01.11.2012 Views

cv act library/pc - CV Cryptovision Gmbh

cv act library/pc - CV Cryptovision Gmbh

cv act library/pc - CV Cryptovision Gmbh

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> sc/interface<br />

for PC, Server and Mobile Devices<br />

Middleware für Smartcards<br />

und Security-Token<br />

<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> provides all cryptographic algorithms needed to realize<br />

security-relevant Der effektivste Weg, applications. Unternehmensdaten This comprises und -zugänge symmetric zu schützen, and asymme- ist die<br />

tric Verwendung cipher mechanisms, von Smartcards digital oder signatures, Security-Token. hash functions Nur so ist and ein random kontrol-<br />

number lierter, sicherer generators. Zugriff auf Geschäftsdaten und -anwendungen unter Berück-<br />

sichtigung aktueller Anforderungen (Compliance) möglich. <strong>cv</strong> <strong>act</strong> sc/inter-<br />

<strong>cv</strong> face <strong>act</strong> verbindet <strong>library</strong>/<strong>pc</strong> Smartcards is designed und to Security-Token be used alone effektiv or with mit smart Anwendungen cards, other und<br />

security Systemen, tokens die and eine Hardware standardisierte Security Schnittstelle Modules dafür (HSM). zur It is Verfügung the first cryp- stellen.<br />

tographic <strong>library</strong> worldwide that allows for efficient implementation of Elliptic<br />

Curve Cryptography (ECC) together with comprehensive smart card<br />

support.<br />

Bereit für die Zukunft mit<br />

fortschrittlicher Technologie<br />

<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> can therefore be used to realize e.g. the mechanisms of<br />

the cryptovision NSA Suite ist B führender or those Anbieter used for von Extended innovativen Access Kryptographie- Control und (EAC) Public-Key- within<br />

machine-readable Infrastruktur-Lösungen. travel Da documents alle Komponenten (MRTD). stets mit den modernsten kryptographischen<br />

Algorithmen ausgestattet sind, wird mit nur minimalen Ergänzungen maxi-<br />

male Sicherheit erreicht – einhergehend mit einem schnellen Return on Investment<br />

(ROI) .<br />

cryptovision - product information<br />

cryptovision - product information<br />

www.cryptovision.com


<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong><br />

Based on Standards<br />

In terms of performance and interfaces, <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong><br />

meets official standards and follows compatibility<br />

guidelines (such as X.509, ANSI X9.62, X9.63,<br />

IEEE P1363 as well as current FIPS standards, ISO/<br />

IEC 14888 and 15946, and BSI TR-03110 including<br />

EAC, PACE, CA, TA and RI) and the German digital<br />

signature <strong>act</strong>. <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> contains all necessary<br />

functions for cryptographic key generation.<br />

All algorithms are accssable via a unitized objectoriented<br />

interface; this allows to implement applica-<br />

Key Features<br />

Algorithms & Protocols<br />

Cryptographic Primitives<br />

Arithmetic<br />

• Asymmetric encryption methods (e.g. RSA, ECIES)<br />

• Digital signatures (e.g. RSA, DSA, ECDSA)<br />

• Key exchange methods (e.g. DH, ECDH)<br />

• Hash Functions SHA-1, SHA-224, SHA-256, SHA-<br />

384, SHA-512, RIPEMD-160, MD5 and others<br />

• Symmetric encryption algorithms like AES, DES,<br />

Triple-DES, Blowfish and many others<br />

• Different standard block modes<br />

• Message authentication codes (MAC) based on<br />

hash functions or symmetric encryption algorithms<br />

• Subsystem support: CTAPI, PCSC, CSP, PKCS#11<br />

Additional information available at www.cryptovision.com<br />

Object-orientated Standard API<br />

Internal structure of the <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong><br />

tions independently of the particular algorithm used.<br />

The <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> enables customers to integrate<br />

additional cryptographic primitives (algorithms). The<br />

protocol layer is capable of using these additional<br />

algorithms without additional modifications.<br />

It is possible to use special security hardware to perform<br />

cryptographic operations; smart cards, other<br />

security tokens and even Hardware Security Modules<br />

(HSM) can be integrated in a flexible way and<br />

used via standard <strong>library</strong> functions.<br />

Secure Token<br />

Subsystem<br />

Smart Cards<br />

PC/SC, PKCS#11, CSP<br />

Smart Card Service (Windows) PC/SC-lite(Unix,MacOS-X)<br />

• Support of numerous <strong>act</strong>ual smartcards, USB<br />

tokens and Hardware Security Modules<br />

• Token authentication protocols: EAC/BAC, PACE,<br />

Restricted Identification (RI), Chip Authentication<br />

(CA), Terminal Authentication (TA)<br />

Supported Platforms/Compilers<br />

• Microsoft Windows (7, Vista, XP, NT), Windows<br />

Mobile, Linux, Sun Solaris, MacOS X<br />

• Microsoft Visual C++ 6.0/2003/2005/2008<br />

• GNU C++ (gcc 3.3, 4.0, 4.1, 4.2)<br />

• More platforms and compilers available on request<br />

<strong>cv</strong> cryptovision GmbH | Munscheidstraße 14 | 45886 Gelsenkichen | T:+49(0)209167.2450 | F:+49(0)209167.2461 | info@cryptovision.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!