TMS Cryptography Pack XE3/XE4/XE6-D10.2

TMS Cryptography Pack contains strong and up to date algorithms to perform most cryptographic operations. It includes algorithms to encrypt/decrypt, sign/verify, hash and authenticate data and files.

The list of algorithm includes:

AES (all standard modes and key sizes) to encrypt and decrypt according to FIPS 197
AES MAC to authenticate data
AES Galois Counter Mode to authenticate data according to NIST SP 800-30D
Speck to encrypt and decrypt with low power chips
RSA (OAEP and PSS) to sign and verify signatures of data with key size up to 4096 bits or to encrypt and decrypt (used to exchange keys)
EdDSA to sign and verify signatures with Edwards elliptic curves
ECIES to encrypt and decrypt with elliptic curves, the AES and SHA2 (used to exchange keys)
Salsa20 to encrypt and decrypt data
SHA 2 to generate hashes according to FIPS 180-4
SHA 3 to generate hashes according to draft FIPS 202
RIPEMD-160 to generates hashes (e.g., for blockchain/bitcoin compatibility)
Blake2 to generate hashes and support Argon2
PBKDF2 to derive keys from passwords according to PKCS #
Argon2 to derive keys from passwords, winner of the Password Hashing Competition
Support functions to code/decode various standard formats (e.g., Base64)

v3.1.0.0 : New: Hash algorithm SHA-384 : New: Generation of random string in TConvert class : New: Generation of certificates with RSA SHA-384, RSA SHA-512, ECDSA SHA-256, ECDSA SHA-384 and ECDSA SHA-512 : New: Generation and verification of XAdES-BES signatures with detached and enveloping format : New: Decoding of certificates with RSA SHA-1, RSA SHA-384, RSA SHA-512, ECDSA SHA-256, ECDSA SHA-384 and ECDSA SHA-512 : Fixed: Bugs related to unicode conversion in TConvert methods : New: NIST elliptic curves p-256, p-384 and p-521 for ECDSA

decrypt, encrypt, ECDSA, according, Cryptography, authenticate, algorithms, verify, hashes, elliptic, generate, Generation, curves, signatures, includes, algorithm, files, contains, operations, cryptographic, ECDSA, encrypt, decrypt, according, algorithms, Cryptography, hashes, verify, authenticate, signatures, Generation, generate, curves, elliptic, includes, Argon2, passwords, derive, TConvert, certificates