File: DHKeyGeneration.cs

package info (click to toggle)
mono 1.2.2.1-1etch1
  • links: PTS
  • area: main
  • in suites: etch
  • size: 142,720 kB
  • ctags: 256,408
  • sloc: cs: 1,495,736; ansic: 249,442; sh: 18,327; xml: 12,463; makefile: 5,046; perl: 1,248; asm: 635; yacc: 285; sql: 7
file content (66 lines) | stat: -rw-r--r-- 2,956 bytes parent folder | download | duplicates (15)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
//
// DHKeyGeneration.cs: Defines the different key generation methods.
//
// Author:
//	Pieter Philippaerts (Pieter@mentalis.org)
//
// (C) 2003 The Mentalis.org Team (http://www.mentalis.org/)
//

//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to
// permit persons to whom the Software is furnished to do so, subject to
// the following conditions:
// 
// The above copyright notice and this permission notice shall be
// included in all copies or substantial portions of the Software.
// 
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//

using System;

namespace Mono.Security.Cryptography {
	/// <summary>
	/// Defines the different Diffie-Hellman key generation methods.
	/// </summary>
	public enum DHKeyGeneration {
		/// <summary>
		/// [TODO] you first randomly select a prime Q of size 160 bits, then choose P randomly among numbers like
		/// Q*R+1 with R random. Then you go along with finding a generator G which has order exactly Q. The private
		/// key X is then a number modulo Q.
		/// [FIPS 186-2-Change1 -- http://csrc.nist.gov/publications/fips/]
		/// </summary>
		// see RFC2631 [http://www.faqs.org/rfcs/rfc2631.html]
		//DSA,
		/// <summary>
		/// Returns dynamically generated values for P and G. Unlike the Sophie Germain or DSA key generation methods,
		/// this method does not ensure that the selected prime offers an adequate security level.
		/// </summary>
		Random,
		/// <summary>
		/// Returns dynamically generated values for P and G. P is a Sophie Germain prime, which has some interesting
		/// security features when used with Diffie Hellman.
		/// </summary>
		//SophieGermain,
		/// <summary>
		/// Returns values for P and G that are hard coded in this library. Contrary to what your intuition may tell you,
		/// using these hard coded values is perfectly safe.
		/// The values of the P and G parameters are taken from 'The OAKLEY Key Determination Protocol' [RFC2412].
		/// This is the prefered key generation method, because it is very fast and very safe.
		/// Because this method uses fixed values for the P and G parameters, not all bit sizes are supported.
		/// The current implementation supports bit sizes of 768, 1024 and 1536.
		/// </summary>
		Static
	}
}