Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.
Version
1.0.0
Type
SOFTWARE
Vendor
Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia
Contacts
David Hook
dgh@bouncycastle.org
+61438170390
Jon Eaves
jon@bouncycastle.org
+61417502969

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KDF 78
1/15/2016
  • Java SE Runtime Env 7 on Solaris 11 on vSphere 6 on Intel Xeon E5 v3
  • Java SE Runtime Env 8 on Centos 6.4 on vSphere 6 on Intel Xeon E5 v3
  • Ubuntu 14.04 LTS on VMWare ESXi 6.0 on Intel Xeon E5-2697 V3
  • KDF SP800-108
      • Capabilities:
        • KDF Mode: Counter
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, In the Middle of Fixed Data
        • Counter Length: 8, 16, 24, 32
      • Capabilities:
        • KDF Mode: Feedback
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, Before Iteration Data
        • Counter Length: 8, 16, 24, 32
        • Supports Empty IV
      • Capabilities:
        • KDF Mode: Double Pipeline Iteration
        • SPs used to generate K: SP 800-56A, SP 800-56B, SP 800-90A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: After Fixed Data, Before Fixed Data, Before Iteration Data
        • Counter Length: 8, 16, 24, 32
    Prerequisites: