Cryptographic Algorithm Validation Program CAVP

Description
Qualcomm Trusted Execution Environment Software Cryptographic Library provides various software cryptographic functionalities to the 64bit Qualcomm Trusted Execution Environment Trusted Applications.
Version
5.2.2-00027
Type
SOFTWARE
Vendor
Qualcomm Technologies, Inc
5775 Morehouse Dr
San Diego, CA 92121
USA
Contacts
Yin Ling Liong
yliong@qti.qualcomm.com
858-651-7034
858-845-1523
Jonathan Childers
jchilder@qti.qualcomm.com
858-651-7057
858-845-1523

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C536
3/8/2019
  • Qualcomm Trusted Execution Environment TZ.XF.5.2 on Qualcomm(R) Snapdragon(TM) 855
    • software
    • processor
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CCM
    • Key Length: 128, 192, 256
    • Tag Length: 32, 48, 64, 80, 96, 112, 128
    • IV Length: 56, 64, 72, 80, 88, 96, 104
    • Payload Length: 0-256
    • AAD Length: 0-524288
    Prerequisites:
  • AES-CTR
    • Direction: Encrypt
    • Key Length: 128, 192, 256
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-GCM
    • Direction: Decrypt, Encrypt
    • IV Generation: External
    • Key Length: 128, 192, 256
    • Tag Length: 128
    • IV Length: 8, 96, 480
    • Payload Length: 128, 480, 512, 1016
    • AAD Length: 0, 64, 96, 128, 256
  • AES-GMAC
    • Direction: Decrypt, Encrypt
    • IV Generation: External
    • Key Length: 128, 192, 256
    • Tag Length: 128
    • IV Length: 8, 96, 480
    • AAD Length: 0, 64, 96, 128, 256
  • AES-XTS
    • Direction: Decrypt, Encrypt
    • Key Length: 128
    • Payload Length: 4096, 8192, 65536
    • Tweak Mode: Number
  • AES-XTS
    • Direction: Decrypt, Encrypt
    • Key Length: 256
    • Payload Length: 4096, 8192, 65536
    • Tweak Mode: Number
  • ECDSA KeyGen (186-4)
    • Curve: P-224, P-256, P-384, P-521
    • Secret Generation Mode: Testing Candidates
    Prerequisites:
  • ECDSA SigGen (186-4)
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • ECDSA SigGen (186-4)
    • Component
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: P-192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384
    Prerequisites:
  • HMAC-SHA-1
    • MAC: 160
    • Key sizes < block size
    • Key size = block size
    Prerequisites:
  • HMAC-SHA2-224
    • MAC: 224
    • Key sizes < block size
    • Key size = block size
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 256
    • Key sizes < block size
    • Key size = block size
    Prerequisites:
  • HMAC-SHA2-384
    • MAC: 384
    • Key sizes < block size
    • Key size = block size
    Prerequisites:
  • HMAC-SHA2-512
    • MAC: 512
    • Key sizes < block size
    • Key size = block size
    Prerequisites:
  • KAS-ECC Component
    • Function: Key Pair Generation
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • Shared Secret Computation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-256
              • Curve: P-224
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
    Prerequisites:
  • RSA KeyGen (186-4)
      • Capabilities:
        • Key Generation Mode: B.3.3
          • Properties:
            • Modulo: 2048
            • Primality Tests: C.2
          • Properties:
            • Modulo: 3072
            • Primality Tests: C.2
    • Public Exponent Mode: Random
    • Private Key Format: Standard
    Prerequisites:
  • RSA SigGen (186-2)
      • Capabilities:
        • Signature Type: PKCS 1.5
        • Modulo: 4096
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
        • Modulo: 4096
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • RSA SigGen (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 512
    Prerequisites:
  • RSA Signature Primitive
    • Private Key Format: standard
  • RSA SigVer (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 160
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 496
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 160
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 160
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 512
    • Public Exponent Mode: Random
    Prerequisites:
  • SHA-1
    • Message Length: 0-51200 Increment 8
  • SHA-224
    • Message Length: 0-51200 Increment 8
  • SHA-256
    • Message Length: 0-51200 Increment 8
  • SHA-384
    • Message Length: 0-102400 Increment 8
  • SHA-512
    • Message Length: 0-102400 Increment 8
  • TDES-CBC
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-ECB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
Created October 05, 2016, Updated June 22, 2020