Predefined Provider Types

A number of provider types have already been defined. The following table lists these provider types, along with the algorithms that each type must support. A CSP of a given type is free to support other algorithms in addition to the ones listed.

Provider Type Key Exchange Signature Encryption Hashing
PROV_RSA_FULL RSA RSA RC2, RC4 MD5, SHA
PROV_RSA_SIG n/a RSA n/a MD5, SHA
PROV_DSS n/a DSS n/a SHA
PROV_FORTEZZA KEA DSS Skipjack SHA
PROV_MS_EXCHANGE RSA RSA CAST MD5
PROV_SSL RSA RSA varies varies

If two or more applications plan to exchange keys and encrypted messages, they should both use CSPs of the same type, however, some CSP types may be partially compatible with others.

Anyone writing a custom CSP can define a new provider type. However, this person is then responsible for distributing the new provider type to the authors of any applications that are to use it.

In the event that the previous table mentioned algorithms you are not familiar with, the following table provides a brief description of each.

Algorithm Description
CAST This is a 64-bit symmetric block cipher developed by C. M. Adams and S. E. Tavares. This algorithm is somewhat similar to DES (Data Encryption Standard).
DES National Institute of Standards and Technology (NIST) Data Encryption Standard. This is a 64-bit symmetric block cipher that has a fixed key length of 56-bits.
DH Diffie-Hellman. This is a public-key algorithm used for secure key exchange. It cannot be used for data encryption.
DSS Digital Signature Standard. This standard uses the Digital Signature Algorithm (DSA), which is a public-key cipher used to generate digital signatures. It cannot be used for data encryption.
KEA Key Exchange Algorithm. This is an improved version of Diffie-Hellman.
MD2 MD2. This is a hashing algorithm that produces a 128-bit hash value.
MD4 MD4. This is a hashing algorithm that produces a 128-bit hash value.
MD5 MD5. This is an improved version of MD4. It also produces a 128-bit hash value.
RC2 RC2 Block Cipher. This is a 64-bit symmetric block cipher.
RC4 RC4 Stream Cipher. This is a symmetric stream cipher.
RSA RSA Public-Key Cipher. This is a popular public-key cipher used for both encryption and signatures.
SHA Secure Hash Algorithm. This is a hashing algorithm that produces a 160-bit hash value.
Skipjack This is the algorithm used by the Clipper and Capstone chips. It is a symmetric block cipher with a fixed key length of 80 bits.