By themselves the primitive operations do not necessarily provide any security. The concept of a cryptographic scheme is to define higher level algorithms or uses of the primitives so they achieve certain security goals. There are two schemes for encryption and decryption: • : older Encryption/decryption Scheme (ES) as first standardized in version 1.5 of PKCS #1.
Known-vulnerable. • : improved ES; based on the
optimal asymmetric encryption padding (OAEP) scheme proposed by
Mihir Bellare and
Phillip Rogaway. Recommended for new applications. There are also two schemes for dealing with signatures: • : old Signature Scheme with Appendix (SSA) as first standardized in version 1.5 of PKCS #1. Unforgeable, according to Jager
et al. (2018). • : improved SSA; based on the
probabilistic signature scheme (PSS) originally invented by Bellare and Rogaway. Recommended for new applications. The two signature schemes make use of separately defined encoding methods: • : old encoding method for signature appendix (EMSA) as first standardized in version 1.5 of PKCS #1. • : improved EMSA, based on the probabilistic signature scheme. Recommended for new applications. The signature schemes are actually signatures
with appendix, which means that rather than signing some input data directly, a
hash function is used first to produce an intermediary representation of the data, and then the result of the hash is signed. This technique is almost always used with RSA because the amount of data that can be directly signed is proportional to the size of the keys; which is almost always much smaller than the amount of data an application may wish to sign. == Version history ==