130 * cipher.init(..., s); 131 * ... 132 * 133 * </pre> 134 * The ChaCha20 and ChaCha20-Poly1305 algorithms have a similar requirement 135 * for unique nonces with a given key. After each encryption or decryption 136 * operation, callers should re-initialize their ChaCha20 or ChaCha20-Poly1305 137 * ciphers with parameters that specify a different nonce value. Please 138 * see <a href="https://tools.ietf.org/html/rfc7539">RFC 7539</a> for more 139 * information on the ChaCha20 and ChaCha20-Poly1305 algorithms. 140 * <p> 141 * Every implementation of the Java platform is required to support 142 * the following standard {@code Cipher} transformations with the keysizes 143 * in parentheses: 144 * <ul> 145 * <li>{@code AES/CBC/NoPadding} (128)</li> 146 * <li>{@code AES/CBC/PKCS5Padding} (128)</li> 147 * <li>{@code AES/ECB/NoPadding} (128)</li> 148 * <li>{@code AES/ECB/PKCS5Padding} (128)</li> 149 * <li>{@code AES/GCM/NoPadding} (128)</li> 150 * <li>{@code DES/CBC/NoPadding} (56)</li> 151 * <li>{@code DES/CBC/PKCS5Padding} (56)</li> 152 * <li>{@code DES/ECB/NoPadding} (56)</li> 153 * <li>{@code DES/ECB/PKCS5Padding} (56)</li> 154 * <li>{@code DESede/CBC/NoPadding} (168)</li> 155 * <li>{@code DESede/CBC/PKCS5Padding} (168)</li> 156 * <li>{@code DESede/ECB/NoPadding} (168)</li> 157 * <li>{@code DESede/ECB/PKCS5Padding} (168)</li> 158 * <li>{@code RSA/ECB/PKCS1Padding} (1024, 2048)</li> 159 * <li>{@code RSA/ECB/OAEPWithSHA-1AndMGF1Padding} (1024, 2048)</li> 160 * <li>{@code RSA/ECB/OAEPWithSHA-256AndMGF1Padding} (1024, 2048)</li> 161 * </ul> 162 * These transformations are described in the 163 * <a href="{@docRoot}/../specs/security/standard-names.html#cipher-algorithm-names"> 164 * Cipher section</a> of the 165 * Java Security Standard Algorithm Names Specification. 166 * Consult the release documentation for your implementation to see if any 167 * other transformations are supported. 168 * 169 * @author Jan Luehe 170 * @see KeyGenerator 171 * @see SecretKey 172 * @since 1.4 173 */ | 130 * cipher.init(..., s); 131 * ... 132 * 133 * </pre> 134 * The ChaCha20 and ChaCha20-Poly1305 algorithms have a similar requirement 135 * for unique nonces with a given key. After each encryption or decryption 136 * operation, callers should re-initialize their ChaCha20 or ChaCha20-Poly1305 137 * ciphers with parameters that specify a different nonce value. Please 138 * see <a href="https://tools.ietf.org/html/rfc7539">RFC 7539</a> for more 139 * information on the ChaCha20 and ChaCha20-Poly1305 algorithms. 140 * <p> 141 * Every implementation of the Java platform is required to support 142 * the following standard {@code Cipher} transformations with the keysizes 143 * in parentheses: 144 * <ul> 145 * <li>{@code AES/CBC/NoPadding} (128)</li> 146 * <li>{@code AES/CBC/PKCS5Padding} (128)</li> 147 * <li>{@code AES/ECB/NoPadding} (128)</li> 148 * <li>{@code AES/ECB/PKCS5Padding} (128)</li> 149 * <li>{@code AES/GCM/NoPadding} (128)</li> 150 * <li>{@code DESede/CBC/NoPadding} (168)</li> 151 * <li>{@code DESede/CBC/PKCS5Padding} (168)</li> 152 * <li>{@code DESede/ECB/NoPadding} (168)</li> 153 * <li>{@code DESede/ECB/PKCS5Padding} (168)</li> 154 * <li>{@code RSA/ECB/PKCS1Padding} (1024, 2048)</li> 155 * <li>{@code RSA/ECB/OAEPWithSHA-1AndMGF1Padding} (1024, 2048)</li> 156 * <li>{@code RSA/ECB/OAEPWithSHA-256AndMGF1Padding} (1024, 2048)</li> 157 * </ul> 158 * These transformations are described in the 159 * <a href="{@docRoot}/../specs/security/standard-names.html#cipher-algorithm-names"> 160 * Cipher section</a> of the 161 * Java Security Standard Algorithm Names Specification. 162 * Consult the release documentation for your implementation to see if any 163 * other transformations are supported. 164 * 165 * @author Jan Luehe 166 * @see KeyGenerator 167 * @see SecretKey 168 * @since 1.4 169 */ |