Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.
Version
1.0.2
Type
SOFTWARE
Vendor
The Legion of the Bouncy Castle Inc.
85 The Crescent
Ascot Vale, Victoria 3032
Australia
Contacts
David Hook
dgh@bouncycastle.org
+61438170390
Jon Eaves
jon@bouncycastle.org
+61417502969

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C467
2/22/2019
  • VMware Photon OS 2.0 with JDK 11 on ESXi 6.7 on Intel Xeon E5 without PAA
    • processor
      • manufacturer: Intel
    • software
  • VMware Photon OS 2.0 with JDK 7 on ESXi 6.7 on Intel Xeon E5 without PAA
    • processor
      • manufacturer: Intel
    • software
  • VMware Photon OS 2.0 with JDK 8 on ESXi 6.7 on Intel Xeon E5 without PAA
    • processor
      • manufacturer: Intel
    • software
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CCM
    • Key Length: 128, 192, 256
    • Tag Length: 32, 48, 64, 80, 96, 112, 128
    • IV Length: 56, 64, 72, 80, 88, 96, 104
    • Payload Length: 0-256
    • AAD Length: 0-524288
    Prerequisites:
  • AES-CFB128
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CFB8
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-CMAC
      • Capabilities:
        • Direction: Generation
        • Key Length: 128
        • MAC: 8, 64, 128
        • Message Length: 0, 104, 128, 376, 512, 524288
      • Capabilities:
        • Direction: Generation
        • Key Length: 192
        • MAC: 8, 64, 128
        • Message Length: 0, 104, 128, 376, 512, 524288
      • Capabilities:
        • Direction: Generation
        • Key Length: 256
        • MAC: 8, 64, 128
        • Message Length: 0, 104, 128, 376, 512, 524288
      • Capabilities:
        • Direction: Verification
        • Key Length: 128
        • MAC: 8, 64, 128
        • Message Length: 0, 104, 128, 376, 512, 524288
      • Capabilities:
        • Direction: Verification
        • Key Length: 192
        • MAC: 8, 64, 128
        • Message Length: 0, 104, 128, 376, 512, 524288
      • Capabilities:
        • Direction: Verification
        • Key Length: 256
        • MAC: 8, 64, 128
        • Message Length: 0, 104, 128, 376, 512, 524288
  • AES-CTR
    • Direction: Encrypt
    • Key Length: 128, 192, 256
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-GCM
    • Direction: Decrypt, Encrypt
    • IV Generation: External
    • Key Length: 128, 192, 256
    • Tag Length: 32, 64, 96, 104, 112, 120, 128
    • IV Length: 8, 96, 1024
    • Payload Length: 128, 136, 256, 272
    • AAD Length: 0, 128, 136, 272, 384
  • AES-GMAC
    • Direction: Decrypt, Encrypt
    • IV Generation: External
    • Key Length: 128, 192, 256
    • Tag Length: 32, 64, 96, 104, 112, 120, 128
    • IV Length: 8, 96, 1024
    • AAD Length: 0, 128, 136, 272, 384
  • AES-KW
    • Direction: Decrypt, Encrypt
    • Cipher: Cipher, Inverse
    • Key Length: 128, 192, 256
    • Payload Length: 128, 192, 512, 1344, 4096
    Prerequisites:
  • AES-KWP
    • Direction: Decrypt, Encrypt
    • Cipher: Cipher, Inverse
    • Key Length: 128, 192, 256
    • Payload Length: 128, 200, 456, 4096
    Prerequisites:
  • AES-OFB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • Counter DRBG
    • Prediction Resistance: Yes, No
    • Supports Reseed
      • Capabilities:
        • Mode: TDES
        • Derivation Function Enabled: Yes
        • Additional Input: 0-112
        • Entropy Input: 112
        • Nonce: 56
        • Personalization String Length: 0-112
        • Returned Bits: 256
      • Capabilities:
        • Mode: AES-128
        • Derivation Function Enabled: Yes
        • Additional Input: 0-128
        • Entropy Input: 128
        • Nonce: 64
        • Personalization String Length: 0-128
        • Returned Bits: 512
      • Capabilities:
        • Mode: AES-192
        • Derivation Function Enabled: Yes
        • Additional Input: 0-256
        • Entropy Input: 192
        • Nonce: 128
        • Personalization String Length: 0-256
        • Returned Bits: 512
      • Capabilities:
        • Mode: AES-256
        • Derivation Function Enabled: Yes
        • Additional Input: 0-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Returned Bits: 512
    Prerequisites:
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
      • Capabilities:
        • L: 2048
        • N: 256
      • Capabilities:
        • L: 3072
        • N: 256
    Prerequisites:
  • DSA PQGGen (186-4)
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
    Prerequisites:
  • DSA PQGVer (186-4)
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Unverifiable
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical, Unverifiable
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
    Prerequisites:
  • DSA SigGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites:
  • DSA SigVer (186-4)
      • Capabilities:
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites:
  • ECDSA KeyGen (186-4)
    • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    • Secret Generation Mode: Testing Candidates
    Prerequisites:
  • ECDSA KeyVer (186-4)
    • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
  • ECDSA SigGen (186-4)
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-233
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-283
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-409
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-571
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-233
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-283
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-409
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-571
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites:
  • ECDSA SigGen (186-4)
    • Component
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-233
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-283
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-409
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-571
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-233
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-283
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-409
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-571
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites:
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: P-192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-224
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-163
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-233
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-283
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-409
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: K-571
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-163
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-233
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-283
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-409
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
      • Capabilities:
        • Curve: B-571
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    Prerequisites:
  • Hash DRBG
    • Prediction Resistance: Yes, No
    • Supports Reseed
      • Capabilities:
        • Mode: SHA-1
        • Entropy Input: 128
        • Nonce: 64
        • Personalization String Length: 0-128
        • Additional Input: 0-128
        • Returned Bits: 640
      • Capabilities:
        • Mode: SHA2-224
        • Entropy Input: 192
        • Nonce: 96
        • Personalization String Length: 0-192
        • Additional Input: 0-192
        • Returned Bits: 896
      • Capabilities:
        • Mode: SHA2-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
      • Capabilities:
        • Mode: SHA2-384
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1536
      • Capabilities:
        • Mode: SHA2-512
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 2048
      • Capabilities:
        • Mode: SHA2-512/224
        • Entropy Input: 192
        • Nonce: 96
        • Personalization String Length: 0-192
        • Additional Input: 0-192
        • Returned Bits: 896
      • Capabilities:
        • Mode: SHA2-512/256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
    Prerequisites:
  • HMAC DRBG
    • Prediction Resistance: Yes, No
    • Supports Reseed
      • Capabilities:
        • Mode: SHA-1
        • Entropy Input: 128
        • Nonce: 64
        • Personalization String Length: 0-128
        • Additional Input: 0-128
        • Returned Bits: 640
      • Capabilities:
        • Mode: SHA2-224
        • Entropy Input: 192
        • Nonce: 96
        • Personalization String Length: 0-192
        • Additional Input: 0-192
        • Returned Bits: 896
      • Capabilities:
        • Mode: SHA2-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
      • Capabilities:
        • Mode: SHA2-384
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1536
      • Capabilities:
        • Mode: SHA2-512
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 2048
      • Capabilities:
        • Mode: SHA2-512/224
        • Entropy Input: 192
        • Nonce: 96
        • Personalization String Length: 0-192
        • Additional Input: 0-192
        • Returned Bits: 896
      • Capabilities:
        • Mode: SHA2-512/256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
    Prerequisites:
  • HMAC-SHA-1
    • MAC: 128
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-224
    • MAC: 128, 224
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 128, 256
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-384
    • MAC: 256, 384
    • Key sizes < block size
    • Key sizes > block size
    • Key size = block size
    Prerequisites:
  • HMAC-SHA2-512
    • MAC: 256, 512
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-512/224
    • MAC: 128, 224
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-512/256
    • MAC: 128, 256
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA3-224
    • MAC: 128, 224
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA3-256
    • MAC: 128, 256
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA3-384
    • MAC: 256, 384
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA3-512
    • MAC: 256, 512
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • KAS-ECC
    • Function: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
      • Full MQV:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
      • Full Unified:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
      • One Pass DH:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
      • One Pass MQV:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
      • One Pass Unified:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
      • Static Unified:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • EB:
              • Hash Algorithm: SHA2-224
              • Curve: P-224
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128, 192, 256
                  • MAC Length: 128
                  • Nonce Length: 104
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
              • MAC Option:
                • HMAC-SHA2-384:
                  • Key Length: 192
                  • MAC Length: 192
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
              • MAC Option:
                • HMAC-SHA2-512:
                  • Key Length: 256
                  • MAC Length: 256
          • Derived Keying Material Nonce Types: Random nonce
    Prerequisites:
  • KAS-ECC CDH-Component
    • Function: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
    • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • KAS-FFC
    • Function: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
    • Scheme:
      • dhEphem:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
      • dhHybridOne:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
      • dhHybridOneFlow:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
      • dhOneFlow:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
      • dhStatic:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
          • Derived Keying Material Nonce Types: Random nonce
      • MQV1:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
      • MQV2:
        • KAS Role: Initiator, Responder
        • KDF with Key Confirmation:
          • Key Confirmation Option:
            • Key Confirmation Role: Provider, Recipient
            • Key Confirmation Type: Bilateral, Unilateral
            • Nonce Type: Random nonce
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FB:
              • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 128
                  • MAC Length: 128
                  • Nonce Length: 104
            • FC:
              • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
              • MAC Option:
                • AES-CCM:
                  • Key Length: 256
                  • MAC Length: 128
                  • Nonce Length: 104
    Prerequisites:
  • KDF ANS 9.63
    • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    • Field Size: 224, 233, 256, 283, 384, 409, 521, 571
    • Shared Info Length: 0-512
    • Key Data Length: 128-2048
    Prerequisites:
  • KDF IKEv2
      • Capabilities:
        • Initiator Nonce Length: 128-2048
        • Responder Nonce Length: 128-2048
        • Diffie-Hellman Shared Secret Length: 224
        • Derived Keying Material Length: 160-8192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Initiator Nonce Length: 128-2048
        • Responder Nonce Length: 128-2048
        • Diffie-Hellman Shared Secret Length: 8192
        • Derived Keying Material Length: 160-8192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Initiator Nonce Length: 128-2048
        • Responder Nonce Length: 128-2048
        • Diffie-Hellman Shared Secret Length: 384
        • Derived Keying Material Length: 160-8192
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • KDF SP800-108
      • Capabilities:
        • KDF Mode: Counter
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Supported Lengths: 64, 1024
        • Fixed Data Order: After Fixed Data, Before Fixed Data
        • Counter Length: 8, 16, 24, 32
      • Capabilities:
        • KDF Mode: Double Pipeline Iteration
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Supported Lengths: 64, 1024
        • Fixed Data Order: After Fixed Data, Before Fixed Data, before iterator
        • Counter Length: 8, 16, 24, 32
      • Capabilities:
        • KDF Mode: Feedback
        • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-224, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
        • Supported Lengths: 64, 1024
        • Fixed Data Order: After Fixed Data, Before Fixed Data, before iterator
        • Counter Length: 8, 16, 24, 32
        • Supports Empty IV
    Prerequisites:
  • KDF SRTP
    • AES Key Length: 128, 192, 256
    • KDR Exponents: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24
    Prerequisites:
  • KDF SSH
    • Cipher: AES-128, AES-192, AES-256, TDES
    • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • KDF TLS
    • TLS Version: v1.0/1.1, v1.2
    • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • RSA Decryption Primitive
    • Modulus Length: 2048
  • RSA KeyGen (186-4)
      • Capabilities:
        • Key Generation Mode: B.3.3
          • Properties:
            • Modulo: 2048
            • Primality Tests: C.3
          • Properties:
            • Modulo: 3072
            • Primality Tests: C.3
    • Info Generated By Server
    • Public Exponent Mode: Random
    • Private Key Format: Standard
    Prerequisites:
  • RSA SigGen (186-2)
      • Capabilities:
        • Signature Type: ANSI X9.31
        • Modulo: 4096
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Signature Type: PKCS 1.5
        • Modulo: 4096
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
        • Modulo: 4096
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • RSA SigGen (186-4)
      • Capabilities:
        • Signature Type: ANSI X9.31
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
                • Salt Length: 0
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
                • Salt Length: 0
    Prerequisites:
  • RSA Signature Primitive
    • Private Key Format: standard
  • RSA SigVer (186-2)
      • Capabilities:
        • Signature Type: ANSI X9.31
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 1536
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
          • Properties:
            • Modulo: 4096
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
  • RSA SigVer (186-4)
      • Capabilities:
        • Signature Type: ANSI X9.31
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
              • Hash Pair:
                • Hash Algorithm: SHA2-224
              • Hash Pair:
                • Hash Algorithm: SHA2-256
              • Hash Pair:
                • Hash Algorithm: SHA2-384
              • Hash Pair:
                • Hash Algorithm: SHA2-512
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 1024
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
                • Salt Length: 0
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
                • Salt Length: 0
          • Properties:
            • Modulo: 3072
              • Hash Pair:
                • Hash Algorithm: SHA-1
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-384
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/224
                • Salt Length: 0
              • Hash Pair:
                • Hash Algorithm: SHA2-512/256
                • Salt Length: 0
    • Public Exponent Mode: Random
    Prerequisites:
  • SHA-1
    • Message Length: 0-51200 Increment 8
  • SHA-224
    • Message Length: 0-51200 Increment 8
  • SHA-256
    • Message Length: 0-51200 Increment 8
  • SHA3-224
    • Supports Empty Message
  • SHA3-256
    • Supports Empty Message
  • SHA3-384
    • Supports Empty Message
  • SHA3-512
    • Supports Empty Message
  • SHA-384
    • Message Length: 0-102400 Increment 8
  • SHA-512
    • Message Length: 0-102400 Increment 8
  • SHA-512/224
    • Message Length: 0-102400 Increment 8
  • SHA-512/256
    • Message Length: 0-102400 Increment 8
  • SHAKE-128
    • Supports Empty Message
    • Output Length: 16-65536
  • SHAKE-256
    • Supports Empty Message
    • Output Length: 16-65536
  • TDES-CBC
    • Direction: Decrypt
    • Keying Option: 2
  • TDES-CBC
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-CFB64
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-CFB64
    • Direction: Decrypt
    • Keying Option: 2
  • TDES-CFB8
    • Direction: Decrypt
    • Keying Option: 2
  • TDES-CFB8
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-CMAC
      • Capabilities:
        • Direction: Generation
        • Keying Option: 1
        • MAC: 8, 32, 64
        • Message Length: 0, 64, 104, 256, 376, 524288
      • Capabilities:
        • Direction: Verification
        • Keying Option: 2
        • MAC: 8, 32, 64
        • Message Length: 0, 64, 104, 256, 376, 524288
      • Capabilities:
        • Direction: Verification
        • Keying Option: 1
        • MAC: 8, 32, 64
        • Message Length: 0, 64, 104, 256, 376, 524288
  • TDES-CTR
    • Direction: Encrypt
  • TDES-ECB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1
  • TDES-ECB
    • Direction: Decrypt
    • Keying Option: 2
  • TDES-KW
    • Direction: Decrypt, Encrypt
    • Cipher: Cipher, Inverse
    • Payload Length: 64, 96, 256, 416, 4096
    Prerequisites:
  • TDES-OFB
    • Direction: Decrypt
    • Keying Option: 2
  • TDES-OFB
    • Direction: Decrypt, Encrypt
    • Keying Option: 1