Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The nCipher algorithm library provides cryptographic functionality for nCipher's nShield Hardware Security Modules.
Version
5.0 (Firmware)
Type
SOFTWARE
Vendor
nCipher Corporation Ltd.
Jupiter House, Station Road
Cambridge CB1 2JD
United Kingdom
Contacts
Marcus Streets
sales@ncipher.com
+44 1223 723600
Fax: +44 1223 723601
Mark Wooding
mwooding@ncipher.com
+44 1223 723600
Fax: +44 1223 723601

Validations

Number
Date
Operating Environments
Algorithm Capabilities
TDES 625
12/31/2007
  • Motorola Power PC
  • TDES-CBC
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-ECB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
RSA 320
12/31/2007
  • Motorola Power PC
  • RSA KeyGen (186-2)
    • Modulus Length: 1024, 1536, 2048, 3072, 4096
    • Public Key Value: 3, 17, 65537
    Prerequisites:
  • RSA SigGen (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
        • Modulo: 1024, 1536, 2048, 3072, 4096
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
        • Modulo: 1024, 1536, 2048, 3072, 4096
        • Hash Algorithm: SHA-1
    Prerequisites:
  • RSA SigVer (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
    Prerequisites:
ECDSA 76
12/31/2007
  • Motorola Power PC
AES 685
12/31/2007
  • Motorola Power PC
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CMAC
      • Capabilities:
        • Direction: Generation, Verification
        • Key Length: 128, 192, 256
        • MAC: 128
        • Message Length: 0-524288
        • Block Size: Full
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
SHS 713
12/31/2007
  • Motorola Power PC
  • SHA-1
    • Message Length: 0-65536 Increment 8
  • SHA-224
    • Message Length: 0-65536 Increment 8
  • SHA-256
    • Message Length: 0-65536 Increment 8
  • SHA-384
    • Message Length: 0-65536 Increment 8
  • SHA-512
    • Message Length: 0-65536 Increment 8
RNG 399
12/31/2007
  • Motorola Power PC
HMAC 364
12/31/2007
  • Motorola Power PC
DSA 259
12/31/2007
  • Motorola Power PC