Predefined Provider Types

A number of provider types have already been defined. The following table lists these provider types, along with the algorithms that each type must support. A CSP of a given type is free to support other algorithms in addition to the ones listed.

Provider Type
Key Exchange
Signature
Encryption
Hashing
PROV_RSA_FULL
RSA
RSA
RC2, RC4
MD5, SHA
PROV_RSA_SIG
n/a
RSA
n/a
MD5, SHA
PROV_DSS
n/a
DSS
n/a
SHA
PROV_FORTEZZA
KEA
DSS
Skipjack
SHA
PROV_MS_EXCHANGE
RSA
RSA
CAST
MD5
PROV_SSL
RSA
RSA
  • aries
  • aries
  • If two or more applications plan to exchange keys and encrypted messages, they should both use CSPs of the same type, however, some CSP types may be partially compatible with others.

    Anyone writing a custom CSP can define a new provider type. However, this person is then responsible for distributing the new provider type to the authors of any applications that are to use it.

    In the event that the previous table mentioned algorithms you are not familiar with, the following table provides a brief description of each.

    Algorithm
    Description
    CAST
    This is a 64-bit symmetric block cipher developed by C. M. Adams and S. E. Tavares. This algorithm is somewhat similar to DES (Data Encryption Standard).
    DES
    National Institute of Standards and Technology (NIST) Data Encryption Standard. This is a 64-bit symmetric block cipher that has a fixed key length of 56-bits.
    DH
    Diffie-Hellman. This is a public-key algorithm used for secure key exchange. It cannot be used for data encryption.
    DSS
    Digital Signature Standard. This standard uses the Digital Signature Algorithm (DSA), which is a public-key cipher used to generate digital signatures. It cannot be used for data encryption.
    KEA
    Key Exchange Algorithm. This is an improved version of Diffie-Hellman.
    MD2
    MD2. This is a hashing algorithm that produces a 128-bit hash value.
    MD4
    MD4. This is a hashing algorithm that produces a 128-bit hash value.
    MD5
    MD5. This is an improved version of MD4. It also produces a 128-bit hash value.
    RC2
    RC2 Block Cipher. This is a 64-bit symmetric block cipher.
    RC4
    RC4 Stream Cipher. This is a symmetric stream cipher.
    RSA
    RSA Public-Key Cipher. This is a popular public-key cipher used for both encryption and signatures.
    SHA
    Secure Hash Algorithm. This is a hashing algorithm that produces a 160-bit hash value.
    Skipjack
    This is the algorithm used by the Clipper and Capstone chips. It is a symmetric block cipher with a fixed key length of 80 bits.

    Software for developers
    Delphi Components
    .Net Components
    Software for Android Developers
    More information resources
    MegaDetailed.Net
    Unix Manual Pages
    Delphi Examples
    Databases for Amazon shops developers
    Amazon Categories Database
    Browse Nodes Database