Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.
Version
3.0.1
Type
SOFTWARE
Vendor
SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA
Contacts
SafeLogic Inside Sales
sales@safelogic.com
(844) 436-2797

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KDF 145
8/11/2017
  • OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server on Intel Xeon X5670
  • KDF SP800-108
      • Capabilities:
        • KDF Mode: Counter
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, In the Middle of Fixed Data
        • Counter Length: 8, 16, 24, 32
      • Capabilities:
        • KDF Mode: Feedback
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, Before Iteration Data
        • Counter Length: 8, 16, 24, 32
        • Supports Empty IV
      • Capabilities:
        • KDF Mode: Double Pipeline Iteration
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, Before Iteration Data
        • Counter Length: 8, 16, 24, 32
    Prerequisites: