Public-Key Security Handlers - Adobe 12020596 Supplement Manual

Supplement to the iso 32000, baseversion: 1.7, extensionlevel: 3
Table of Contents

Advertisement

Adobe Acrobat SDK
Adobe® Supplement to the ISO 32000
1. Extend the permissions (contents of the
allows for future extension without changing the format.)
2. Record the 8 bytes of permission in the bytes 0-7 of the block, low order byte first.
3. Set byte 8 to the ASCII value '
4. Set bytes 9-11 to the ASCII characters '
5. Set bytes 12-15 to 4 bytes of random data, which will be ignored.
6. Encrypt the 16-byte block using AES-256 in ECB mode with an initialization vector of zero, using the file
encryption key as the key. The result (16 bytes) is stored as the
when the file is opened.
Algorithm 3.11 Authenticating the User Password
1. Test the password against the user key by computing the SHA-256 hash of the UTF-8 password
concatenated with the 8 bytes of User Validation Salt. If the 32-byte result matches the first 32 bytes of
the
string, this is the user password.
U
Algorithm 3.12 Authenticating the Owner Password
1. Test the password against the user key by computing the SHA-256 hash of the UTF-8 password
concatenated with the 8 bytes of Owner Validation Salt and the 48 byte
matches the first 32 bytes of the
Algorithm 3.13 Validating the Permissions
1. Decrypt the 16 byte
the file encryption key as the key. Verify that bytes 9-11 of the result are the characters '
0-3 of the decrypted
should match the value in the
key.

3.5.3 Public-Key Security Handlers

Public-Key Encryption Algorithms
On page 131, modify the paragraph shown below by inserting the indicated phrase.
The encryption key that is used by Algorithm 3.1 is calculated by means of an a SHA-1 message digest
operation
the following data, in order:
T
string using AES-256 in ECB mode with an initialization vector of zero and
Perms
entry, treated as a little-endian integer, are the user permissions. They
Perms
P
for a key length of 128 bits or a SHA-256 digest operation for a key length of 256 bits
integer) to 64 bits by setting the upper 32 bits to all 1's. (This
P
' or '
' according to the
F
', '
', '
'.
a
d
b
string, this is the user password.
O
key. Byte 8 should match the boolean value of the
Syntax (Chapter 3 in PDF Reference)
3.5.3 Public-Key Security Handlers
Boolean.
EncryptMetadata
string, and checked for validity
Perms
string. If the 32 byte result
U
21
' , '
' , '
' . Bytes
a
d
b
EncryptMetadata
that digests

Advertisement

Table of Contents
loading

This manual is also suitable for:

Acrobat sdk 9.0

Table of Contents