The group of flags in the top left part of the dialog box (Depends on ID, Depends on counter & With counter decrement) serves for setting the hardware algorithm properties. Combining these properties allows for creating algorithms with various operating modes adapted for solving different tasks (generating of random numbers, limiting number of runs, etc.). 

Valid combinations of algorithm properties flags:

Flags combinationAlgorithm operating modeDescription of a mode
Flags not setDefault modeFlag-independent algorithm
Depends on IDAlgorithm is unique by IDEncryption is dongle ID-based. With the same determinants algorithms will encrypt data differently in different dongles
Depends on counterAlgorithm is counter dependentA 4-byte value defining the type of encryption is written into the counter field. With the same determinants algorithms with different counter values will encrypt data differently
With counter decrementLimited number of algorithm runsA 4-byte initial value is written into the algorithm counter field. The counter decrements on each call of GrdTransform and stops execution when 0 value is reached
Depends on ID and Depends on counterAlgorithm is counter-dependent + algorithm is unique by IDEncryption is dongle ID-based. A 4-byte value defining the type of encryption is written into the counter field. With the same determinants algorithms with different counter values will encrypt data differently
Depends on ID and With counter decrementLimited number of algorithm runs + algorithm is unique by ID

Encryption is dongle ID-based. With the same determinants algorithms will encrypt data differently in different dongles. 

A 4-byte initial value is written into the algorithm counter field. The counter decrements on each call of GrdTransform and stops execution when 0 value is reached

Depends on counter and With counter decrementGenerator of pseudorandom numbersA large 4-byte initial value is written into the algorithm counter field. The counter decrements on each call of GrdTransform and stops execution when 0 value is reached. Whereas the encryption is handled differently with each counter decrement
Depends on ID, Depends on counter and With counter decrementGenerator of pseudorandom numbers

Encryption is dongle ID based depends on dongle ID. With the same determinants algorithms will encrypt data differently in different dongles.

A large 4-byte initial value is written into the algorithm counter field. The counter decrements on each call of GrdTransform and stops execution when 0 value is reached. Whereas the encryption is handled differently with each counter decrement

Important information

Listed flags and their combinations are available not with all types of dongles. 

  • No labels