Description of the cryptographic algorithms and key strengths in Groove (916358)



The information in this article applies to:

  • Groove Workspace 2.5 Preview Edition
  • Groove Workspace 2.5 Professional Edition
  • Groove Workspace 2.5 Project Edition
  • Groove Workspace 2.5 Standard Edition
  • Groove Virtual Office 3.0 File Sharing Edition
  • Groove Virtual Office 3.0 Professional Edition
  • Groove Virtual Office 3.0 Project Edition
  • Groove Virtual Office 3.0 Trial Edition
  • Groove Virtual Office 3.1 File Sharing Edition
  • Groove Virtual Office 3.1 Professional Edition
  • Groove Virtual Office 3.1 Project Edition
  • Groove Virtual Office 3.1 Trial Edition

INTRODUCTION

This article describes the use of cryptographic algorithms and key strengths in Groove.

MORE INFORMATION

The Groove cryptographic provider architecture enables the concurrent use of different cryptographic algorithms. Groove currently supports the following three message digest algorithms:
  • MD4
  • MD5
  • SHA1
For export reasons, you cannot insert additional cryptographic algorithms. This feature is disabled. United States export laws prevent the Cryptographic Interface from being opened. At higher layers, algorithms that are used by accounts, identities, and workspaces can be configured and customized in XML templates.

You may not be up-to-date on cryptography research, and you are not required to make a selection from the various algorithms. The Groove client implements strong default values for its algorithms and key strengths. These default values are more than sufficient for most of our customers. Therefore, customization by using XML is generally not required. As new cryptoanalysis and cryptographic enhancements are made, and new standards are agreed upon by the research community, Groove will continue to improve the default values. The following is a summary of the current default algorithms that are implemented in Groove Workspace 2.x and in Groove Virtual Office 3.x.

Crypto OperationDefault AlgorithmDefault Key Length in bits
Public-Key SignatureRSA2048 (Asymmetric)
Public-Key EncryptionElGamal2048 (Asymmetric)
Public-Key Signature in a Shared SpaceESIGN1536 (Symmetric)
Secret-Key EncryptionAES192 (Symmetric)
Secret-Key Integrity ProtectionHMAC-SHA1192 (Symmetric)
Passphrase-DerivationPBKDF22048


Advanced Encryption Standard (AES) is the new government-approved standard for a symmetric encryption algorithm. This standard replaces DES. The original name for AES is Rijndael, and was developed by two Belgian cryptographers. For more information, visit the following Web site:Efficient digital Signature (ESIGN) is a royalty-free, public-key signature algorithm that was developed in Japan. It is much faster than previous signature algorithms. With this algorithm, each data packet can be digitally signed with negligible performance affect. It is still being standardized by IEEE. For more information, visit the following Web site: RSA represents for Rivest, Shamir, and Adleman. These are the names of the three cryptographers who invented the first practical commercial public key cryptosystem. It is the most frequently used public key algorithm today. The RSA patent officially expired and entered the public domain on September 20, 2000, although RSA Security preemptively waived their patent rights on September 6, 2000. For more information, visit the following Web site: ElGamal is another public key encryption algorithm that provides an alternative to RSA.

Password-based key derivation function #2 (PBKDF2) is defined in RFC2898 and in RSA's standard Password-Based Cryptography Standard (PKCS) #5 v2.0. This algorithm provides a standard mechanism for deriving a secret key from a password. It uses salts and iteration counts to increase the complexity of attack. For more information, visit the following Web site: Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.

Modification Type:MajorLast Reviewed:6/30/2006
Keywords:kbinfo kbExpertiseInter kbtshoot KB916358 kbAudKnowledgeWorker