Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
IDCore 30 rev B is a highly secured smartcard platform compliant with Javacard 2.2.2, Global Platform 2.1.1 & 2.2 Amendment D standards, designed to operate with Infineon SLE78 chip family. The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, SP800-108 KDF and SP800-90A DRBG.
Version
IFX SLE78CFX3000PH 1.2 (Firmware)
Type
FIRMWARE
Vendor
Gemalto
Avenue du Jujubier
Z.I Athelia IV
La Ciotat 13705
France
Contacts
Florence DEFRANCE
Florence.defrance@gemalto.com
+33 442366734
Fax: +33 442365792
Arnaud LOTIGIER
Arnaud.lotigier@gemalto.com
+33 442366074
Fax: +33 442365545

Validations

Number
Date
Operating Environments
Algorithm Capabilities
ECDSA 814
1/15/2016
  • Infineon SLE78 chip family
  • ECDSA KeyGen (186-4)
    • Curve: P-224, P-256, P-384, P-521
    • Secret Generation Mode: Extra Bits
    Prerequisites:
  • ECDSA SigGen (186-4)
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA2-224
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-224, SHA2-256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: P-192
        • Hash Algorithm: SHA-1
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA-1, SHA2-224
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites: