Visible to Intel only — GUID: GUID-8ED14D6E-3690-47D8-9288-BA47111698E4
Visible to Intel only — GUID: GUID-8ED14D6E-3690-47D8-9288-BA47111698E4
Public (Asymmetric) Key Cryptography
When public (or asymmetric) key encryption is used, a public key is used for encryption and a private key is used for decryption. The advantage of asymmetric keys is that they solve the problem of passing the shared key securely. The disadvantages are that these algorithms are vulnerable to 'known ciphertext' attacks and there is still a need for a method to trust the public key.
Algorithms supported by Intel® DAL
RSA (Rivest, Shamir & Adleman)
- Key generation
- Key sizes: 768, 1024, 2048
- Encryption/Decryption
- Key sizes: Between 96 and 512, divisible by 8
- Padding options: None/PKCS1/OAEP
- Digital Signing/Verification
- Key sizes in the range [96 -512] bytes, that are divisible by 8
- Padding options: PKCS1
Class documentation: com.intel.crypto.RsaAlg
ECC (Elliptic Curve Cryptography) - supported from API Level 7
- Key Generation
- Curves
- SECP256K1
- P256*
- P384*
- Encryption/Decryption
- ECIES algorithm
- Digital Signing/Verification
- ECDSA algorithm
Class documentation: com.intel.crypto.EccAlg
* Starting from API level 8
For more information, see RSA Specification.
Supported from API level 1