Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Product Name
Description
Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with IntelĀ® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.
Version
1.0.0 (Firmware)
Type
SOFTWARE
Vendor
Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA
Contacts
Ambuj Kumar
+1 (628)-400-2043

Validations

Number
Date
Operating Environments
Algorithm Capabilities
Component 1873
5/10/2018
  • IntelĀ® Xeon E3-1230v5 4-Core, 3.40GHz with AES-NI
  • KAS-ECC CDH-Component
    • Curve: P-224, P-256, P-384, P-521
  • KAS-ECC Component
    • Function: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • Shared Secret Computation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-512
              • Curve: P-224
            • EC:
              • Hash Algorithm: SHA2-512
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-512
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
      • One Pass DH:
        • KAS Role: Initiator, Responder
        • Shared Secret Computation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-512
              • Curve: P-224
            • EC:
              • Hash Algorithm: SHA2-512
            • ED:
              • Hash Algorithm: SHA2-512
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
      • Static Unified:
        • KAS Role: Initiator, Responder
        • Shared Secret Computation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-512
              • Curve: P-224
            • EC:
              • Hash Algorithm: SHA2-512
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-512
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
    Prerequisites: