cv act library/pc - CV Cryptovision Gmbh
cv act library/pc - CV Cryptovision Gmbh
cv act library/pc - CV Cryptovision Gmbh
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> sc/interface<br />
for PC, Server and Mobile Devices<br />
Middleware für Smartcards<br />
und Security-Token<br />
<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> provides all cryptographic algorithms needed to realize<br />
security-relevant Der effektivste Weg, applications. Unternehmensdaten This comprises und -zugänge symmetric zu schützen, and asymme- ist die<br />
tric Verwendung cipher mechanisms, von Smartcards digital oder signatures, Security-Token. hash functions Nur so ist and ein random kontrol-<br />
number lierter, sicherer generators. Zugriff auf Geschäftsdaten und -anwendungen unter Berück-<br />
sichtigung aktueller Anforderungen (Compliance) möglich. <strong>cv</strong> <strong>act</strong> sc/inter-<br />
<strong>cv</strong> face <strong>act</strong> verbindet <strong>library</strong>/<strong>pc</strong> Smartcards is designed und to Security-Token be used alone effektiv or with mit smart Anwendungen cards, other und<br />
security Systemen, tokens die and eine Hardware standardisierte Security Schnittstelle Modules dafür (HSM). zur It is Verfügung the first cryp- stellen.<br />
tographic <strong>library</strong> worldwide that allows for efficient implementation of Elliptic<br />
Curve Cryptography (ECC) together with comprehensive smart card<br />
support.<br />
Bereit für die Zukunft mit<br />
fortschrittlicher Technologie<br />
<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> can therefore be used to realize e.g. the mechanisms of<br />
the cryptovision NSA Suite ist B führender or those Anbieter used for von Extended innovativen Access Kryptographie- Control und (EAC) Public-Key- within<br />
machine-readable Infrastruktur-Lösungen. travel Da documents alle Komponenten (MRTD). stets mit den modernsten kryptographischen<br />
Algorithmen ausgestattet sind, wird mit nur minimalen Ergänzungen maxi-<br />
male Sicherheit erreicht – einhergehend mit einem schnellen Return on Investment<br />
(ROI) .<br />
cryptovision - product information<br />
cryptovision - product information<br />
www.cryptovision.com
<strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong><br />
Based on Standards<br />
In terms of performance and interfaces, <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong><br />
meets official standards and follows compatibility<br />
guidelines (such as X.509, ANSI X9.62, X9.63,<br />
IEEE P1363 as well as current FIPS standards, ISO/<br />
IEC 14888 and 15946, and BSI TR-03110 including<br />
EAC, PACE, CA, TA and RI) and the German digital<br />
signature <strong>act</strong>. <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> contains all necessary<br />
functions for cryptographic key generation.<br />
All algorithms are accssable via a unitized objectoriented<br />
interface; this allows to implement applica-<br />
Key Features<br />
Algorithms & Protocols<br />
Cryptographic Primitives<br />
Arithmetic<br />
• Asymmetric encryption methods (e.g. RSA, ECIES)<br />
• Digital signatures (e.g. RSA, DSA, ECDSA)<br />
• Key exchange methods (e.g. DH, ECDH)<br />
• Hash Functions SHA-1, SHA-224, SHA-256, SHA-<br />
384, SHA-512, RIPEMD-160, MD5 and others<br />
• Symmetric encryption algorithms like AES, DES,<br />
Triple-DES, Blowfish and many others<br />
• Different standard block modes<br />
• Message authentication codes (MAC) based on<br />
hash functions or symmetric encryption algorithms<br />
• Subsystem support: CTAPI, PCSC, CSP, PKCS#11<br />
Additional information available at www.cryptovision.com<br />
Object-orientated Standard API<br />
Internal structure of the <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong><br />
tions independently of the particular algorithm used.<br />
The <strong>cv</strong> <strong>act</strong> <strong>library</strong>/<strong>pc</strong> enables customers to integrate<br />
additional cryptographic primitives (algorithms). The<br />
protocol layer is capable of using these additional<br />
algorithms without additional modifications.<br />
It is possible to use special security hardware to perform<br />
cryptographic operations; smart cards, other<br />
security tokens and even Hardware Security Modules<br />
(HSM) can be integrated in a flexible way and<br />
used via standard <strong>library</strong> functions.<br />
Secure Token<br />
Subsystem<br />
Smart Cards<br />
PC/SC, PKCS#11, CSP<br />
Smart Card Service (Windows) PC/SC-lite(Unix,MacOS-X)<br />
• Support of numerous <strong>act</strong>ual smartcards, USB<br />
tokens and Hardware Security Modules<br />
• Token authentication protocols: EAC/BAC, PACE,<br />
Restricted Identification (RI), Chip Authentication<br />
(CA), Terminal Authentication (TA)<br />
Supported Platforms/Compilers<br />
• Microsoft Windows (7, Vista, XP, NT), Windows<br />
Mobile, Linux, Sun Solaris, MacOS X<br />
• Microsoft Visual C++ 6.0/2003/2005/2008<br />
• GNU C++ (gcc 3.3, 4.0, 4.1, 4.2)<br />
• More platforms and compilers available on request<br />
<strong>cv</strong> cryptovision GmbH | Munscheidstraße 14 | 45886 Gelsenkichen | T:+49(0)209167.2450 | F:+49(0)209167.2461 | info@cryptovision.com