Call Today 716.688.4675

Cryptography

Cryptography provides public key and private key methods to ensure security of telecommunications including authentication, privacy, integrity, and non-repudiation. Contact us to discuss your security requirements.

download brochure

VOCAL’s cryptographic algorithms for encryption, authentication, and key handling are optimized for performance on DSPs and conventional processors from TI, ADI, AMD, ARM, Intel and other leading vendors. Our cryptography software may be licensed by developers as a standalone algorithm or a library. Custom solutions are also available for your specific application.

Cryptography in Communications

Cryptography is the science and art of concealing the meaning of a message so that only authorized individuals can read it. When communicating over any untrusted medium the encoding or encryption of information is crucial to the security of that communication. Cryptography can generally be divided into two broad categories: private key and public key cryptography. With private key cryptography, users share a secret key which is used to encrypt and decrypt messages. In contrast, public key methods involve the use of a public and private key pair. A user may freely distribute the public key but must always keep the private key secret.

Cryptography, if implemented correctly within security protocols, provides basic security including:

  • Authentication – The proof of ones identity.
  • Privacy/Confidentiality – Providing mechanisms that prevent anyone, except the intended recipient, from reading the message.
  • Integrity – Insuring that the message is in the original sent form and has not been altered.
  • Non-repudiation – Proof that the message was sent by the sender.

Cryptography Software

VOCAL’s cryptographic software library provides four basic groups of cryptography algorithms:

  1. Encryption algorithms provide the message privacy/confidentiality.
    • AES Advanced Encryption Standard (128-bit Block Cipher)
    • Camellia 128-bit Block Cipher
    • CAST-128 – 64-bit Block Cipher
    • CAST-256 – 128-bit Block Cipher
    • CCM – Counter with Cipher Block Chaining Message Authentication Code
    • DES – Data Encryption Standard (64-bit Block Cipher)
    • GCM– Galois/Counter Mode
    • Rabin– Rabin Stream Cipher
    • RC4 ArcFour Stream Cipher
    • RSA RSA Public Key Schemes
    • SEED – 128-bit Block Cipher
    • SNOW2 – SNOW version 2 Stream Cipher
    • TDEA, 3DES, TDES – Triple Data Encryption Standard/Algorithm
  2. Authentication algorithms provide identity, integrity and non-repudiation.
    • CBC-MAC – Cipher Block Chaining Message Authentication Code
    • CCM – Counter with Cipher Block Chaining Message Authentication Code
    • CFB-MAC – Cipher Feedback Message Authentication Code
    • DSA – Digital Signature Algorithm
    • ECDSA – Elliptical Curve Digital Signature Algorithm
    • GCM – Galois/Counter Mode
    • GMAC – Galois Message Authentication Code
    • HMAC – Hash Message Authentication Code
    • Rabin – Rabin Digital Signature
    • RSA – RSA Digital Signature
  3. Key Handling algorithms facilitate privacy/confidentiality by keeping the private keys secret.
    • AESKW – AES Key Wrap Algorithm
    • AKW1 – Alternative Key Wrap Algorithm 1
    • AKW2 – Alternative Key Wrap Algorithm 2
    • PSEC-KEM – Provably Secure Elliptical Curve Key Encapsulation Mechanism
    • RSA-KEM – RSA Key Encapsulation Mechanism
    • TDKW – TDES Key Wrap Algorithm
  4. Other cryptographic algorithms include hash functions, pseudo random number generators and helper functions.
    • MD5 – Message Digest Algorithm 5
    • RIPEMD – RACE Integrity Primitives Evaluation Message Digest
    • SHA-1 – Secure Hash Algorithm 1
    • SHA-2 – Secure Hash Algorithm 2
    • Whirlpool – Whirlpool Hash Algorithm

More Information

supported-platforms

VOCAL Technologies, Ltd.
520 Lee Entrance, Suite 202
Amherst New York 14228
Phone: +1-716-688-4675
Fax: +1-716-639-0713
Email: sales@vocal.com