Adobe 12020596 User Guide - Page 14

TABLE 3.18 Entries common to all encryption dictionaries, DESCRIPTION

Page 14 highlights

Adobe Acrobat SDK Adobe® Supplement to the ISO 32000 Syntax (Chapter 3 in PDF Reference) 3.5 Encryption 14 Modify Table 3.18 as shown below where only entries that changed are listed in the table. The V entry has a new value of 5; the only change to the other listed entries (StmF, StrF, and EFF) is to qualify them for use when V is 5. Unchanged text is shown in gray. TABLE 3.18 Entries common to all encryption dictionaries KEY TYPE DESCRIPTION V number (Optional but strongly recommended) A code specifying the algorithm to be used in encrypting and decrypting the document: 0, An algorithm that is undocumented and no longer supported, and whose use is strongly discouraged. Old files may use this value but no new files should be written using 0. 1, Algorithm 3.1 on page 119, with an encryption key length of 40 bits; see below. 2, (PDF 1.4) Algorithm 3.1, but permitting encryption key lengths greater than 40 bits. 3, (PDF 1.4) An unpublished algorithm that permits encryption key lengths ranging from 40 to 128 bits; see implementation note 22 in Appendix H. 4, (PDF 1.5) The security handler defines the use of encryption and decryption in the document, using the rules specified by the CF, StmF, and StrF entries using algorithm 3.1 with a key length of 128 bits. 5, (ExtensionLevel 3) The security handler defines the use of encryption and decryption in the document, using the rules specified by the CF, StmF, and StrF entries using algorithm 3.1a with a key length of 256 bits. The default value if this entry is omitted is 0, but a value of 1 or greater is strongly recommended. (See implementation note 23 in Appendix H.) StmF name (Optional; meaningful only when the value of V is 4, or 5 for ExtensionLevel 3) The name of the crypt filter that is used by default when decrypting streams. The name must be a key in the CF dictionary or a standard crypt filter name specified in Table 3.23. All streams in the document, except for cross-reference streams (see Section 3.4.7, "Cross-Reference Streams") or streams that have a Crypt entry in their Filter array (see Table 3.5), are decrypted by the security handler, using this crypt filter. Default value: Identity.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Adobe Acrobat SDK
Syntax (Chapter 3 in PDF Reference)
Adobe® Supplement to the ISO 32000
3.5 Encryption
14
Modify Table 3.18 as shown below where only entries that changed are listed in the table. The
V
entry has a new
value of 5; the only change to the other listed entries (
StmF
,
StrF
, and
EFF
) is to qualify them for use when
V
is
5
. Unchanged text is shown in gray.
TABLE 3.18 Entries common to all encryption dictionaries
KEY
TYPE
DESCRIPTION
V
number
(
Optional but strongly recommended
) A code specifying the algorithm to
be used in encrypting and decrypting the document:
0
, An algorithm that is undocumented and no longer supported, and
whose use is strongly discouraged.
Old files may use this value but
no new files should be written using 0.
1
, Algorithm 3.1 on page 119, with an encryption key length of 40
bits; see below.
2
, (PDF 1.4) Algorithm 3.1, but permitting encryption key lengths
greater than 40 bits.
3
, (PDF 1.4) An unpublished algorithm that permits encryption key
lengths ranging from 40 to 128 bits; see implementation note 22 in
Appendix H.
4
, (PDF 1.5) The security handler defines the use of encryption and
decryption in the document, using the rules specified by the
CF
,
StmF
, and
StrF
entries
using algorithm 3.1 with a
key length of 128
bits.
5, (
ExtensionLevel 3
) The security handler defines the use of
encryption and decryption in the document, using the rules
specified by the
CF
,
StmF
, and
StrF
entries using algorithm 3.1a
with a
key length of 256 bits.
The default value if this entry is omitted is 0, but a value of 1 or greater is
strongly recommended.
(See implementation note 23 in Appendix H.)
StmF
name
(
Optional; meaningful only when the value of
V
is
4
,
or 5 for
ExtensionLevel 3
) The name of the crypt filter that is used by default
when decrypting streams. The name must be a key in the
CF
dictionary
or a standard crypt filter name specified in Table 3.23. All streams in the
document, except for cross-reference streams (see Section 3.4.7,
“Cross-Reference Streams”) or streams that have a
Crypt
entry in their
Filter
array (see Table 3.5), are decrypted by the security handler,
using this crypt filter.
Default value: Identity.