| Framework EDI Reference. eSecurityConsole Utility | |
| Algorithms |
Cryptographic Service Providers (CSP) contain algorithms that provide the cryptographic function to encrypt, decrypt, digitally sign, digitally verify, authenticate and verify resources. The same algorithm must be used to secure and unsecure a document. That is, if the algorithm RC2 is used to encrypt a document, the same RC2 algorithm is used to decrypt a document. If MD5 is used to authenticate a document, the same MD5 must be used to verify it.
In eSecurityConsole, if the CSP supports any algorithm, the "Algorithms" branch is nested directly below it. To list all the algorithms supported by the CSP:
NOTE: The eSecurityConsole does not add, edit or remove algorithms for any CSP.