Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program CAVP

Product Name
Description
Set of algorithms in support of the Cisco NSS module
Version
1.0
Type
SOFTWARE
Vendor
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA
Contacts
Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C503
3/1/2019
  • CentOS 7.4 on Intel Xeon
    • software
    • processor
      • manufacturer: Intel
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 192, 256
  • AES-GCM
    • Direction: Decrypt, Encrypt
    • IV Generation: Internal
    • IV Generation Mode: 8.2.1
    • Key Length: 128, 192, 256
    • Tag Length: 32, 64, 96, 104, 112, 120, 128
    • IV Length: 96, 1024
    • Payload Length: 504, 512, 1016, 1024
    • AAD Length: 0, 504, 512, 1016, 1024
    Prerequisites:
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
      • Capabilities:
        • L: 2048
        • N: 256
      • Capabilities:
        • L: 3072
        • N: 256
    Prerequisites:
  • DSA PQGVer (186-4)
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Canonical
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1
    Prerequisites:
  • DSA SigGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • DSA SigVer (186-4)
      • Capabilities:
        • L: 1024
        • N: 160
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 2048
        • N: 224
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • L: 3072
        • N: 256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
    Prerequisites:
  • ECDSA KeyGen (186-4)
    • Curve: P-256, P-384, P-521
    • Secret Generation Mode: Extra Bits, Testing Candidates
  • ECDSA KeyVer (186-4)
    • Curve: P-256, P-384, P-521
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
  • Hash DRBG
    • Prediction Resistance: No
    • Supports Reseed
      • Capabilities:
        • Mode: SHA2-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
    Prerequisites:
  • HMAC-SHA-1
    • MAC: 80, 96, 128, 160
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-224
    • MAC: 112, 128, 160, 192, 224
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 128, 192, 256
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-384
    • MAC: 192, 256, 320, 384
    • Key sizes < block size
    • Key sizes > block size
    • Key size = block size
    Prerequisites:
  • HMAC-SHA2-512
    • MAC: 256, 320, 384, 448, 512
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • SHA-1
    • Message Length: 8-51200 Increment 8
  • SHA-224
    • Message Length: 8-51200 Increment 8
  • SHA-256
    • Message Length: 8-51200 Increment 8
  • SHA-384
    • Message Length: 8-102400 Increment 8
  • SHA-512
    • Message Length: 8-102400 Increment 8
  • TDES-CBC
    • Direction: Decrypt
    • Keying Option: 1
  • TDES-CTR
    • Direction: Encrypt
  • TDES-ECB
    • Direction: Decrypt
    • Keying Option: 1
Created October 05, 2016, Updated June 22, 2020