Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.
Version
1.0.1
Type
SOFTWARE
Vendor
Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia
Contacts
David Hook
dgh@bouncycastle.org
+61438170390
Jon Eaves
jon@bouncycastle.org
+61417502969

Component 1400 First Validated: 9/1/2017

Operating Environment Algorithm Capabilities
Android Lollipop 5.1 on Qualcomm MSM8960 Pro
  • software: Android Lollipop 5.1
  • processor: Qualcomm MSM8960 Pro
    • manufacturer: Qualcomm
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Android Marshmallow 6.0 on Qualcomm MSM8956
  • software: Android Marshmallow 6.0
  • processor: Qualcomm MSM8956
    • manufacturer: Qualcomm
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Android Oreo 8.1 on Qualcomm SDM660
  • software: Android Oreo 8.1
  • processor: Qualcomm SDM660
    • manufacturer: Qualcomm
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5 on Intel Xeon Processor X5670
  • processor: Qualcomm SDM660
    • manufacturer: Qualcomm
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
Prerequisites:
Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5 on Intel Xeon Processor X5670
  • processor: Qualcomm SDM660
    • manufacturer: Qualcomm
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
Prerequisites:
Linux 3.10 on Intel Xeon E5-2697 v3
  • processor: Intel Xeon E5-2697 v3
    • manufacturer: Intel
  • software: Linux 3.10
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Linux 3.10 on Intel Xeon Silver 4110
  • processor: Intel Xeon Silver 4110
    • manufacturer: Intel
  • software: Linux 3.10
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
PhotonOS 2.0 running on ESXi 6.7 with JRE 1.8 on Intel Xeon 6126
  • processor: Intel Xeon 6126
    • manufacturer: Intel
  • software: PhotonOS 2.0 running on ESXi 6.7 with JRE 1.8
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Ubuntu 16.04 running on ESXi 6.7 with JRE 1.8 on Intel Xeon 6126
  • processor: Intel Xeon 6126
    • manufacturer: Intel
  • software: Ubuntu 16.04 running on ESXi 6.7 with JRE 1.8
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Ubuntu 16.04 running on ESXi 7.0 with JDK 8 on Intel Xeon Gold 6126
  • processor: Intel Xeon Gold 6126
    • manufacturer: Intel
  • software: Ubuntu 16.04 running on ESXi 7.0 with JDK 8
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Ubuntu 18.04 running on ESXi 7.0 with JDK 11 on Intel Xeon Gold 6126
  • processor: Intel Xeon Gold 6126
    • manufacturer: Intel
  • software: Ubuntu 18.04 running on ESXi 7.0 with JDK 11
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:
Windows Server 2016 running on ESXi 6.7 with JRE 1.8 on Intel Xeon 6126
  • processor: Intel Xeon 6126
    • manufacturer: Intel
  • software: Windows Server 2016 running on ESXi 6.7 with JRE 1.8
ECDSA SigGen (FIPS186-4)
  • Component
    • Capabilities:
      • Curve: P-224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-384
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: K-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-233
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-283
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-409
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • Curve: B-571
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Prerequisites:

Created October 05, 2016, Updated December 18, 2020