Digest Algorithms

Digest algorithms utilized in digital signatures provide help in detecting changes in the signed payload since the signature has been generated on the content. The procedure of verifying that no unauthorized changes were made on the signed content is called the verification of the digital signature. If verification is successful, parties can be certain that the document has been created by the signing party and that it was unaltered since its signing.

TIBCO BusinessConnect Container Edition offers the following digest algorithms to verify digital signatures:

  • SHA1
  • SHA-256
  • SHA-384
  • SHA-512

Encryption Algorithms

Encryption algorithms are used in two different contexts:

  • Transport layer
  • Business layer

In the transport layer, the encryption takes place on the transport connection, which considers the data moved through it opaque. The negotiation of the symmetric keys takes place by an asymmetric algorithm utilized and defined in SSL/TLS or SSH. In the business layer, business documents' payloads are encrypted as per the specification of the given business protocol. These options can be used independently from the other. There are multiple encryption algorithms available for use. You and your business partner must use the same encryption algorithm; otherwise, decryption is not possible. The number included in the name of the algorithm is the number of bits. This is independent of the bit size of the certificate. The larger the algorithm bit size, the more secure the encryption.

TIBCO BusinessConnect Container Edition supports the following encryption algorithms for the encryption of transport layer and business layer:

  • DES3
  • AES-128
  • AES-192
  • AES-256