Release 10.1A: OpenEdge Getting Started:
Core Business Services
PBE algorithms
PBE is typically implemented using standard hashing algorithms, such as the PKCS#5 standard of RFC2898. These algorithms often use a built-in key to encrypt a password and might also allow the addition of an auxiliary key (a PBE salt) to strengthen the encryption.
|
Copyright © 2005 Progress Software Corporation www.progress.com Voice: (781) 280-4000 Fax: (781) 280-4095 |