart cards for use in the
ECC
andRSA
algorithmsSet cryptographic keys on Java Card technology-compliant smart cards for use in the
AES
,DES
,3DES
,ECC
, andRSA
algorithmsEncrypt and decrypt data with the keys using the
AES
,DES
,3DES
, andRSA
algorithmsGenerate signatures using the
AES
,DES
,3DES
,ECC
, orSHA
andRSA
algorithmsGenerate sequences of random bytes
Generate checksums
Use part of a message as padding in a signature block
For more information on the SHA1
, DES
, 3DES
, and RSA
encryption schemes, see:
For
SHA1
—"Secure Hash Standard", FIPS Publication 180-1:http://www.itl.nist.gov
For
DES
—"Data Encryption Standard (DES)", FIPS Publication 46-2 and "DES Modes of Operation", FIPS Publication 81:http://www.itl.nist.gov
For
RSA
—"RSAES-OAEP (Optimal Asymmetric Encryption Padding) Encryption Scheme":http://www.emc.com
For
AES
—"Advanced Encryption Standard (AES)" FIPs Publication 197:http://www.itl.nist.gov
For
ECC
—"Public Key Cryptography for the Financial Industry: The Elliptic Curve Digital Signature Algorithm" (ECDSA) X9.62-1998:http://www.x9.org
For Checksum—"Information technology—Telecommunications and information exchange between systems—High-level data link control (HDLC) procedures" ISO/IEC-13239:2002 (replaces ISO-3309):
http://www.iso.org