Microsoft KB Archive/916358

= Description of the cryptographic algorithms and key strengths in Groove =

Article ID: 916358

Article Last Modified on 1/7/2008

-

APPLIES TO


 * Groove Workspace 2.5 Preview Edition
 * Groove Workspace 2.5 Professional Edition
 * Groove Workspace 2.5 Project Edition
 * Groove Workspace 2.5 Standard Edition
 * Groove Virtual Office 3.0 File Sharing Edition
 * Groove Virtual Office 3.0 Professional Edition
 * Groove Virtual Office 3.0 Project Edition
 * Groove Virtual Office 3.0 Trial Edition
 * Groove Virtual Office 3.1 File Sharing Edition
 * Groove Virtual Office 3.1 Professional Edition
 * Groove Virtual Office 3.1 Project Edition
 * Groove Virtual Office 3.1 Trial Edition
 * Microsoft Office Groove 2007

-



INTRODUCTION
This article describes the use of cryptographic algorithms and key strengths in Groove.



MORE INFORMATION
The Groove client automatically protects data before it is sent over the network, and stored locally. The Groove cryptographic provider architecture enables the concurrent use of different cryptographic algorithms. Groove currently supports the following three message digest algorithms:
 * MD4
 * MD5
 * SHA1

For export reasons, you cannot insert additional cryptographic algorithms. United States export laws prevent the cryptographic interface from being opened. At higher layers, algorithms that are used by accounts, identities, and workspaces can be configured and customized in XML templates. However, default values are more than sufficient for most users and organizations. The following is a summary of the default algorithms that are implemented in Groove Workspace 2. , in Groove Virtual Office 3. , and in Microsoft Office Groove 2007.

Advanced Encryption Standard (AES) is the new government-approved standard for a symmetric encryption algorithm. This standard replaces DES. The original name for AES is Rijndael, and was developed by two Belgian cryptographers. For more information, visit the following Web site:

http://csrc.nist.gov/CryptoToolkit/aes/

Efficient digital Signature (ESIGN) is a royalty-free, public-key signature algorithm that was developed in Japan. It is much faster than previous signature algorithms. With this algorithm, each data packet can be digitally signed with negligible performance affect. It is still being standardized by IEEE. For more information, visit the following Web site:

http://info.isl.ntt.co.jp/esign/

RSA represents for Rivest, Shamir, and Adleman. These are the names of the three cryptographers who invented the first practical commercial public key cryptosystem. It is the most frequently used public key algorithm today. The RSA patent officially expired and entered the public domain on September 20, 2000, although RSA Security preemptively waived their patent rights on September 6, 2000. For more information, visit the following Web site:

http://www.rsasecurity.com/

ElGamal is another public key encryption algorithm that provides an alternative to RSA.

Password-based key derivation function #2 (PBKDF2) is defined in RFC2898 and in RSA's standard Password-Based Cryptography Standard (PKCS) #5 v2.0. This algorithm provides a standard mechanism for deriving a secret key from a password. It uses salts and iteration counts to increase the complexity of attack. For more information, visit the following Web site:

http://www.rsasecurity.com/rsalabs/pkcs/pkcs-5

Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.

Additional query words: TCN-00733 Groove2007

Keywords: kbinfo kbexpertiseinter kbtshoot KB916358

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.