2.3 Encryption


This section specifies encryption and obfuscation. The four different techniques are:

  • ECMA-376 encryption [ECMA-376], which leverages the data spaces storages specified in section 2.1.

  • CryptoAPI RC4 encryption.

  • RC4 encryption.

  • XOR obfuscation.

ECMA-376 encryption [ECMA-376] also includes encryption using a third-party cryptography extension, which will be called extensible encryption in the remainder of this document.