Cryptographic Algorithm Validation Program CAVP

Description
The nShield algorithm X library provides cryptographic functionality for nCipher nShield Hardware Security Modules.
Version
1.0 (Firmware)
Type
SOFTWARE
Vendor
nCipher Security Limited
One Station Square
Suite 710
Cambridge, FL CB1 2GA
United Kingdom
Contacts
sales@ncipher.com
sales@ncipher.com
888-744-4976

ECDSA 771 First Validated: 12/11/2015

Operating Environment Algorithm Capabilities
Freescale PowerPC
ECDSA KeyGen (FIPS186-4)
  • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Secret Generation Mode: Extra Bits
Prerequisites:
Freescale PowerPC
ECDSA KeyVer (FIPS186-4)
  • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
Freescale PowerPC
ECDSA SigGen (FIPS186-4)
    • Capabilities:
      • Curve: B-233, K-233, P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-283, K-283, P-256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-409, K-409, P-384
      • Hash Algorithm: SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-571, K-571, P-521
      • Hash Algorithm: SHA2-512
Prerequisites:
Freescale PowerPC
ECDSA SigVer (FIPS186-4)
    • Capabilities:
      • Curve: B-163, K-163, P-192
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-233, P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-283, K-283, P-256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-409, K-409, P-384
      • Hash Algorithm: SHA2-384, SHA2-512
    • Capabilities:
      • Curve: B-571, K-571, P-521
      • Hash Algorithm: SHA2-512
Prerequisites:

Created October 05, 2016, Updated December 01, 2020