Framework EDI Reference. eSecurityConsole Utility
Algorithms

Cryptographic Service Providers (CSP) contain algorithms that provide the cryptographic function to encrypt, decrypt, digitally sign, digitally verify, authenticate and verify resources.  The same algorithm must be used to secure and unsecure a document.  That is, if the algorithm RC2 is used to encrypt a document, the same RC2 algorithm is used to decrypt a document.  If MD5 is used to authenticate a document, the same MD5 must be used to verify it.

In eSecurityConsole, if the CSP supports any algorithm, the "Algorithms" branch is nested directly below it.  To list all the algorithms supported by the CSP:

  1. Expand the branch having the CSP name, and if algorithms are supported, an item "Algorithms" under the branch should be displayed.
  2. Expand the "Algorithms" branch, and all the supported algorithms of the CSP are listed.

NOTE:  The eSecurityConsole does not add, edit or remove algorithms for any CSP.