Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.
Version
6.10.4 (Firmware)
Type
SOFTWARE
Vendor
SafeNet, Inc.
4690 Millennium Drive
Belcamp, MD 21017
USA
Contacts
Chris Brych
Chris.Brych@safenet-inc.com
613.221.5081
Fax: 613.723.5079
Laurie Smith
Laurie.Smith@safenet-inc.com
613.221.5026
Fax: 613.723.5079

KAS 43 First Validated: 11/8/2013

Operating Environment Algorithm Capabilities
AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
KAS-ECC
  • Scheme:
    • Ephemeral Unified:
      • KAS Role: Initiator, Responder
      • KDF without Key Confirmation:
        • KDF Option:
          • Concatenation:
        • Parameter Set:
          • EA:
            • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
            • Curve: P-192
            • MAC Option:
              • HMAC:
            • EB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • Curve: P-224
              • MAC Option:
                • HMAC:
              • EC:
                • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
                • Curve: P-256
                • MAC Option:
                  • HMAC:
                • ED:
                  • Hash Algorithm: SHA2-384, SHA2-512
                  • Curve: P-384
                  • MAC Option:
                    • HMAC:
                  • EE:
                    • Hash Algorithm: SHA2-512
                    • Curve: P-521
                    • MAC Option:
                      • HMAC:
              • One Pass DH:
                • KAS Role: Initiator, Responder
                • KDF without Key Confirmation:
                  • Parameter Set:
                    • EA:
                      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
                      • Curve: P-192
                      • MAC Option:
                        • HMAC:
                      • EB:
                        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
                        • Curve: P-224
                        • MAC Option:
                          • HMAC:
                        • EC:
                          • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
                          • Curve: P-256
                          • MAC Option:
                            • HMAC:
                          • ED:
                            • Hash Algorithm: SHA2-384, SHA2-512
                            • Curve: P-384
                            • MAC Option:
                              • HMAC:
                            • EE:
                              • Hash Algorithm: SHA2-512
                              • Curve: P-521
                              • MAC Option:
                                • HMAC:
                      Prerequisites:

                      Created October 05, 2016, Updated November 24, 2020