Вы находитесь на странице: 1из 2

The Supercomputing People

Cryptography is one of the critical blocks, not only for Network Security, but also for
other areas of Information security like Cyber Security, OS Security, File System
Security, Data Base Security, Web Security, Language Level security, Application level
security, Wireless Security and Communications Security.

C-DAC's Crypto (C-Crypto) is a software crypto library, which provides the necessary cryptographic
components to suit ones application. With the widest range of data encryption and signing algorithms
available today, the easy-to-use API interface with strong crypto engine in C-Crypto allows the user to
integrate state-of-the-art privacy and authentication features into virtually any application.

C-Crypto supports industry standard cryptographic algorithms from both Symmetric and Asymmetric
categories, recognized and approved by cryptographic product certification agencies such as International
Computer Security Association (ICSA). It follows international standards such as Public Key Cryptographic
Standard (PKCS), Federal Information Processing Standards Publication (FIPS) used in security products
supplied by vendor's abroad. C-Crypto also supports algorithms from emerging fields of cryptography
such as elliptic curve cryptography.

C-Crypto is generic and provides following cryptographic features:

Confidentiality means transforming the data into a unintelligible form using encryption which can be
decrypted only by legitimate users.

Authentication means the data communicated across the entities have been sent by the right person.

Integrity means that the data communicated has not been tampered.

Non-Repudiation means preventing the denial of previous commitments.

.
C-Crypto is used in C-DAC's Virtual Private Networking (VPN) Product called C-VPN. It can also be used in routers,
operating systems and software based security products. It is useful to anyone who wants to use the internet in new
ways to gain a competitive advantage. It can also be used to add security features to applications and within a short
time. It is also aimed at OEMs to integrate C-Crypto into their products.

C-CRYPTO FEATURES
l Supports industry standard cryptographic algorithms
l Support for asymmetric cryptographic algorithms up to 2048 bit
key length.
l Interoperable with other reputed crypto products
l Multi platform support - Linux & Windows (being developed)
l Follows International Cryptographic Standards.
l Supports industry standard Cryptographic Application
Programming Interface (API): B-SAFE

C-CRYPTO SPECIFICATIONS

1. Algorithms supported
1.1 Symmetric Key Algorithms:
DES, 3DES, AES, IDEA, CAST, BLOWFISH, DES-X, RC5
1.2 Asymmetric Key Algorithms:
Diffie-Hellman, RSA, Elliptic Curve Encryption Scheme (ECES)
1.3 Message Digest/ Hash: MD2, MD5, SHA-1,HMAC-MD5, HMAC-SHA1
1.4 Secure Random Number Generators :Blum-Blum-Shub, FIPS-186

2. Key Exchange protocols:


Diffie-Hellman(DH), Modified DH, ECKAS-DH, ECKAS-MQV

3. Digital Signature: DSA, RSA, ECDSA

4. Crypto API supported: B-SAFE

5. Platforms supported: Linux, Windows (under progress)

Centre for Development of Advanced Computing (C-DAC)


Pune University Campus, Ganesh Khind Road, Pune- 411 007.
C-DAC/NISG/April 03

CENTRE FOR
DEVELOPMENT Tel.: +91-20-569 4000/ 01 / 02, Fax:+91 -20 - 569 4059
OF ADVANCED Website: http://www.cdacindia.com
COMPUTING
A Scientific Society of the
Ministry of Communications
and Information Technology
Bangalore, Chennai, Hyderabad, Kolkata, Mohali,
Government of India
Mumbai, New Delhi, Noida, Thiruvananthapuram

Вам также может понравиться