Overview of Using Cryptography Extensions
Security and cryptography classes are supported by the RI (cref). The support for security and cryptography enables you to:
Generate message digests using the
SHA1algorithmGenerate cryptographic keys on Java Card technology-compliant smart cards for use in the
ECCandRSAalgorithmsSet cryptographic keys on Java Card technology-compliant smart cards for use in the
AES,DES,3DES,ECC, andRSAalgorithmsEncrypt and decrypt data with the keys using the
AES,DES,3DES, andRSAalgorithmsGenerate signatures using the
AES,DES,3DES,ECC, orSHAandRSAalgorithmsGenerate sequences of random bytes
Generate checksums
Use part of a message as padding in a signature block
For more information on the SHA1, DES, 3DES, and RSA encryption schemes, see:
For
SHA1—"Secure Hash Standard", FIPS Publication 180-1:http://www.itl.nist.govFor
DES—"Data Encryption Standard (DES)", FIPS Publication 46-2 and "DES Modes of Operation", FIPS Publication 81:http://www.itl.nist.govFor
RSA—"RSAES-OAEP (Optimal Asymmetric Encryption Padding) Encryption Scheme":http://www.emc.comFor
AES—"Advanced Encryption Standard (AES)" FIPs Publication 197:http://www.itl.nist.govFor
ECC—"Public Key Cryptography for the Financial Industry: The Elliptic Curve Digital Signature Algorithm" (ECDSA) X9.62-1998:http://www.x9.orgFor Checksum—"Information technology—Telecommunications and information exchange between systems—High-level data link control (HDLC) procedures" ISO/IEC-13239:2002 (replaces ISO-3309):
http://www.iso.org

