Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.
Version
6.31
Type
SOFTWARE
Vendor
Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA
Contacts
Bob Van Andel
bva@allegrosoft.com
978-264-6600
Fax: 978-266-1375
Loren Shade
loren@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Validations

Number
Date
Operating Environments
Algorithm Capabilities
ECDSA 1504
7/27/2018
  • Linux Mint 18 on Intel i7-6770HQ with AES-NI
  • Linux Mint 18 on Intel i7-6770HQ without AES-NI
RSA 2999
7/27/2018
  • Linux Mint 18 on Intel i7-6770HQ with AES-NI
  • Linux Mint 18 on Intel i7-6770HQ without AES-NI
  • RSA KeyGen (186-4)
      • Capabilities:
        • Key Generation Mode: B.3.6
          • Properties:
            • Modulo: 2048
            • Primality Tests: C.3
          • Properties:
            • Modulo: 3072
            • Primality Tests: C.3
    • Public Exponent Mode: Random
    Prerequisites:
  • RSA SigGen (186-4)
      • Capabilities:
        • Signature Type: ANSI X9.31
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
    Prerequisites:
  • RSA SigVer (186-4)
      • Capabilities:
        • Signature Type: ANSI X9.31
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 0
              • Hash Pair:
            • Properties:
              • Modulo: 3072
                • Hash Pair:
                  • Hash Algorithm: SHA-1
                  • Salt Length: 0
                • Hash Pair:
                  • Hash Algorithm: SHA2-224
                  • Salt Length: 0
                • Hash Pair:
                  • Hash Algorithm: SHA2-256
                  • Salt Length: 0
                • Hash Pair:
                  • Hash Algorithm: SHA2-384
                  • Salt Length: 0
                • Hash Pair:
                  • Hash Algorithm: SHA2-512
                  • Salt Length: 0
                • Hash Pair:
        • Public Exponent Mode: Random
        Prerequisites:
      HMAC 3714
      7/27/2018
      • Linux Mint 18 on Intel i7-6770HQ with AES-NI
      • Linux Mint 18 on Intel i7-6770HQ without AES-NI
      SHS 4477
      7/27/2018
      • Linux Mint 18 on Intel i7-6770HQ with AES-NI
      • Linux Mint 18 on Intel i7-6770HQ without AES-NI
      • SHA-1
        • Message Length: 0-51200 Increment 8
      • SHA-224
        • Message Length: 0-51200 Increment 8
      • SHA-256
        • Message Length: 0-51200 Increment 8
      • SHA-384
        • Message Length: 0-102400 Increment 8
      • SHA-512
        • Message Length: 0-102400 Increment 8
      AES 5573
      7/27/2018
      • Linux Mint 18 on Intel i7-6770HQ with AES-NI
      • Linux Mint 18 on Intel i7-6770HQ without AES-NI
      • AES-CBC
        • Direction: Decrypt, Encrypt
        • Key Length: 128, 192, 256
      • AES-CCM
        • Key Length: 128, 192, 256
        • Tag Length: 32, 48, 64, 80, 96, 112, 128
        • IV Length: 56, 64, 72, 80, 88, 96, 104
        • Payload Length: 0
        • AAD Length: 0
      • AES-CFB1
        • Direction: Decrypt, Encrypt
        • Key Length: 128, 192, 256
      • AES-CFB128
        • Direction: Decrypt, Encrypt
        • Key Length: 128, 192, 256
      • AES-CFB8
        • Direction: Decrypt, Encrypt
        • Key Length: 128, 192, 256
      • AES-CMAC
          • Capabilities:
            • Direction: Generation, Verification
            • Key Length: 128, 192, 256
            • MAC: 0-128
            • Message Length: 0-524288
            • Block Size: Full, Partial
      • AES-CTR
        • Key Length: 128, 192, 256
        • Counter Source: Internal
      • AES-ECB
        • Direction: Decrypt, Encrypt
        • Key Length: 128, 192, 256
      • AES-GCM
        • Direction: Decrypt, Encrypt
        • IV Generation: Internal
        • IV Generation Mode: 8.2.1
        • Key Length: 128, 192, 256
        • Tag Length: 32, 64, 96, 104, 112, 120, 128
        • IV Length: 96
        • Payload Length: 128, 136, 256, 264
        • AAD Length: 0, 128, 136, 256, 264
      • AES-GMAC
        • Direction: Decrypt, Encrypt
        • IV Generation: Internal
        • IV Generation Mode: 8.2.1
        • Key Length: 128, 192, 256
        • Tag Length: 32, 64, 96, 104, 112, 120, 128
        • IV Length: 96
        • AAD Length: 0, 128, 136, 256, 264
      • AES-KW
        • Direction: Decrypt, Encrypt
        • Cipher: Cipher
        • Key Length: 128, 192, 256
        • Payload Length: 128, 192, 256, 320, 4096
      • AES-KWP
        • Direction: Decrypt, Encrypt
        • Cipher: Cipher
        • Key Length: 128, 192, 256
        • Payload Length: 8, 32, 72, 96, 808
      • AES-OFB
        • Direction: Decrypt, Encrypt
        • Key Length: 128, 192, 256
      • AES-XTS
        • Direction: Decrypt, Encrypt
        • Key Length: 128
        • Block Size: Full, Partial
      • AES-XTS
        • Direction: Decrypt, Encrypt
        • Key Length: 256
        • Block Size: Full, Partial
      DRBG 2223
      7/27/2018
      • Linux Mint 18 on Intel i7-6770HQ with AES-NI
      • Linux Mint 18 on Intel i7-6770HQ without AES-NI
      • Hash DRBG
        • Prediction Resistance: Yes, No
          • Capabilities:
            • Mode: SHA2-224
          • Capabilities:
            • Mode: SHA2-256
          • Capabilities:
            • Mode: SHA2-384
          • Capabilities:
            • Mode: SHA2-512
        Prerequisites:
      Component 2004
      7/27/2018
      • Linux Mint 18 on Intel i7-6770HQ with AES-NI
      • Linux Mint 18 on Intel i7-6770HQ without AES-NI
      • KAS-ECC Component
        • Function: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Scheme:
          • Ephemeral Unified:
            • KAS Role: Initiator, Responder
            • Shared Secret Computation:
              • Parameter Set:
                • EB:
                  • Hash Algorithm: SHA2-256
                  • Curve: P-224
                • EC:
                  • Hash Algorithm: SHA2-256
                  • Curve: P-256
                • ED:
                  • Hash Algorithm: SHA2-512
                  • Curve: P-384
                • EE:
                  • Hash Algorithm: SHA2-512
                  • Curve: P-521
        Prerequisites: