Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.
Version
1.0.1
Type
SOFTWARE
Vendor
Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia
Contacts
David Hook
dgh@bouncycastle.org
+61438170390
Jon Eaves
jon@bouncycastle.org
+61417502969

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KAS 89
8/4/2016
  • Windows 10 Enterprise (64 bit) on Intel Core i7 (6th Gen)
  • Windows 10 Professional 64 bit on Intel Atom
  • Windows 7 SP1 32 bit on Intel Core i5 (5th Gen)
  • Windows 8.1 Professional 32 bit on Intel Core i5 (5th Gen)
  • KAS-ECC
    • Scheme:
      • Static Unified:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • Parameter Set:
            • EE:
              • MAC Option:
                • HMAC:
                • Hash Algorithm: SHA2-512
                • Curve: P-521
              • EB:
                • Hash Algorithm: SHA2-224
                • Curve: P-224
                • MAC Option:
                  • AES-CCM:
                • EC:
                  • Hash Algorithm: SHA2-256
                  • MAC Option:
                    • AES-CCM:
                    • Curve: P-256
                  • ED:
                    • MAC Option:
                      • HMAC:
                      • Curve: P-384
                      • Hash Algorithm: SHA2-384
              • One Pass DH:
                • KAS Role: Initiator, Responder
                • KDF without Key Confirmation:
                  • Parameter Set:
                    • EE:
                      • Curve: P-521
                      • Hash Algorithm: SHA2-512
                      • MAC Option:
                        • HMAC:
                      • EC:
                        • MAC Option:
                          • AES-CCM:
                          • Hash Algorithm: SHA2-256
                          • Curve: P-256
                        • EB:
                          • Hash Algorithm: SHA2-224
                          • MAC Option:
                            • AES-CCM:
                            • Curve: P-224
                          • ED:
                            • Hash Algorithm: SHA2-384
                            • MAC Option:
                              • HMAC:
                              • Curve: P-384
                      • Ephemeral Unified:
                        • KAS Role: Initiator, Responder
                        • KDF without Key Confirmation:
                          • KDF Option:
                            • Concatenation:
                          • Parameter Set:
                            • EE:
                              • Hash Algorithm: SHA2-512
                              • MAC Option:
                                • HMAC:
                                • Curve: P-521
                              • EB:
                                • MAC Option:
                                  • AES-CCM:
                                  • Hash Algorithm: SHA2-224
                                  • Curve: P-224
                                • EC:
                                  • MAC Option:
                                    • AES-CCM:
                                    • Hash Algorithm: SHA2-256
                                    • Curve: P-256
                                  • ED:
                                    • MAC Option:
                                      • HMAC:
                                      • Curve: P-384
                                      • Hash Algorithm: SHA2-384
                            Prerequisites: