Package org.bouncycastle.crypto.generators
package org.bouncycastle.crypto.generators
-
ClassDescriptionArgon2 PBKDF - Based on the results of https://password-hashing.net/ and https://www.ietf.org/archive/id/draft-irtf-cfrg-argon2-03.txtBasic KDF generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
This implementation is based on ISO 18033/P1363a.Core of password hashing scheme Bcrypt, designed by Niels Provos and David Mazières, corresponds to the C reference implementation.a Cramer Shoup key pair generatora basic Diffie-Hellman key pair generator.a Diffie-Hellman key pair generator.a DSA key pair generator.Generate suitable parameters for DSA, in line with FIPS 186-2, or FIPS 186-3.a ElGamal key pair generator.a GOST3410 key pair generator.generate suitable parameters for GOST3410.HMAC-based Extract-and-Expand Key Derivation Function (HKDF) implemented according to IETF RFC 5869, May 2010 as specified by H.KDF1 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
This implementation is based on ISO 18033/IEEE P1363a.KDF2 generator for derived keys and ivs as defined by IEEE P1363a/ISO 18033
This implementation is based on IEEE P1363/ISO 18033.This KDF has been defined by the publicly available NIST SP 800-108 specification.This KDF has been defined by the publicly available NIST SP 800-108 specification.This KDF has been defined by the publicly available NIST SP 800-108 specification.Generator for MGF1 as defined in PKCS 1v2Key generation parameters for NaccacheStern cipher.Password hashing scheme BCrypt, designed by Niels Provos and David Mazières, using the String format and the Base64 encoding of the reference implementation on OpenBSDGenerator for PBE derived keys and ivs as usd by OpenSSL.Generator for PBE derived keys and ivs as defined by PKCS 12 V1.0.Generator for PBE derived keys and ivs as defined by PKCS 5 V2.0 Scheme 1.Generator for PBE derived keys and ivs as defined by PKCS 5 V2.0 Scheme 2.Generates keys for the Poly1305 MAC.Generate a random factor suitable for use with RSA blind signatures as outlined in Chaum's blinding and unblinding as outlined in "Handbook of Applied Cryptography", page 475.an RSA key pair generator.Implementation of the scrypt a password-based key derivation function.