Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program CAVP

Description
ICC is a C language implementation of cryptographic functions based on the cryptographic library that uses the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.
Version
8.0.0
Type
SOFTWARE
Vendor
IBM Corporation IBM/Tivoli
P.O. Box 3499
Australia Fair
Southport, Queensland 4215
Australia
Contacts
Peter Waltenberg
pwalten@au1.ibm.com
+61 7 5552 4016
+61 7 5571 0420
Alex Hennekam
alexhenn@au1.ibm.com
+61 7 5552 4045
+61 7 5571 0420

Validations

Number
Date
Operating Environments
Algorithm Capabilities
RSA 631
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
  • RSA KeyGen (186-2)
    • Modulus Length: 1024, 1536, 2048, 3072, 4096
    • Public Key Value: 3, 17
    Prerequisites:
  • RSA SigGen (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
        • Modulo: 1024, 1536, 2048, 3072, 4096
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • RSA SigVer (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
    Prerequisites:
DSA 423
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
SHS 1205
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
  • SHA-1
    • Message Length: 0-51200 Increment 8
  • SHA-224
    • Message Length: 0-51200 Increment 8
  • SHA-256
    • Message Length: 0-51200 Increment 8
  • SHA-384
    • Message Length: 0-102400 Increment 8
  • SHA-512
    • Message Length: 0-102400 Increment 8
ECDSA 158
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
TDES 918
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
  • TDES-CBC
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-CFB64
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-ECB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-OFB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
HMAC 767
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
AES 1319
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CCM
    • Key Length: 128, 192, 256
    • Tag Length: 32, 48, 64, 80, 96, 112, 128
    • IV Length: 56, 64, 72, 80, 88, 96, 104
    • Payload Length: 0-256
    • AAD Length: 0-524288
    Prerequisites:
  • AES-CFB1
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CFB128
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CFB8
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CMAC
      • Capabilities:
        • Direction: Generation, Verification
        • Key Length: 128, 192, 256
        • MAC: 64-128
        • Message Length: 0-524288
        • Block Size: Full, Partial
    Prerequisites:
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-GCM
    • Direction: Decrypt, Encrypt
    • IV Generation: Internal
    • IV Generation Mode: 8.2.2
    • Key Length: 128, 192, 256
    • Tag Length: 128
    • IV Length: 96
    • Payload Length: 1024
    • AAD Length: 1024
    Prerequisites:
  • AES-OFB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
DRBG 35
4/21/2010
  • Red Hat Enterprise Linux Server 5 on IBM PowerPC 5 64-bit
    • IBM PowerPC 5 64-bit w/ Red Hat Enterprise Linux Server 5
  • Counter DRBG
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: Yes
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: Yes
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: Yes
    Prerequisites:
  • HMAC DRBG
      • Capabilities:
        • Mode: SHA-1
      • Capabilities:
        • Mode: SHA2-224
      • Capabilities:
        • Mode: SHA2-256
    Prerequisites:
Created October 05, 2016, Updated June 22, 2020