Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from INSIDE Secure. This compact and portable module provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to DAR, DRM, TLS, and VPN.
Version
n 1.1
Type
FIRMWARE
Vendor
INSIDE Secure
Eerikinkatu 28
Helsinki 00180
Finland
Contacts
Serge Haumont
shaumont@insidesecure.com
+358 40 5808548
Marko Nippula
mnippula@insidesecure.com
+358 40 7629394

Validations

Number
Date
Operating Environments
Algorithm Capabilities
DSA 905
11/21/2014
  • Android 4.2 on Intel Atom Z2560 w/ 32 bit library
  • iOS 7.1 on ARM64 with ARMv8 Crypto Extensions
  • iOS 7.1 on ARMv7
  • iOS 7.1 on iOS 7.1
  • Raspbian Linux (kernel 3.10) on ARMv6
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 with AES-NI w/ 32 bit library
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 with AES-NI w/ 64 bit library
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 without AES-NI w/ 64 bit library
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
      • Capabilities:
        • L: 2048
        • N: 256
      • Capabilities:
        • L: 3072
        • N: 256
    Prerequisites:
  • DSA PQGGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-256
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-256
    Prerequisites:
  • DSA PQGVer (186-4)
      • Capabilities:
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-256
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-256
    Prerequisites:
  • DSA SigGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • DSA SigVer (186-4)
      • Capabilities:
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites: