public final class EcdsaWithRecommendedSignature extends EcdsaSignature
The recommended hash function has the same security strength (security in bits) as the EC key being used. The following table indicates the recommended hash function for an EC key of a given size. This table was compiled from security strength information provided by NIST in SP 800-57 Part 1 Table 2 & 3.
| Key size (bits) | Digest Algorithm |
|---|---|
| [1..223] | SHA-1 |
| [224..255] | SHA-224 |
| [226..383] | SHA-256 |
| [384..511] | SHA-384 |
| 512+ | SHA-512 |
This implementation calculates the hash internally, thus it is the message
itself (being signed or verified) that is passed in through the
update() API.
An instance of this algorithm can be obtained using the Java Cryptography
Architecture (JCA), by requesting a 'RECOMMENDEDwithECDSA' digital signature
from the Entrust
cryptographic service provider. This can be done using the following call:
Signature.getInstance("RECOMMENDEDwithECDSA", "Entrust");EcdsaSignature| Constructor and Description |
|---|
EcdsaWithRecommendedSignature()
The constructor; creates a new instance of the RECOMMENDEDwithECDSA
digital signature algorithm.
|
getDigitalSignatureImplassertParametersValid, engineGetParameter, engineGetParameters, engineInitSign, engineInitSign, engineInitVerify, engineSetParameter, engineSetParameter, engineSign, engineSign, engineUpdate, engineUpdate, engineVerify, engineVerify, generateDefaultParameters, getDigest, getPrng, toAlgorithmParameterspublic EcdsaWithRecommendedSignature()
Applications should not use this constructor, instead the signature
algorithm should be requested from the appropriate JCA/JCE cryptographic
service provider as follows:
Signature.getInstance("RECOMMENDEDwithECDSA", "Entrust").