CryptoAPI Cryptographic Service Providers - Win32 apps (2024)

  • Article

Providers associated with Cryptography API (CryptoAPI) are called cryptographic service providers (CSPs) in this documentation. CSPs typically implement cryptographic algorithms and provide key storage. Providers associated with CNG, on the other hand, separate algorithm implementation from key storage. The following Microsoft CSPs are distributed with WindowsVista and Windows Server2008.

Microsoft Base Cryptographic Provider v1.0

Implements the following algorithms to hash, sign, and encrypt content.

NameUseTypeKey size (Default/Min/Max)
Data Encryption Standard (DES)EncryptionBlock56/56/56
Hashed Message Authentication Checksum (HMAC)HashingAny0/0/0
Message Authentication Checksum (MAC)HashingAny0/0/0
Message Digest 2 (MD2)HashingAny128/128/128
Message Digest 4 (MD4)HashingAny128/128/128
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock40/40/56
RSA Data Security 4 (RC4)EncryptionBlock40/40/56
RSA Key ExchangeKey exchangeRSA512/384/1024
RSA SignatureSigningRSA512/384/16384
Secure Hash Algorithm (SHA1)HashingAny160/160/160
Secure Socket Layer 3 SHA and MD5 (SSL3 SHAMD5)HashingAny288/288/288

Microsoft Base DSS and Diffie-Hellman Cryptographic Provider

Implements the following algorithms to support hashing, signing, encryption, and Diffie-Hellman key exchange.

NameUseTypeKey size (Default/Min/Max)
CYLINK Message Encryption AlgorithmEncryptionBlock40/40/40
Data Encryption Standard (DES)EncryptionBlock56/56/56
Diffie-Hellman Key Exchange AlgorithmKey exchangeDiffie-Hellman512/512/1024
Diffie-Hellman Ephemeral AlgorithmKey exchangeDiffie-Hellman512/512/1024
Digital Signature Algorithm (DSA)SigningDSS1024/512/1024
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock40/40/56
RSA Data Security 4 (RC4)EncryptionStream40/40/56
Secure Hash Algorithm (SHA1)HashingAny160/160/160

Microsoft Base DSS Cryptographic Provider

Implements the following algorithms to sign and hash content:

NameUseTypeKey size (Default/Min/Max)
Digital Signature Algorithm (DSA)SigningDSS1024/512/1024
Message Digest 5 (MD5)HashingAny128/128/128
Secure Hash Algorithm (SHA1)HashingAny160/160/160

Microsoft Base Smart Card Crypto Provider

Supports smart cards and implements the following algorithms to hash, sign, and encrypt content.

NameUseTypeKey size (Default/Min/Max)
Advanced Encryption Standard 128 (AES128)EncryptionBlock128/128/128
Advanced Encryption Standard 192 (AES192)EncryptionBlock192/192/192
Advanced Encryption Standard 256 (AES256)EncryptionBlock256/256/256
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
Three Key Triple DESEncryptionBlock168/168/168
Hashed Message Authentication Checksum (HMAC)HashingAny0/0/0
Message Authentication Checksum (MAC)HashingAny0/0/0
Message Digest 2 (MD2)HashingAny128/128/128
Message Digest 4 (MD4)HashingAny128/128/128
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock128/40/128
RSA Data Security 4 (RC4)EncryptionStream128/40/128
RSA Key ExchangeKey exchangeRSA1024/1024/4096
RSA SignatureSigningRSA1024/1024/4096
Secure Hash Algorithm (SHA1)HashingAny160/160/160
Secure Hash Algorithm 256 (SHA256)HashingAny256/256/256
Secure Hash Algorithm 384 (SHA384)HashingAny384/384/384
Secure Hash Algorithm 512 (SHA512)HashingAny512/512/512
Secure Socket Layer 3 SHA and MD5 (SSL3 SHAMD5)HashingAny288/288/288

Microsoft DH Schannel Cryptographic Provider

Supports the Secure Channel (Schannel) security package which implements Secure Sockets Layer (SSL) and Transport Layer Security (TLS) authentication protocols. This CSP also supports Diffie-Hellman key exchange and implements the following algorithms.

NameUseTypeKey size (Default/Min/Max)
CYLINK Message Encryption AlgorithmEncryptionBlock40/40/40
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
Three Key Triple DESEncryptionBlock168/168/168
Diffie-Hellman Key Exchange AlgorithmKey exchangeDiffie-Hellman512/512/4096
Diffie-Hellman Ephemeral AlgorithmKey exchangeDiffie-Hellman512/512/4096
Digital Signature Algorithm (DSA)SigningDSS1024/512/1024
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock40/40/128
RSA Data Security 4 (RC4)EncryptionStream40/40/128
Secure Hash Algorithm (SHA1)HashingAny160/160/160
Schannel Encryption KeyEncryptionSchannel0/0/-1
Schannel MAC KeyEncryption/HashingSchannel0/0/-1
Schannel Master HashEncryption/HashingSchannel0/0/-1
Secure Sockets Layer (SSL3) MasterEncryptionSchannel384/384/384
Transport Layer Security (TLS1) MasterEncryptionSchannel384/384/384

Microsoft Enhanced Cryptographic Provider v1.0

Provides stronger security than the Microsoft Base Cryptographic Provider v1.0 by using longer keys with some of the existing algorithms and by implementing additional algorithms.

NameUseTypeKey size (Default/Min/Max)
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
EncryptionBlock168/168/168
Hashed Message Authentication Checksum (HMAC)HashingAny0/0/0
Message Authentication Checksum (MAC)HashingAny0/0/0
Message Digest 2 (MD2)HashingAny128/128/128
Message Digest 4 (MD4)HashingAny128/128/128
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock128/40/128
RSA Data Security 4 (RC4)EncryptionStream128/40/128
RSA Key ExchangeKey exchangeRSA1024/384/16384
RSA SignatureSigningRSA1024/384/16384
Secure Hash Algorithm (SHA1HashingAny160/160/160
Secure Socket Layer 3 SHA and MD5 (SSL3 SHAMD5)HashingAny288/288/288

Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider

Provides stronger security than the Microsoft Base DSS and Diffie-Hellman Cryptographic Provider CSP by using longer keys with some of the existing algorithms and by implementing additional algorithms.

NameUseTypeKey size (Default/Min/Max)
CYLINK Message Encryption AlgorithmEncryptionBlock40/40/40
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
Three Key Triple DESEncryptionBlock168/168/168
Diffie-Hellman Key Exchange AlgorithmKey exchangeDiffie-Hellman1024/512/4096
Diffie-Hellman Ephemeral AlgorithmKey exchangeDiffie-Hellman1024/512/4096
Digital Signature Algorithm (DSA)SigningDSS1024/512/1024
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock128/128/128
RSA Data Security 4 (RC4)EncryptionStream128/128/128
Secure Hash Algorithm (SHA1)HashingAny160/160/160

Microsoft Enhanced RSA and AES Cryptographic Provider

Implements the following algorithms to sign, encrypt, and hash content.

NameUseTypeKey size (Default/Min/Max)
Advanced Encryption Standard 128 (AES128)EncryptionBlock128/128/128
Advanced Encryption Standard 192 (AES192)EncryptionBlock192/192/192
Advanced Encryption Standard 256 (AES256)EncryptionBlock256/256/256
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
Three Key Triple DESEncryptionBlock168/168/168
Hashed Message Authentication Checksum (HMAC)HashingAny0/0/0
Message Authentication Checksum (MAC)HashingAny0/0/0
Message Digest 2 (MD2)HashingAny128/128/128
Message Digest 4 (MD4)HashingAny128/128/128
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock128/128/128
RSA Data Security 4 (RC4)EncryptionStream128/128/128
RSA Key ExchangeKey exchangeRSA1024/384/16384
RSA SignatureSigningRSA1024/384/16384
Secure Hash Algorithm (SHA1)HashingAny160/160/160
Secure Hash Algorithm (SHA256)HashingAny256/256/256
Secure Hash Algorithm (SHA384)HashingAny384/384/384
Secure Hash Algorithm (SHA512)HashingAny512/512/512
Secure Socket Layer 3 SHA and MD5 (SSL3 SHAMD5)HashingAny288/288/288

Microsoft RSA Schannel Cryptographic Provider

Supports the RSA Secure Channel (Schannel) security package which implements Secure Sockets Layer (SSL) and Transport Layer Security (TLS) authentication protocols.

NameUseTypeKey size (Default/Min/Max)
Advanced Encryption Standard 128 (AES128)EncryptionBlock128/128/128
Advanced Encryption Standard 256 (AES256)EncryptionBlock256/256/256
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
Three Key Triple DESEncryptionBlock168/168/168
Hashed Message Authentication Checksum (HMAC)HashingAny0/0/0
Message Authentication Checksum (MAC)HashingAny0/0/0
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock128/128/128
RSA Data Security 4 (RC4)EncryptionStream128/128/128
RSA Key ExchangeKey exchangeRSA1024/384/16384
Schannel Encryption KeyEncryptionSchannel0/0/-1
Schannel Master HashEncryption/HashingSchannel0/0/-1
Schannel MAC KeyEncryption/HashingSchannel0/0/-1
Secure Hash Algorithm (SHA1)HashingAny160/160/160
Secure Socket Layer 2 (SSL2) MasterEncryptionSchannel40/40/192
Secure Socket Layer 3 (SSL3) MasterEncryptionSchannel384/384/384
Secure Socket Layer 3 SHA and MD5 (SSL3 SHAMD5)HashingAny288/288/288
Transport Layer Security (TLS1) MasterEncryptionSchannel384/384/384

Microsoft Strong Cryptographic Provider

Implements the following algorithms.

NameUseTypeKey size (Default/Min/Max)
Data Encryption Standard (DES)EncryptionBlock56/56/56
Two Key Triple DESEncryptionBlock112/112/112
Three Key Triple DESEncryptionBlock168/168/168
Hashed Message Authentication Checksum (HMAC)HashingAny0/0/0
Message Authentication Checksum (MAC)HashingAny0/0/0
Message Digest 2 (MD2)HashingAny128/128/128
Message Digest 4 (MD4)HashingAny128/128/128
Message Digest 5 (MD5)HashingAny128/128/128
RSA Data Security 2 (RC2)EncryptionBlock128/40/128
RSA Data Security 4 (RC4)EncryptionStream128/40/128
RSA Key ExchangeKey exchangeRSA1024/384/16384
RSA SignatureSigningRSA1024/384/16384
Secure Hash Algorithm (SHA1)HashingAny160/160/160
Secure Socket Layer 3 SHA and MD5 (SSL3 SHAMD5)HashingAny288/288/288

Understanding Cryptographic Providers

CryptoAPI Cryptographic Service Providers - Win32 apps (2024)

FAQs

Is CryptoAPI deprecated? ›

Important: This API is deprecated. New and existing software should start using Cryptography Next Generation APIs.

Can I disable Cryptographic Services in Windows? ›

If you want to have the feature disabled, you can perform this, STOP the Cryptographic Services service either in command prompt (run as administrator) or in services. msc It may take a few minutes for the service to finally stop. It may also, stop, but restart on it's own again requiring you to stop it again.

What is an example of a cryptographic service provider? ›

A cryptographic service provider (CSP) has both a name and a type. For example, the name of one of the CSPs currently shipped with the operating system is Microsoft Base Cryptographic Provider. It is a PROV_RSA_FULL type provider. The name of each provider is unique; the provider type is not.

What does cryptographic service do? ›

A service that provides confidentiality, integrity, source authentication, entity authentication, non-repudiation support, access control and availability (e.g., encryption and decryption, and digital signature generation and verification).

What are the benefits of a CryptoAPI? ›

CryptoAPI supports both public-key and symmetric key cryptography, though persistent symmetric keys are not supported. It includes functionality for encrypting and decrypting data and for authentication using digital certificates.

What is CryptoAPI? ›

Crypto APIs is a blockchain infrastructure layer that radically simplifies the development of blockchain and crypto related applications by providing all needed blockchain APIs. We provide fast, reliable, and unified API solutions to access real-time and historical data from crypto market and blockchain protocols.

What is the use of cryptographic security services? ›

Cryptography and Network Security are used in cloud computing to secure the data storage and services related to the cloud. It is used to protect sensitive information and ensures national security. It is used to secure online transactions in banking, e-commerce etc.

How do I turn off cryptography in Windows? ›

Type and search [Device encryption settings] in the Windows search bar①, then click [Open]②. On the Device encryption field, set the option to [Off]③.

How do you disable system cryptography? ›

In Security Settings, expand Local Policies, and then click Security Options. Under Policy in the right pane, double-click System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing, and then click Disabled.

What are the 4 Cryptographic Services? ›

Cryptographic Services includes ICSF, PKI Services, OCSF, and System SSL, and provides cryptographic functions for data secrecy, data integrity, personal identification, digital signatures, and the management of cryptographic keys.

What is Microsoft Platform Crypto provider? ›

Modern Microsoft cryptography providers
Provider Name & TypeDescriptionDefault Microsoft Templates
Microsoft Platform Crypto Provider (CNG)Generates and stores keys in Trusted Platform Modules. Supports Key Attestation to allow CA to ensure key is created in TPM/Virtual smart cardNone
3 more rows

Which company uses cryptography? ›

IdQuantique. ID Quantique (IDQ) is the leader in high-performance multi-protocol network encryption based on conventional and quantum technologies.

What is the main purpose of cryptography? ›

The Importance of Cryptography

Individuals and organizations use cryptography on a daily basis to protect their privacy and keep their conversations and data confidential. Cryptography ensures confidentiality by encrypting sent messages using an algorithm with a key only known to the sender and recipient.

What are the uses of cryptographic controls? ›

Cryptographic controls find application in various scenarios and use cases within information security systems including data protection, secure communication and transport, non-repudiation of transactions, etc.

What is cryptography as a service? ›

CaaS allows an organization to consume cryptographic processing from the Entrust Datacard™ Secure Data Center of your choice to provide HSM services for your in-house or cloud-based applications and data. It enables multiple customer systems to use as much or as little cryptographic processing as required.

Is sfapi deprecated? ›

SAP is deprecating all Employee Central SFAPIs in favor of OData APIs. If you use SFAPIs, please convert the SOAP API calls to OData ones.

Can you still use a deprecated API? ›

API deprecation is the process of gracefully discontinuing an API. The process starts by first informing the customers that the API is no longer actively supported even though it will be operational and suggesting them to migrate to an alternate or latest version of the API.

Is Pycrypto deprecated? ›

pycrypto library is known to have publicly disclosed buffer overflow vulnerability https://github.com/dlitz/pycrypto/issues/176. It is no longer actively maintained and has been deprecated in favor of pyca/cryptography library.

What is deprecated in Crypto? ›

Deprecation in the context of cybersecurity refers to the process of phasing out or retiring software, protocols, or cryptographic algorithms. This is done because they are no longer considered secure due to vulnerabilities, weaknesses, or obsolescence, and can pose a risk to the security of systems and data.

Top Articles
Ethereum-Kurs (ETH) aktuell: US-Börsenaufsicht SEC genehmigt Ether-ETFs
Creating a Personal Budget for Long-Term Financial Goals
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 5355

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.