General Encryption Algorithm - Adobe 12020596 Supplement Manual

Supplement to the iso 32000, baseversion: 1.7, extensionlevel: 3
Table of Contents

Advertisement

Adobe Acrobat SDK
Adobe® Supplement to the ISO 32000
KEY
StrF
EFF

3.5.1 General Encryption Algorithm

On page 119, modify the paragraph that begins with "PDF's standard encryption methods also make use..." as
well as the paragraph that follows as shown below. Unchanged content is shown in gray. One sentence is struck
out and replaced by another to include Encrypt version 5, introduced in extension level 3.
For Encrypt versions 1-4,
algorithm for key generation purposes (described in Internet RFC 1321, The MD5 Message-Digest
Algorithm; see the Bibliography).
The encryption of data in a PDF file is based on the use of an encryption key computed by the security
handler. Different security handlers compute the encryption key using their own mechanisms.
of how the key is computed, its use in the encryption of data is always the same (see Algorithm 3.1).
Because the RC4 algorithm and AES algorithms are symmetric, this same sequence of steps can be used
both to encrypt and to decrypt data. Encryption of data uses one of two algorithms. For Encrypt versions
1-4 (through PDF version 1.7), algorithm 3.1 is used. For Encrypt version 5 (extension level 3),
algorithm 3.1a is used. The difference is that algorithm 3.1a uses the starting key directly and does not
modify the key at all. Algorithm 3.1a is used only with the AES algorithm and 256-bit keys.
Following Algorithm 3.1, insert Algorithm 3.1a, to be used when the value of the
TABLE 3.18 Entries common to all encryption dictionaries
TYPE
DESCRIPTION
name
(Optional; meaningful only when the value of
ExtensionLevel
decrypting all strings in the document. The name must be a key in the
CF dictionary or a standard crypt filter name specified in Table 3.23.
Default value: Identity.
name
(Optional; meaningful only when the value of
ExtensionLevel
default when encrypting embedded file streams; it must correspond to
a key in the
Table 3.23.
This entry is provided by the security handler. (See implementation note
24 in Appendix H.) Applications should respect this value when
encrypting embedded files, except for embedded file streams that have
their own crypt filter specifier. If this entry is not present, and the
embedded file stream does not contain a crypt filter specifier, the
stream should be encrypted using the default stream crypt filter
specified by
PDF's standard encryption methods also make use of the MD5 message-digest
Encrypt version 5 does not use MD5.
3) The name of the crypt filter that is used when
3) The name of the crypt filter that should be used by
dictionary or a standard crypt filter name specified in
CF
StmF
Syntax (Chapter 3 in PDF Reference)
3.5.1 General Encryption Algorithm
is
or 5 for
V
4,
is
, or 5 for
V
4
Regardless
key is
.
V
5
15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Acrobat sdk 9.0

Table of Contents