Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Product Name
Description
SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.
Version
3.0.1
Type
SOFTWARE
Vendor
SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA
Contacts
SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KDF 233
7/6/2018
  • Java SE 8 on Red Hat Enterprise Linux 7 on Intel i7
  • Java SE 8 on Windows Server 2012 R2 on Intel i7
  • KDF SP800-108
      • Capabilities:
        • KDF Mode: Counter
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, In the Middle of Fixed Data
        • Counter Length: 8, 16, 24, 32
      • Capabilities:
        • KDF Mode: Feedback
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, Before Iteration Data
        • Counter Length: 8, 16, 24, 32
        • Supports Empty IV
      • Capabilities:
        • KDF Mode: Double Pipeline Iteration
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, Before Iteration Data
        • Counter Length: 8, 16, 24, 32
    Prerequisites: