Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
User space library providing general cryptographic services which can be linked to from any program. The module was tested with 32bit word size.
Version
1.0.1e‐30.el6_6.5
Type
SOFTWARE
Vendor
Red Hat, Inc.
100 East Davie Street
Raleigh, NC 27601
USA
Contacts
Ann Marie Rubin
arubin@redhat.com

Validations

Number
Date
Operating Environments
Algorithm Capabilities
Component 376
11/7/2014
  • Red Hat Enterprise Linux 6.6 on Intel x86
  • KAS-ECC Component
    • Function: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • Parameter Set:
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
    Prerequisites:
  • KAS-FFC Component
    • Function: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
    • Scheme:
      • dhEphem:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • Parameter Set:
            • FC:
              • Hash Algorithm: SHA2-256
    Prerequisites: