Order the encryption and hashing algorithms in order of preference within the CSP?

Posted on 2015-01-22
Last Modified: 2015-01-26
We have a two-tier pki hierarchy configured (offline root, subordinate CA) running on Microsoft Server 2012 R2. We're in the process of configuring LDAPs in our environment (and it's configured and working in our test environment).  The problem is we require AES256 to be used and I am trying to figure out how to force it on the connection when another server makes an LDAP query. Connecting with ldp.exe (and enabling the LDAP_OPT_SSL_INFO option), it's showing a cipher strength of 128-bits.

I'm guessing that on the CA side the cryptographic storage provider (CSP) that is selected determines which encryption options are available. Based on what the client has available; the client/server negotiate the highest level of encryption they can both agree on.

The certificate template that I used (which is based off of the Kerberos Authentication template) has "Microsft RSA SChannel Cryptographic Provider" selected only.  After doing some searching I am unable to determine if this would allow AES256.

So here are my questions:

1. Assuming my thinking (above) is correct on how CSPs work with Microsoft Certificate Services, which CSP should be used to allow AES256 - and if multiple support AES256 - which one is recommended?  If not please clarify how this works.

2. is there a way to order the encryption and hashing algorithms in order of preference within the CSP (via the registry or something?).
Question by:meade470
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 37

Assisted Solution

Mahesh earned 250 total points
ID: 40566253
The AES 256 encryption support added since Windows Vista

SHA and MD are hashing algorithms and AES is advanced encryption standard
SHA isn't encryption, it's a one-way hash function. AES (Advanced_Encryption_Standard) is a symmetric encryption standard.
SHA is used to generate a hash of data and AES is used to encrypt data.

By default 2008 and above CA are not prepared for AES 256
You need to run certain commands to make it AES 256 compliant

Check Configure CA encryption Settings in below article to find out commands

Also you can create Suite-B compliant V3 templates (2008 mode) by duplicating existing template
Check Creating Suite-B compliant Certificate templates in above article

Test above in test lab 1st
LVL 64

Accepted Solution

btan earned 250 total points
ID: 40567871
you should be able to dictate through use of CA certificate template, see this. Windows Server 2012 introduces the option to order the cryptographic service providers (CSPs) or key storage providers (KSPs) on the Cryptography tab. Inside you should be able to see the  Algorithm name & Minimum key size and should be able to select the CSP. It can also be enforced in Certutil as stated in Mahesh posting. The CSP should be Next Gen Crypto (which you will see in listing of CSP with "#" sign

The full setup of 2012 CA is  found in this blog, and if if you see the certutil at step 34, it stated below
certutil -setreg CA\EncryptionCSP\CNGEncryptionAlgorithm AES
certutil -setreg CA\EncryptionCSP\SymmetricKeySize 256

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question