Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
CryptoComply | Mobile is a standards-based “Drop-in Compliance” solution for mobile devices. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads functions for secure key management, data integrity, data at rest encryption, and secure communications.
Version
2.1
Type
SOFTWARE
Vendor
SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA
Contacts
SafeLogic Inside Sales
sales@safelogic.com

Validations

Number
Date
Operating Environments
Algorithm Capabilities
DRBG 234
7/18/2012
  • iOS 5.1 on A5X
  • iOS 6 on A5X
  • iOS 7 on A5X
  • Counter DRBG
    • Prediction Resistance: Yes, No
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: Yes
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: Yes
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: No
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: Yes
    Prerequisites:
  • Dual EC DRBG:
    • Prediction Resistance: Enabled, Not Enabled
    • P-256 Modes: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • P-384 Modes: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • P-521 Modes: SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • Hash DRBG
    • Prediction Resistance: Yes, No
      • Capabilities:
        • Mode: SHA-1
      • Capabilities:
        • Mode: SHA2-224
      • Capabilities:
        • Mode: SHA2-256
      • Capabilities:
        • Mode: SHA2-384
      • Capabilities:
        • Mode: SHA2-512
    Prerequisites:
  • HMAC DRBG
    • Prediction Resistance: Yes, No
      • Capabilities:
        • Mode: SHA-1
      • Capabilities:
        • Mode: SHA2-224
      • Capabilities:
        • Mode: SHA2-256
      • Capabilities:
        • Mode: SHA2-384
      • Capabilities:
        • Mode: SHA2-512/256
    Prerequisites: