C-crypto

  • Uploaded by: somasish
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View C-crypto as PDF for free.

More details

  • Words: 484
  • Pages: 2
The Supercomputing People

Cryptography is one of the critical blocks, not only for Network Security, but also for other areas of Information security like Cyber Security, OS Security, File System Security, Data Base Security, Web Security, Language Level security, Application level security, Wireless Security and Communications Security.

C-DAC's Crypto (C-Crypto) is a software crypto library, which provides the necessary cryptographic components to suit ones application. With the widest range of data encryption and signing algorithms available today, the easy-to-use API interface with strong crypto engine in C-Crypto allows the user to integrate state-of-the-art privacy and authentication features into virtually any application. C-Crypto supports industry standard cryptographic algorithms from both Symmetric and Asymmetric categories, recognized and approved by cryptographic product certification agencies such as International Computer Security Association (ICSA). It follows international standards such as Public Key Cryptographic Standard (PKCS), Federal Information Processing Standards Publication (FIPS) used in security products supplied by vendor's abroad. C-Crypto also supports algorithms from emerging fields of cryptography such as elliptic curve cryptography. C-Crypto is generic and provides following cryptographic features: Confidentiality means transforming the data into a unintelligible form using encryption which can be decrypted only by legitimate users. Authentication means the data communicated across the entities have been sent by the right person. Integrity means that the data communicated has not been tampered. Non-Repudiation means preventing the denial of previous commitments.

.

C-Crypto is used in C-DAC's Virtual Private Networking (VPN) Product called C-VPN. It can also be used in routers, operating systems and software based security products. It is useful to anyone who wants to use the internet in new ways to gain a competitive advantage. It can also be used to add security features to applications and within a short time. It is also aimed at OEMs to integrate C-Crypto into their products.

C-CRYPTO FEATURES l

Supports industry standard cryptographic algorithms

l

Support for asymmetric cryptographic algorithms up to 2048 bit key length.

l

Interoperable with other reputed crypto products

l

Multi platform support - Linux & Windows (being developed)

l

Follows International Cryptographic Standards. Supports industry standard Cryptographic Application Programming Interface (API): B-SAFE

l

C-CRYPTO SPECIFICATIONS 1.

Algorithms supported 1.1

Symmetric Key Algorithms: DES, 3DES, AES, IDEA, CAST, BLOWFISH, DES-X, RC5

1.2

Asymmetric Key Algorithms: Diffie-Hellman, RSA, Elliptic Curve Encryption Scheme (ECES)

1.3

Message Digest/ Hash: MD2, MD5, SHA-1,HMAC-MD5, HMAC-SHA1

1.4

Secure Random Number Generators :Blum-Blum-Shub, FIPS-186

2.

Key Exchange protocols: Diffie-Hellman(DH), Modified DH, ECKAS-DH, ECKAS-MQV

3.

Digital Signature: DSA, RSA, ECDSA

4.

Crypto API supported: B-SAFE

5.

Platforms supported: Linux, Windows (under progress)

CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING A Scientific Society of the

Ministry of Communications and Information Technology Government of India

Pune University Campus, Ganesh Khind Road, Pune- 411 007. Tel.: +91-20-569 4000/ 01 / 02, Fax:+91 -20 - 569 4059 Website: http://www.cdacindia.com Bangalore, Chennai, Hyderabad, Kolkata, Mohali, Mumbai, New Delhi, Noida, Thiruvananthapuram

C-DAC/NISG/April 03

Centre for Development of Advanced Computing (C-DAC)

More Documents from "somasish"

Steganography
June 2020 17
C-crypto
June 2020 10
Steganography
May 2020 13