Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Product Name
Description
SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.
Version
3.0.1
Type
SOFTWARE
Vendor
SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA
Contacts
SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

Validations

Number
Date
Operating Environments
Algorithm Capabilities
ECDSA 1487
7/6/2018
  • Java SE 8 on Red Hat Enterprise Linux 7 on Intel i7
  • Java SE 8 on Windows Server 2012 R2 on Intel i7
  • ECDSA KeyGen (186-4)
    • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    • Secret Generation Mode: Testing Candidates
    Prerequisites:
  • ECDSA KeyVer (186-4)
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
  • ECDSA SigGen (186-4)
      • Capabilities:
        • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites:
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites: