Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This section specifies encryption and obfuscation. The four different techniques are:
ECMA-376 encryption [ECMA-376], which leverages the data spaces storages specified in section 2.1.
CryptoAPI RC4 encryption.
RC4 encryption.
XOR obfuscation.
ECMA-376 encryption [ECMA-376] also includes encryption using a third-party cryptography extension, which will be called extensible encryption in the remainder of this document.