As you can imagine, in an area that is still evolving such as cryptography, any software designed to support use of it can be expected to evolve as well. Consequently, you can expect the list of algorithms and their modes of use presented in this appendix to change.
Updates to this list will appear in the file specifications.html , which is distributed in the source code releases of the Bouncy Castle provider. What follows gives you a picture of the algorithms supported by the Bouncy Castle provider as of release 1.28.
The RSA and ElGamal asymmetric ciphers are supported and can be used with the mode NONE, or ECB, and one of the following paddings:
The PKIX validation algorithm is supported.
Three key agreement algorithms are supported: DH, ECDH, and ECDHC.
The following keystore types are supported: BKS, UBER, and PKCS12 (BCPKCS12/PKCS12-DEF).
The following symmetric cipher based MAC algorithms are supported: DES, DESEDE, IDEA, RC2, RC5, and Skipjack.
Two types of HMAC are supported as well:
The following signature algorithms are available:
The following digests are supported: GOST3411, MD2, MD4, MD5, RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320, SHA1, SHA224, SHA256, SHA384, SHA512, Tiger, and Whirlpool.
The following symmetric ciphers are supported: AES, Blowfish, CAST5, CAST6, DES, DESEDE, GOST- 28147, IDEA, RC2, RC5, RC6, Rijndael, Serpent, Skipjack, and Twofish.
Any of the ciphers can be combined with one of the following modes:
and one of the following padding mechanisms:
The following PBE algorithms are also supported:
The only stream cipher currently supported is RC4 (ARC4).
Introduction