Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.
Version
8.0
Type
SOFTWARE
Vendor
Information Security Corporation
1011 Lake St. Suite 425
Oak Park, IL 60118
USA
Contacts
Jonathan Schulze-Hewett
schulze-hewett@infoseccorp.com
708-445-1704
Fax: 708-445-9705
Michael Markowitz
markowitz@infoseccorp.com
708-445-1704
Fax: 708-445-9705

Validations

Number
Date
Operating Environments
Algorithm Capabilities
DSA 1090
7/31/2016
  • CentOS 6.7 (64-bit) on Intel Core i7 with AES-NI
  • Windows 10 (64-bit) on AMD A8-3850 without AES-NI
  • Windows 10 (64-bit) on Intel Core i7 with AES-NI
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
      • Capabilities:
        • L: 2048
        • N: 256
      • Capabilities:
        • L: 3072
        • N: 256
    Prerequisites:
  • DSA PQGGen (186-4)
      • Capabilities:
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • N: 224
        • L: 2048
      • Capabilities:
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
        • N: 256
        • L: 2048
      • Capabilities:
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
        • N: 256
        • L: 3072
    Prerequisites:
  • DSA PQGVer (186-4)
      • Capabilities:
        • N: 160
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • L: 1024
      • Capabilities:
        • N: 224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • L: 2048
      • Capabilities:
        • N: 256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
        • L: 2048
      • Capabilities:
        • N: 256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
        • L: 3072
    Prerequisites:
  • DSA SigGen (186-4)
      • Capabilities:
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • N: 224
        • L: 2048
      • Capabilities:
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • N: 256
        • L: 2048
      • Capabilities:
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • N: 256
        • L: 3072
    Prerequisites:
  • DSA SigVer (186-4)
      • Capabilities:
        • N: 160
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • L: 1024
      • Capabilities:
        • N: 224
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • L: 2048
      • Capabilities:
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • L: 2048
      • Capabilities:
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
        • L: 3072
    Prerequisites: