Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
SafeZone FIPS Cryptographic Module is a FIPS 140-2 Security Level 1 validated software cryptographic module from INSIDE Secure. The module is a toolkit which provides the most commonly needed cryptographic primitives for a large variety of applications, including but not limited to, primitives for DAR, DRM, TLS, and VPN on mobile devices.
Version
1.1
Type
SOFTWARE
Vendor
INSIDE Secure
Eerikinkatu 28
Helsinki 00180
Finland
Contacts
Serge Haumont
shaumont@insidesecure.com
+358 40 5808548
Marko Nippula
mnippula@insidesecure.com
+358 40 7629394

Validations

Number
Date
Operating Environments
Algorithm Capabilities
KDF 38
12/5/2014
  • Android 4.2 on Intel Atom Z2560 w/ 32 bit library
  • Android 4.4 on ARMv7-a
  • iOS 7.1 on ARM64
  • iOS 7.1 on ARMv7
  • Raspbian Linux (kernel 3.10) on ARMv6
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 with AES-NI w/ 32 bit library
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 with AES-NI w/ 64 bit library
  • Ubuntu Linux (kernel 3.13) on Intel Atom Z3740 without AES-NI w/ 64 bit library
  • KDF
      • Capabilities:
        • Fixed Data Order: Before Fixed Data
        • KDF Mode: Counter
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Counter Length: 8, 16, 24, 32
        • SPs used to generate K: N/A
      • Capabilities:
        • Fixed Data Order: Before Fixed Data
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • KDF Mode: Feedback
        • Counter Length: 8, 16, 24, 32
        • SPs used to generate K: N/A
        • Supports Empty IV
      • Capabilities:
        • Fixed Data Order: Before Fixed Data
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Counter Length: 8, 16, 24, 32
        • KDF Mode: Double Pipeline Iteration
        • SPs used to generate K: N/A
    Prerequisites: