Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The nShield algorithm library provides cryptographic functionality for Thales's nShield Hardware Security Modules
Version
2.51.10 (Firmware)
Type
SOFTWARE
Vendor
Thales E-Security Ltd
Jupiter House
Station Road
Cambridge CB5 8JJ
UK
Contacts
Thales Certification Team
nshield-certifications@thales-esecurity.com
+44 1223 723600
Fax: +44 1223 723601
Thales Sales
sales@thalesesec.com
888 744 4976

Validations

Number
Date
Operating Environments
Algorithm Capabilities
ECDSA 318
7/13/2012
  • Freescale PowerPC
  • ECDSA KeyGen
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
    Prerequisites:
  • ECDSA KeyGen (186-2):
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
    Prerequisites:
  • ECDSA KeyVer
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
  • ECDSA KeyVer (186-2):
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
  • ECDSA SigGen
      • Capabilities:
        • Curve: K-233, P-224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-283, K-283, P-256, P-384
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-571, K-571, P-521
        • Hash Algorithm: SHA2-512
      • Capabilities:
        • Curve: B-409, K-409
        • Hash Algorithm: SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-233
        • Hash Algorithm: SHA2-224
      • Capabilities:
        • Curve: B-163, K-163, P-192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • ECDSA SigGen (186-2):
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
    Prerequisites:
  • ECDSA SigVer
      • Capabilities:
        • Curve: B-163, K-163, P-192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-233, K-233, P-224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-283, K-283, P-256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-409, P-384
        • Hash Algorithm: SHA2-384, SHA2-512
      • Capabilities:
        • Curve: B-571, K-571, P-521
        • Hash Algorithm: SHA2-512
      • Capabilities:
        • Curve: K-409
        • Hash Algorithm: SHA2-384
    Prerequisites:
  • ECDSA SigVer (186-2):
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
    Prerequisites: