Release 10.1A: OpenEdge Getting Started:
Core Business Services
Encryption/decryption algorithms
The encryption/decryption algorithms vary in complexity and speed and rely on iterative applications of Exclusive OR (XOR) on various combinations of key and data. This range of complexity and speed make symmetric key algorithms a common choice for providing data privacy and authentication services. Three common algorithms, listed in increasing order of strength, are:
The same three algorithms listed in generally increasing order of speed are:
Variations of these algorithms exist. One of them, AES, supports different key sizes, such as 128 or 256 bits. Variations also exist for different modes of operation (modes). A mode is a kind of companion algorithm that tailors the symmetric-key algorithm for different applications, such as confidentiality or authentication. For example, one of several confidentiality modes is CBC.
In the Progress 4GL, symmetric-key algorithms are identified by the three components of their supported variations:
algorithm_mode_keysize. So, for example, one of the supported symmetric-key algorithms is identified by the string"AES_CBC_128", which specifies the AES symmetric-key algorithm combined with the CBC mode using a 128-bit key size.
|
Copyright © 2005 Progress Software Corporation www.progress.com Voice: (781) 280-4000 Fax: (781) 280-4095 |