Originally Posted by JohnTheRipper
Unfortunately for me:
V number (Optional but strongly recommended) A code specifying the algorithm to be used in encrypting
and decrypting the document:
0 An algorithm that is undocumented and no longer supported, and whose use is
strongly discouraged.
1 Algorithm 3.1 on page 73, with an encryption key length of 40 bits; see below.
2 (PDF 1.4) Algorithm 3.1 on page 73, but allowing encryption key lengths greater
than 40 bits.
3 (PDF 1.4) An unpublished algorithm allowing encryption key lengths ranging
from 40 to 128 bits. (This algorithm is unpublished as an export requirement of
the U.S. Department of Commerce.)
|