Cryptographic Algorithm Validation Program CAVP

Description
The nShield algorithm X library provides cryptographic functionality for nCipher nShield Hardware Security Modules.
Version
1.0 (Firmware)
Type
SOFTWARE
Vendor
nCipher Security Limited
One Station Square
Suite 710
Cambridge, FL CB1 2GA
United Kingdom
Contacts
sales@ncipher.com
sales@ncipher.com
888-744-4976

Component 696 First Validated: 12/18/2015

Operating Environment Algorithm Capabilities
Freescale PowerPC
KAS-ECC Component
  • Function: Key Pair Generation, Partial Public Key Validation
  • Scheme:
    • Ephemeral Unified:
      • KAS Role: Initiator, Responder
      • Shared Secret Computation:
        • Parameter Set:
          • EB:
            • Hash Algorithm: SHA2-256
            • Curve: P-224
          • EC:
            • Hash Algorithm: SHA2-256
            • Curve: P-256
          • ED:
            • Hash Algorithm: SHA2-512
            • Curve: P-384
          • EE:
            • Hash Algorithm: SHA2-512
            • Curve: P-521
    • One Pass DH:
      • KAS Role: Initiator, Responder
      • Shared Secret Computation:
        • Parameter Set:
          • EB:
            • Hash Algorithm: SHA2-256
            • Curve: P-224
          • EC:
            • Hash Algorithm: SHA2-256
            • Curve: P-256
          • ED:
            • Hash Algorithm: SHA2-512
            • Curve: P-384
          • EE:
            • Hash Algorithm: SHA2-512
            • Curve: P-521
    • Static Unified:
      • KAS Role: Initiator, Responder
      • Shared Secret Computation:
        • Parameter Set:
          • EB:
            • Hash Algorithm: SHA2-256
            • Curve: P-224
          • EC:
            • Hash Algorithm: SHA2-256
            • Curve: P-256
          • ED:
            • Hash Algorithm: SHA2-512
            • Curve: P-384
          • EE:
            • Hash Algorithm: SHA2-512
            • Curve: P-521
Prerequisites:

Created October 05, 2016, Updated November 24, 2020