Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.
Version
1.2.0
Type
SOFTWARE
Vendor
Pure Storage, Inc.
650 Castro Street
Suite 400
Mountain View, CA 94041
USA
Contacts
John Fuchigami
jfuchigami@purestorage.com
800-379-7873
Ram Lakshminarayanan
rlakshminarayanan@purestorage.com
800-379-7873

Validations

Number
Date
Operating Environments
Algorithm Capabilities
DRBG 2157
6/15/2018
  • Purity 5 on Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold)
  • Purity 5 on Intel Xeon x64 CPU with AES-NI (E5 Family)
  • Counter DRBG
    • Prediction Resistance: Yes
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: Yes
    Prerequisites:
SHS 4398
6/15/2018
  • Purity 5 on Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold)
  • Purity 5 on Intel Xeon x64 CPU with AES-NI (E5 Family)
  • SHA-256
    • Message Length: 0-51200 Increment 8
AES 5480
6/15/2018
  • Purity 5 on Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold)
  • Purity 5 on Intel Xeon x64 CPU with AES-NI (E5 Family)
  • AES-CTR
    • Key Length: 128, 256
    • Counter Source: External, Internal
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 256
  • AES-KW
    • Direction: Decrypt, Encrypt
    • Cipher: Cipher
    • Key Length: 128, 256
    • Payload Length: 128, 192, 256, 320, 2048
HMAC 3635
6/15/2018
  • Purity 5 on Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold)
  • Purity 5 on Intel Xeon x64 CPU with AES-NI (E5 Family)