-
Notifications
You must be signed in to change notification settings - Fork 3
Crypto Algorithms List Properties Description #15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
e04eb3c
710ddbe
3d67d80
accb334
f6d9c93
fb6a53f
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,33 @@ | ||
| # SPDX Cryptographic Algorithms List properties description | ||
|
|
||
| ## Id | ||
|
|
||
| * Description: univocal identifier for every cryptographic algorithm. This list provides an identifier per algorithm. | ||
| * Values: alphanumeric, where the usage of lower or upper case characters depend on each algorithm | ||
zvr marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ## Name | ||
|
|
||
| * Description: widely accepted name provided by the author of the algorithm or a standardization body | ||
| * Values: string | ||
|
|
||
| ## commonkeySize | ||
|
|
||
| * Description: the detected key size | ||
| * Values: bbbb, where bbbb is an integer, provided in bits. More than one value is possible, separated by the operator AND | ||
zvr marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ## specifiedkeySize | ||
|
|
||
| * Description: the default key size or range determined by the authors of the algorithm, standardization or compliance bodies/agencies | ||
| * Values: any of these options are valid | ||
zvr marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| * bbbb, where bbbb is an integer, provided in bits. More than one value is possible, separated by the operator AND | ||
| * bbbb TO cccc, where bbbb and cccc are integers, provided in bits, to express a range | ||
zvr marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ## cryptoClass | ||
|
|
||
| * Description: cryptographic algorithms are categorized in classes. The classes are defined by the number of cryptographic keys that are used in conjunction with the algorithm. | ||
| * Cryptographic hash functions do not require keys for their basic operation. | ||
| * Symmetric-key algorithms transform data in a way that is fundamentally difficult to undo without knowledge of a secret key. The key is “symmetric” because the same key is used for a cryptographic operation and its inverse | ||
| * Asymmetric-key algorithms, commonly known as public-key algorithms, use two related keys (i.e., a key pair) to perform their functions: a public key and a private key. The public key may be known by anyone; the private key should be under the sole control of the entity that “owns” the key pair. Even though the public and private keys of a key pair are related, knowledge of the public key cannot be used to determine the private key. | ||
| * Values: "Cryptographic-Hash-Function" , "Symetric-Key-Algorithm" or "Asymmetric-Key-Algorithm" | ||
|
|
||
| Note: the subclasses has been added to the cryptoClass property, separated by a "/" character from the class. This specific way to structure the subclasses is WIP. | ||
|
||
Uh oh!
There was an error while loading. Please reload this page.