Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from INSIDE Secure. The module is a toolkit which provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to, primitives for DAR, DRM, TLS, and VPN on mobile devices.
Version
1.1
Type
SOFTWARE
Vendor
INSIDE Secure
Eerikinkatu 28
Helsinki 00180
Finland
Contacts
Serge Haumont
shaumont@insidesecure.com
+358 40 5808548
Marko Nippula
mnippula@insidesecure.com
+358 40 7629394

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KDF 38
12/5/2014
  • Android 4.2 on Intel Atom Z2560 w/ 32 bit library
  • Android 4.4 on ARMv7-a
  • iOS 7.1 on ARM64
  • iOS 7.1 on ARMv7
  • Raspbian Linux (kernel 3.10) on ARMv6
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 with AES-NI w/ 32 bit library
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 with AES-NI w/ 64 bit library
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 without AES-NI w/ 64 bit library
  • KDF SP800-108
      • Capabilities:
        • KDF Mode: Counter
        • SPs used to generate K: N/A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: Before Fixed Data
        • Counter Length: 8, 16, 24, 32
      • Capabilities:
        • KDF Mode: Feedback
        • SPs used to generate K: N/A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: Before Fixed Data
        • Counter Length: 8, 16, 24, 32
        • Supports Empty IV
      • Capabilities:
        • KDF Mode: Double Pipeline Iteration
        • SPs used to generate K: N/A
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Fixed Data Order: Before Fixed Data
        • Counter Length: 8, 16, 24, 32
    Prerequisites: