Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.
Version
1.0.1
Type
SOFTWARE
Vendor
Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia
Contacts
David Hook
dgh@bouncycastle.org
+61438170390
Jon Eaves
jon@bouncycastle.org
+61417502969

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KAS 89
8/4/2016
  • Windows 10 Enterprise (64 bit) on Intel Core i7 (6th Gen)
  • Windows 10 Professional 64 bit on Intel Atom
  • Windows 7 SP1 32 bit on Intel Core i5 (5th Gen)
  • Windows 8.1 Professional 32 bit on Intel Core i5 (5th Gen)
  • KAS-ECC
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
              • EC:
                • Hash Algorithm: SHA2-256
                • Curve: P-256
                • MAC Option:
                  • AES-CCM:
                • ED:
                  • Hash Algorithm: SHA2-384
                  • Curve: P-384
                  • MAC Option:
                    • HMAC:
                  • EE:
                    • Hash Algorithm: SHA2-512
                    • Curve: P-521
                    • MAC Option:
                      • HMAC:
              • One Pass DH:
                • KAS Role: Initiator, Responder
                • KDF without Key Confirmation:
                  • Parameter Set:
                    • EB:
                      • Hash Algorithm: SHA2-224
                      • Curve: P-224
                      • MAC Option:
                        • AES-CCM:
                      • EC:
                        • Hash Algorithm: SHA2-256
                        • Curve: P-256
                        • MAC Option:
                          • AES-CCM:
                        • ED:
                          • Hash Algorithm: SHA2-384
                          • Curve: P-384
                          • MAC Option:
                            • HMAC:
                          • EE:
                            • Hash Algorithm: SHA2-512
                            • Curve: P-521
                            • MAC Option:
                              • HMAC:
                      • Static Unified:
                        • KAS Role: Initiator, Responder
                        • KDF without Key Confirmation:
                          • Parameter Set:
                            • EB:
                              • Hash Algorithm: SHA2-224
                              • Curve: P-224
                              • MAC Option:
                                • AES-CCM:
                              • EC:
                                • Hash Algorithm: SHA2-256
                                • Curve: P-256
                                • MAC Option:
                                  • AES-CCM:
                                • ED:
                                  • Hash Algorithm: SHA2-384
                                  • Curve: P-384
                                  • MAC Option:
                                    • HMAC:
                                  • EE:
                                    • Hash Algorithm: SHA2-512
                                    • Curve: P-521
                                    • MAC Option:
                                      • HMAC:
                            Prerequisites: