| RIM Crypto API: Cryptographic algorithms |
This document provides information on the different algorithms and functions provided by Research In Motion's Crypto related factories.
Because of memory-related handheld constraints, not all of the supported algorithms are loaded on the device in its default configuration. To maximize performance, the handheld can be optimized to include only a minimal set of crypto functionality. Conversely, to increase security, users who wish to use PGP, S/MIME or TLS must load a larger set of crypto files on the device.
For organization, and for increased performance, the crypto api has been organized into three .cod or .jar files. The list below describes the algorithms that are provided as part of the base install and the algorithms provided in each of the three crypto jar files. All of the crypto jar files build on each other. That is, the presence of Crypto 2, ensures that Crypto 1 is already installed on the handheld.