The following table provides details about the methods
that Rights Management uses to implement security.
Action
|
Technology or method used
|
Creating document keys
Creating Initialization
Vectors (IV) for AES-128 or 256-bit encryption in CBC mode
|
Pseudo Random Number Generator (PRNG) generated
in accordance with ANSI X9.61.
Implementation used is the
RSA BSafe Crypto-C (in Acrobat) or Crypto-J (in Rights Management)
toolkits.
|
Encrypting PDF documents
|
AES-128 (or AES 256 with Acrobat 9.0) in
accordance with Federal Information Processing Standards (FIPS)
Publication 197.
|
Creating message digests
|
Secure Hash Algorithm-1 (SHA-1) and Secure
Hash Algorithm-2 (SHA-2) in accordance with FIPS Pub 180-2.
|
Validating the identity of message senders
|
SAML authentication assertions are bound
to SOAP messages.
SAML assertions are hashed using SHA-1.
An HMAC-SHA-1 message authentication code is used to sign the SAML
assertion.
|
|
|
|