public final class Entrust
extends java.security.Provider
The following table lists the standard algorithms implemented by the Entrust cryptographic service provider (CSP).
| Entrust Provider cryptographic engines and algorithms | |||
| Message digest | |||
| Standard algorithm name | Description | Alias | |
|
The MD5 algorithm as defined in RFC 1319. |
||
|
The 160-bit secure hash algorithm, as defined in the Secure Hash Standard, FIPS 180-3. | SHA1SHA |
|
|
The 224-bit secure hash algorithm, as defined in the Secure Hash Standard, FIPS 180-3. | SHA224 |
|
|
The 256-bit secure hash algorithm, as defined in the Secure Hash Standard, FIPS 180-3. | SHA256 |
|
|
The 384-bit secure hash algorithm, as defined in the Secure Hash Standard, FIPS 180-3. | SHA384 |
|
|
The 512-bit secure hash algorithm, as defined in the Secure Hash Standard, FIPS 180-3. | SHA512 |
|
|
160-bit hash value producing message digest algorithm; developed in the framework of the EU project RIPE (RACE Integrity Primitives Evaluation, 1988-1992) ; specified in ISO/IEC 10118-3. | RIPEMD160 |
|
|
The 288-bit hash algorithm defined for use with SSL3, that is simply a concatenation of a SHA-1 and MD5 hash. | ||
| Signature | |||
| Standard algorithm name | Description | Alias | |
|
The DSA digital signature algorithm with
SHA-1 as the underlying hash function; defined in FIPS
186-3. |
SHAwithDSASHA/DSASHA1/DSASHA-1/DSADSADSSdsa-with-sha11.2.840.10040.4.31.3.14.3.2.131.3.14.3.2.271.3.14.3.2.29 |
|
|
The DSA digital signature algorithm implemented
with external hashing (accepts message hash as input); defined in FIPS
186-3. |
NONE/DSARawDSAEntrustRawDSA |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
MD2 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313). |
MD2WithRSAmd2WithRSAEncryption1.2.840.113549.1.1.2 |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
MD5 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313). |
MD5WithRSAMD5/RSAmd5WithRSAEncryption1.2.840.113549.1.1.4 |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
SHA-1 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313) and FIPS
186-3. |
SHA1WithRSASHAwithRSASHAWithRSASHA-1/RSASHA1/RSASHA/RSAsha1WithRSAEncryption1.2.840.113549.1.1.51.3.14.3.2.29 |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
SHA-224 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313) and FIPS
186-3. |
SHA224WithRSASHA-224/RSASHA224/RSAsha224WithRSAEncryption1.2.840.113549.1.1.14 |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
SHA-256 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313) and FIPS
186-3. |
SHA256WithRSASHA-256/RSASHA256/RSAsha256WithRSAEncryption1.2.840.113549.1.1.11 |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
SHA-384 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313) and FIPS
186-3. |
SHA384WithRSASHA-384/RSASHA384/RSAsha384WithRSAEncryption1.2.840.113549.1.1.12 |
|
|
The RSA-PKCS1-v1_5 signature algorithm with
SHA-512 as the underlying hash function; defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313) and FIPS
186-3. |
SHA512WithRSASHA-512/RSASHA512/RSAsha512WithRSAEncryption1.2.840.113549.1.1.13 |
|
|
The RSA-PKCS1-v1_5 digital signature algorithm
implemented with external hashing (accepts formatted message hash as input); defined in PKCS #1: RSA Encryption Version 1.5 (RFC 2313) and FIPS
186-3. |
NONE/RSARAWSSL/RSA |
|
|
The RSA signature algorithm as defined for use
in the SSL Protocol
Version 3.0; implemented with internal hashing (accepts message as
input). |
||
|
The RSA-PSS signature algorithm; defined in Public-Key Cryptography Standards (PKCS) #1:
RSA Cryptography Specifications Version 2.1 (RFC 3447) and FIPS
186-3. |
RSA-PSSRSASSA-PSS1.2.840.113549.1.1.10 |
|
|
The RSA-PSS raw signature algorithm (input is presumed to have been already hashed using the appropriate message digest algorithm). Defined in Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (RFC 3447) and FIPS 186-3. | RSA-PSS-NONERSASSA-PSS-NONERawRSAPSSRawRSA-PSS |
|
|
The ECDSA digital signature algorithm with
SHA-1 as the underlying hash function; defined in ASNI
X9.62-2005 and FIPS
186-3. |
SHAwithECDSASHA/ECDSASHA1/ECDSASHA-1/ECDSAECDSAECDSSecdsa-with-SHA11.2.840.10045.4.1 |
|
|
The ECDSA digital signature algorithm with
SHA-224 as the underlying hash function; defined in ASNI
X9.62-2005 and FIPS
186-3. |
SHA224/ECDSASHA-224/ECDSAecdsa-with-Sha2241.2.840.10045.4.3.1 |
|
|
The ECDSA digital signature algorithm with
SHA-256 as the underlying hash function; defined in ASNI
X9.62-2005 and FIPS
186-3. |
SHA256/ECDSASHA-256/ECDSAecdsa-with-Sha2561.2.840.10045.4.3.2 |
|
|
The ECDSA digital signature algorithm with
SHA-384 as the underlying hash function; defined in ASNI
X9.62-2005 and FIPS
186-3. |
SHA384/ECDSASHA-384/ECDSAecdsa-with-Sha3841.2.840.10045.4.3.3 |
|
|
The ECDSA digital signature algorithm with
SHA-512 as the underlying hash function; defined in ASNI
X9.62-2005 and FIPS
186-3. |
SHA512/ECDSASHA-512/ECDSAecdsa-with-Sha5121.2.840.10045.4.3.4 |
|
|
The ECDSA digital signature algorithm
implemented with external hashing (accepts message hash as input); defined in
ASNI X9.62-2005 and FIPS
186-3. |
NONE/ECDSARawECDSAEntrustRawECDSA |
|
|
The ECDSA digital signature algorithm with the
recommended underlying hash function; defined in ASNI X9.62-2005. |
RECOMMENDED/ECDSAecdsa-with-Recommended1.2.840.10045.4.2 |
|
|
The ECDSA digital signature algorithm with an
underlying hash function that is specified through algorithm parameters;
defined in ASNI X9.62-2005. |
SPECIFIED/ECDSAecdsa-with-Specified1.2.840.10045.4.3 |
|
| Cipher | |||
| Standard algorithm name | Description | Alias | |
|
The Advanced Encryption Standard (AES) a symmetric 128-bit block encryption algorithm as defined by NIST in FIPS 197. | ||
|
AES configured for operation with the GCM block mode and NoPadding padding type. | 2.16.840.1.101.3.4.1.6aes128-GCM2.16.840.1.101.3.4.1.26aes192-GCM2.16.840.1.101.3.4.1.46aes256-GCM |
|
|
The AES key wrap algorithm; a 64-bit block key wrap algorithm defined by NIST in AES Key Wrap Specification. | AesWrapAESKeyWrapAesKeyWrapid_aes128_wrap2.16.840.1.101.3.4.1.5id_aes192_wrap2.16.840.1.101.3.4.1.25id_aes256_wrap2.16.840.1.101.3.4.1.45 |
|
|
The AES key wrap Pad algorithm; a 64-bit block key wrap algorithm defined by NIST in AES Key Wrap Pad Specification. | AesWrapPadAESKeyWrapPadAesKeyWrapPadid_aes128_wrap_pad2.16.840.1.101.3.4.1.8id_aes192_wrap_pad2.16.840.1.101.3.4.1.28id_aes256_wrap_pad2.16.840.1.101.3.4.1.48 |
|
|
The CAST128 encryption algrithm; a symmetric 64-bit block encryption algorithm designed by Carlisle Adams and Stafford Tavares and described in RFC 2144. | CAST5CAST |
|
|
The CAST3 symmetric cipher algorithm; a 64-bit block cipher designed by Carlisle Adams and Stafford Tavares. Included for compatibility purposes only, use is not recommended. | Cast3 |
|
|
The Data Encryption Standard a symmetric 64-bit block encryption algorithm as defined by NIST in FIPS 46-3. | DEADES-CBC |
|
|
A variant of the Data Encryption Standard (DES) using an encrypt-decrypt-encrypt (EDE) mechanism based on three DES keys as defined by NIST in SP 800-67. | TripleDES3DESTDEADESEDEDES-EDE3DES-EDE3-CBC |
|
|
The ElGamal public-key cryptosystem; an asymmetric cipher that was developed by Taher Elgamal and is based on the discrete log problem and the Diffie-Hellman problem. | ELGAMAL |
|
|
The International Data Encryption Algorithm (IDEA); a 64-bit block encryption algorithm that was developed by Xuejia Lai. | |
|
PbeWithMD5AndDES_CBC |
Password-based key-encryption algorithm for encrypting a
given message with the DES algorithm in CBC mode using a secret
key derived from a password with the MD5 message digest
algorithm as described in PKCS #5: Password-Based Cryptography Specification Version 2.0 (RFC 2898). |
PBEWithMD5AndDES |
|
PbeWithSHAAnd3_KeyTripleDES_CBC |
Password-based key-encryption algorithm for encrypting a
given message with the TripleDES algorithm in CBC mode using a
secret key derived from a password with the SHA message digest
algorithm as described in PKCS 12 v1.0: Personal Information Exchange Syntax. |
||
PbeWithSHAAnd40BitRC2_CBC |
Password-based key-encryption algorithm for encrypting a
given message with the RC2 algorithm in CBC mode using a 40-bit
secret key derived from a password with the SHA message digest
algorithm as described in PKCS 12 v1.0: Personal Information Exchange Syntax. |
||
RC2 |
A variable key size 64-bit block cipher developed by Ron Rivest and described in RFC 2268. | RC2-CBC |
|
RC4 |
A variable key size 64-bit stream cipher developed by Ron Rivest. | ||
Rijndael |
An implementation of the Rijndael block cipher with a 128 bit block size. | ||
Rijndael-256 |
An implementation of the Rijndael block cipher with a 256 bit block size. | ||
|
Public key encryption algorithm, developed by Ron Rivest, Adi Shamir, and Leonard Adleman described in PKCS #1: RSA Encryption Version 1.5 (RFC 2313). | RSA/ECB/PKCS1PaddingRSA//PKCS1Padding |
|
| Cipher transformations for the RSA algorithm | |||
| RSA algorithm with PKCS #1 padding with block type 1. | RSA/1RSA/1/PKCS1Padding |
||
| RSA algorithm with PKCS #1 padding with block type 2. | RSA/2RSA/2/PKCS1Padding |
||
| RSA algorithm with the Optimal Asymmetric Encryption Padding (OAEP) method. | RSA/OAEPRSA/OAEP/PKCS1PaddingRSA/ECB/OAEPWithSHA-1AndMGF1PaddingRSA/ECB/OAEPWithSHA-256AndMGF1Padding |
||
| Mac | |||
| Standard algorithm name | Description | Alias | |
|
MAC generated using the CAST128 cipher; based on
the algorithm defined in FIPS 113. |
CAST128-MACCAST128CAST5MacCAST5-MACCAST5CASTMacCAST-MACCAST |
|
|
MAC generated using the DES cipher; based on the
algorithm defined in FIPS 113. |
DES-MACDES |
|
|
MAC generated using the DESede cipher; based on
the algorithm defined in FIPS 113. |
DESede-MACDESede3DESMac3DES-MAC3DESTripleDESMacTripleDES-MACTripleDES |
|
|
MAC generated using the IDEA cipher; based on
the algorithm defined in FIPS 113. |
IDEA-MACIDEA |
|
|
Keyed-hash message authentication code algorithm that uses
MD5 as the message digest algorithm, as described in RFC 2104 |
HMAC/MD5HMACMD5HMAC-MD5Md5HMac1.2.840.113549.2.6 |
|
|
Keyed-hash message authentication code algorithm that uses
SHA-1 as the message digest algorithm, as described in FIPS
198 |
HMAC/SHA1HMACSHA1HMAC-SHA1HmacSHAHMAC/SHAHMACSHAHMAC-SHASha1HMac1.2.840.113549.2.7 |
|
|
Keyed-hash message authentication code algorithm that uses
SHA-224 as the message digest algorithm, as described in FIPS
198 |
HMAC/SHA224HMACSHA224HMAC-SHA224Sha224HMac1.2.840.113549.2.8 |
|
|
Keyed-hash message authentication code algorithm that uses
SHA-256 as the message digest algorithm, as described in FIPS
198 |
HMAC/SHA256HMACSHA256HMAC-SHA256Sha256HMac1.2.840.113549.2.9 |
|
|
Keyed-hash message authentication code algorithm that uses
SHA-384 as the message digest algorithm, as described in FIPS
198 |
HMAC/SHA384HMACSHA384HMAC-SHA384Sha384HMac1.2.840.113549.2.10 |
|
|
Keyed-hash message authentication code algorithm that uses
SHA-512 as the message digest algorithm, as described in FIPS
198 |
HMAC/SHA512HMACSHA512HMAC-SHA512Sha512HMac1.2.840.113549.2.11 |
|
|
Message authentication code algorithm that is based on the
AES symmetric block cipher, as described in NIST
SP 800-38B |
AES-CMAC |
|
|
Message authentication code algorithm that is based on the
DESede symmetric block cipher, as described in NIST
SP 800-38B |
DESede-CMACTripleDESCMacTripleDES-CMAC3DESCMac3DES-CMAC |
|
| SecureRandom | |||
| Standard algorithm name | Description | Alias | |
|
DRBG implementation based of the algorithm defined in the NIST Special Publication 800-90, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised), NIST SP800-90. | NIST SP800-90 |
|
|
PRNG implementation based of the algorithm defined in the Digital Signature Standard Appendix 3 Section 3.1 and 3.3, FIPS 186-2. | FIPS186_2 |
|
|
PRNG implementation based of the algorithm defined in ANSI X9.31 Appendix A.2.4 (or ANSI X9.17 Appendix C) using a Triple DES cipher | X9_31using3DESX9_31X917 |
|
|
PRNG implementation based of the algorithm defined in ANSI X9.31 Appendix A.2.4 (or ANSI X9.17 Appendix C) using an AES cipher and a 256-bit key | X9_31usingAESANSI |
|
| KeyAgreement | |||
| Standard algorithm name | Description | Alias | |
|
The standard Elliptic Curve Diffie-Hellman key agreement primitive, as defined in ANSI X9.63-2001 Section 5.4.1 (ECDH is the elliptic curve analogue of the Diffie-Hellman algorithm). | stdECDH |
|
|
The modified (aka: cofactor) Elliptic Curve Diffie-Hellman key agreement primitive, as defined in ANSI X9.63-2001 Section 5.4.2 (ECDH is the elliptic curve analogue of the Diffie-Hellman algorithm). | ||
SPEKE |
Strong Password-Only Authenticated Key Exchange. It is similar to the Diffie-Hellman exchange. | ||
| KeyGenerator | |||
| Standard algorithm name | Description | Alias | |
AES |
Key generation mechanism for the AES cipher, as
defined by NIST in FIPS
197
| ||
CAST3 |
Key generation method for the CAST3 block
cipher. |
Cast3 |
|
CAST128 |
Key generation method for the CAST128 64-bit
Feistel block cipher. |
CAST5CAST |
|
DES |
Key generation mechanism for the DES cipher, as
defined by NIST in FIPS
46-3. |
DEA |
|
DESede |
Key generation mechanism for the DESede cipher,
as defined by NIST in SP
800-67. |
TripleDES3DESTDEADESEDE |
|
|
Key generation mechanism for the HmacMD5 MAC
algorithm, as defined in RFC
2104 |
HMAC/MD5HMACMD5HMAC-MD5Md5HMac1.2.840.113549.2.6 |
|
|
Key generation mechanism for the HmacSHA1 MAC
algorithm, as defined in FIPS
198 |
HMAC/SHA1HMACSHA1HMAC-SHA1HmacSHAHMAC/SHAHMACSHAHMAC-SHASha1HMac1.2.840.113549.2.7 |
|
|
Key generation mechanism for the HmacSHA224 MAC
algorithm, as defined in FIPS
198 |
HMAC/SHA224HMACSHA224HMAC-SHA224Sha224HMac1.2.840.113549.2.8 |
|
|
Key generation mechanism for the HmacSHA256 MAC
algorithm, as defined in FIPS
198 |
HMAC/SHA256HMACSHA256HMAC-SHA256Sha256HMac1.2.840.113549.2.9 |
|
|
Key generation mechanism for the HmacSHA384 MAC
algorithm, as defined in FIPS
198 |
HMAC/SHA384HMACSHA384HMAC-SHA384Sha384HMac1.2.840.113549.2.10 |
|
|
Key generation mechanism for the HmacSHA512 MAC
algorithm, as defined in FIPS
198 |
HMAC/SHA512HMACSHA512HMAC-SHA512Sha512HMac1.2.840.113549.2.11 |
|
IDEA |
Key generation mechanism for the IDEA cipher.
| ||
RC2 |
Key generation mechanism for the RC2 cipher,
developed by Ron Rivest. |
||
RC4 |
Key generation mechanism for the RC4 stream
cipher, developed by Ron Rivest. |
||
Rijndael |
Key generation mechanism for the Rijndael
cipher. |
Rijndael-256 |
|
| KeyPairGenerator | |||
| Standard algorithm name | Description | Alias | |
RSA |
Key pair generation mechanism for the RSA public
key cryptosystem as described in PKCS #1: RSA Encryption Version 1.5 (RFC 2313). |
||
DSA |
Key pair generation mechanism for the DSA
signature algorithm as described in FIPS
186-2. |
1.2.840.10040.4.11.3.14.3.2.12 |
|
|
Key pair generation mechanism for the Ellipitc Curve
EC public key cryptosystem; defined in ASNI X9.62-2005,
X9.63-2001, and
FIPS 186-2. |
ECDSA1.2.840.10045.2.1 |
|
DH |
Key pair generation mechanism for generating Diffie-Hellman keys as defined in RFC 2631. (Diffie-Hellman keys can also be used with the ElGamal public-key cryptosystem). | DiffieHellmanElGamalELGAMAL |
|
SPEKE |
Key pair generation mechanism for the SPEKE key
agreement algorithm. |
||
| KeyFactory | |||
| Standard algorithm name | Description | Alias | |
RSA |
Key factory for importing and exporting keys using the
RSA algorithm specification. |
||
DSA |
Key factory for importing and exporting keys using the
DSA algorithm specification. |
1.2.840.10040.4.11.3.14.3.2.12 |
|
|
Key factory for keys that are used with the Ellipitc Curve
EC public key cryptosystem. |
ECDSA1.2.840.10045.2.1 |
|
DH |
Key factory for Diffie-Hellman keys. (Diffie-Hellman keys can also be used with the ElGamal public-key cryptosystem). | DiffieHellmanElGamalELGAMAL |
|
| AlgorithmParameters | |||
| Standard algorithm name | Description | Alias | |
|
Parameters used to initialize the AesKeyWrap key
wrap algorithm (initial value). |
AESKeyWrap |
|
|
Parameters used to initialize the AesKeyWrapPad key
wrap algorithm (initial value). |
AESKeyWrapPad |
|
|
Parameters used to initialize the AES symmetric cipher in a block mode that requires an initialization vector. | AESaes128-CBC2.16.840.1.101.3.4.1.2aes192-CBC2.16.840.1.101.3.4.1.22aes256-CBC2.16.840.1.101.3.4.1.42RijndaelRijndael-256 |
|
CAST3 |
Parameters used to initialize the CAST3 cipher
(initialization vector and key length). |
Cast3cast3CBC1.2.840.113533.7.66.3 |
|
CAST128 |
Parameters used to initialize the CAST128 cipher
(initialization vector and key length). |
CAST5Cast5CASTcast5CBC1.2.840.113533.7.66.10 |
|
GCM |
Parameters used to initialize a symmetric cipher in the
GCM block mode of operation. |
GCM2.16.840.1.101.3.4.1.62.16.840.1.101.3.4.1.262.16.840.1.101.3.4.1.46 |
|
IDEA |
Parameters used to initialize the IDEA cipher
(initialization vector). |
||
|
Parameters used to initialize the DES and/or DESede symmetric cipher in a block mode that requires an initialization vector. | DESDEADESedeTripleDES3DESTDEADESEDEdes-ede3-cbc1.2.840.113549.3.7 |
|
RC2 |
Parameters used to initialize the RC2 cipher
(version and initialization vector). |
||
|
Parameters for the RSA-PSS digital signature
algorithm. |
RSA-PSSRSASSA-PSSid-RSASSA-PSS1.2.840.113549.1.1.10 |
|
|
Parameters for the SPECIFIEDwithECDSA digital
signature algorithm. |
SPECIFIED/ECDSAecdsa-with-Specified1.2.840.10045.4.3 |
|
|
Parameters associated with EC keys. | ECDSA1.2.840.10045.2.1 |
|
| Constructor and Description |
|---|
Entrust()
The constructor; creates a new instance of the Entrust JCA/JCE
cryptographic service provider.
|
| Modifier and Type | Method and Description |
|---|---|
static java.security.SecureRandom |
getDefaultSecureRandomInstance()
Returns a new instance of Entrust's default random number generator
(RNG).
|
clear, compute, computeIfAbsent, computeIfPresent, elements, entrySet, forEach, get, getInfo, getName, getOrDefault, getProperty, getService, getServices, getVersion, keys, keySet, load, merge, put, putAll, putIfAbsent, putService, remove, remove, removeService, replace, replace, replaceAll, toString, valuesgetProperty, list, list, load, loadFromXML, propertyNames, save, setProperty, store, store, storeToXML, storeToXML, stringPropertyNamespublic Entrust()
public static java.security.SecureRandom getDefaultSecureRandomInstance()
throws java.lang.SecurityException
Currently, Entrust's default RNG is
DRBGusingSHA512, which
is a FIPS 140-2 complaint implementation of the algorithm defined in NIST
SP 800-90.
This API has the same effect as calling
SecureRandom.getInstance("DBRGusingSHA512", "Entrust").
However, in the future Entrust's default RBG algorithm may change, so
using this API is recommended.
java.lang.SecurityExceptionDRBGusingSHA512