免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 593 | 回复: 0
打印 上一主题 下一主题

15.Cryptographic options [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2006-07-07 22:27 |只看该作者 |倒序浏览

       
       
       
       
       
       
       
       
  • Cryptographic
            options
           
           
  • Cryptographic
                    API
           
    This
    option provides the core Cryptographic API.
  • HMAC
                            support
                           
                   
    HMAC:
    Keyed-Hashing for Message Authentication (RFC2104).
    This
    is required for IPSec.
  • Null
                            algorithms
                           
                   
    These
    are 'Null' algorithms, used by IPsec, which do nothing.
  • MD4
                            digest algorithm
                   
    MD4
    message digest algorithm (RFC1320).
  • MD5
                            digest algorithm
                   
    MD5
    message digest algorithm (RFC1321).
  • SHA1
                            digest algorithm
                           
                   
    SHA-1
    secure hash standard (FIPS 180-1/DFIPS 180-2).
  • SHA256
                            digest algorithm
                   
    SHA256
    secure hash standard (DFIPS 180-2).
    This
    version of SHA implements a 256 bit hash with 128 bits of
    security
    against collision attacks.
  • SHA384
                            and SHA512 digest algorithms
                   
    SHA512
    secure hash standard (DFIPS 180-2).
    This
    version of SHA implements a 512 bit hash with 256 bits of
    security
    against collision attacks.
    This
    code also includes SHA-384, a 384 bit hash with 192 bits
    of
    security against collision attacks.
  • Whirlpool
                            digest algorithms
                   
    Whirlpool
    hash algorithm 512, 384 and 256-bit hashes
    Whirlpool-512
    is part of the NESSIE cryptographic primitives.
    Whirlpool
    will be part of the ISO/IEC 10118-3:2003(E) standard
    See
    also:
  • Tiger
                            digest algorithms
                   
    Tiger
    hash algorithm 192, 160 and 128-bit hashes
    Tiger
    is a hash function optimized for 64-bit processors while
    still
    having decent performance on 32-bit processors.
    Tiger
    was developed by Ross Anderson and Eli Biham.
    See
    also:
    .
  • DES
                            and Triple DES EDE cipher algorithms
                   
    DES
    cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
  • Blowfish
                            cipher algorithm
                   
    Blowfish
    cipher algorithm, by Bruce Schneier.
    This
    is a variable key length cipher which can use keys from 32
    bits
    to 448 bits in length.  It's fast, simple and specifically
    designed
    for use on "large microprocessors".
    See
    also:
  • Twofish
                            cipher algorithm
                   
    Twofish
    cipher algorithm.
    Twofish
    was submitted as an AES (Advanced Encryption Standard)
    candidate
    cipher by researchers at CounterPane Systems.  It is a
    16
    round block cipher supporting key sizes of 128, 192, and 256
    [color="#008080"]bits.
    See
    also:
  • Serpent
                            cipher algorithm
                   
    Serpent
    cipher algorithm, by Anderson, Biham & Knudsen.
    Keys
    are allowed to be from 0 to 256 bits in length, in steps
    of
    8 bits.  Also includes the 'Tnepres' algorithm, a reversed
    variant
    of Serpent for compatibility with old kerneli code.
    See
    also:
  • AES
                            cipher algorithms
                           
                   
    AES
    cipher algorithms (FIPS-197). AES uses the Rijndael
    [color="#008080"]algorithm.
    Rijndael
    appears to be consistently a very good performer in
    both
    hardware and software across a wide range of computing
    environments
    regardless of its use in feedback or non-feedback
    modes.
    Its key setup time is excellent, and its key agility is
    good.
    Rijndael's very low memory requirements make it very well
    suited
    for restricted-space environments, in which it also
    demonstrates
    excellent performance. Rijndael's operations are
    among
    the easiest to defend against power and timing attacks.       
    The
    AES specifies three key sizes: 128, 192 and 256 bits          
    See
    for more information.
  • AES
                            cipher algorithms (i586)
                   
    AES
    cipher algorithms (FIPS-197). AES uses the Rijndael
    [color="#008080"]algorithm.
    Rijndael
    appears to be consistently a very good performer in
    both
    hardware and software across a wide range of computing
    environments
    regardless of its use in feedback or non-feedback
    modes.
    Its key setup time is excellent, and its key agility is
    good.
    Rijndael's very low memory requirements make it very well
    suited
    for restricted-space environments, in which it also
    demonstrates
    excellent performance. Rijndael's operations are
    among
    the easiest to defend against power and timing attacks.       
    The
    AES specifies three key sizes: 128, 192 and 256 bits          
    See
    for more information.
  • CAST5
                            (CAST-128) cipher algorithm
                   
    The
    CAST5 encryption algorithm (synonymous with CAST-128) is
    described
    in RFC2144.
  • CAST6
                            (CAST-256) cipher algorithm
                   
    The
    CAST6 encryption algorithm (synonymous with CAST-256) is
    described
    in RFC2612.
  • TEA,
                            XTEA and XETA cipher algorithms
                           
                   
    TEA
    cipher algorithm.
    Tiny
    Encryption Algorithm is a simple cipher that uses
    many
    rounds for security.  It is very fast and uses
    little
    memory.
    Xtendend
    Tiny Encryption Algorithm is a modification to
    the
    TEA algorithm to address a potential key weakness
    in
    the TEA algorithm.
    Xtendend
    Encryption Tiny Algorithm is a mis-implementation
    of
    the XTEA algorithm for compatibility purposes.
  • ARC4
                            cipher algorithm
                   
    ARC4
    cipher algorithm.
    ARC4
    is a stream cipher using keys ranging from 8 bits to 2048
    bits
    in length.  This algorithm is required for driver-based
    WEP,
    but it should not be for other purposes because of the
    weakness
    of the algorithm.
  • Khazad
                            cipher algorithm
                           
                   
    Khazad
    cipher algorithm.
    Khazad
    was a finalist in the initial NESSIE competition.  It is
    an
    algorithm optimized for 64-bit processors with good performance
    on
    32-bit processors.  Khazad uses an 128 bit key size.
    See
    also:
  • Anubis
                            cipher algorithm
                   
    Anubis
    cipher algorithm.
    Anubis
    is a variable key length cipher which can use keys from
    128
    bits to 320 bits in length.  It was evaluated as a entrant
    in
    the NESSIE competition.
    See
    also:
    [color="#008080"]
    [color="#008080"]
  • Deflate
                            compression algorithm
                           
                   
    This
    is the Deflate algorithm (RFC1951), specified for use in
    IPSec
    with the IPCOMP protocol (RFC3173, RFC2394).
    You
    will most probably want this if using IPSec.
  • Michael
                            MIC keyed digest algorithm
                           
                   
    Michael
    MIC is used for message integrity protection in TKIP
    (IEEE
    802.11i). This algorithm is required for TKIP, but it
    should
    not be used for other purposes because of the weakness
    of
    the algorithm.
  • CRC32c
                            CRC algorithm
                   
    Castagnoli,
    et al Cyclic Redundancy-Check Algorithm.  Used
    by
    iSCSI for header and data digests and by others.
    See
    Castagnoli93.  This implementation uses lib/libcrc32c.
    Module
    will be crc32c.
  • Testing
                            module
                   
    Quick
    & dirty crypto test module.
  • Hardware
                    crypto devices
                   
                   
  • Support
                            for VIA PadLock ACE
                   
           
    Some
    VIA processors come with an integrated crypto engine
    (so
    called VIA PadLock ACE, Advanced Cryptography Engine)
    that
    provides instructions for very fast {en,de}cryption
    with
    some algorithms.
    The
    instructions are used only when the CPU supports them.
    Otherwise
    software encryption is used. If you are unsure,
    say
    Y.
  • Support
                                    for AES in VIA PadLock
                           
    Use
    VIA PadLock for AES algorithm.
                   
                   
                   

    本文来自ChinaUnix博客,如果查看原文请点:http://blog.chinaunix.net/u/17431/showart_137804.html
  • 您需要登录后才可以回帖 登录 | 注册

    本版积分规则 发表回复

      

    北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
    未成年举报专区
    中国互联网协会会员  联系我们:huangweiwei@itpub.net
    感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

    清除 Cookies - ChinaUnix - Archiver - WAP - TOP