Security standards and technology

The following table provides details about the methods that Rights Management uses to implement security.

Action

Technology or method used

Creating document keys

Creating Initialization Vectors (IV) for AES-128 or 256-bit encryption in CBC mode

Pseudo Random Number Generator (PRNG) generated in accordance with ANSI X9.61.

Implementation used is the RSA BSafe Crypto-C (in Acrobat) or Crypto-J (in Rights Management) toolkits.

Encrypting PDF documents

AES-128 (or AES 256 with Acrobat 9.0) in accordance with Federal Information Processing Standards (FIPS) Publication 197.

Creating message digests

Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2) in accordance with FIPS Pub 180-2.

Validating the identity of message senders

SAML authentication assertions are bound to SOAP messages.

SAML assertions are hashed using SHA-1. An HMAC-SHA-1 message authentication code is used to sign the SAML assertion.

// Ethnio survey code removed