Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Description
Android application providing Secure mobile VoIP communications.
Version
2.9
Type
SOFTWARE
Vendor
Cellcrypt, Inc.
8500 Leesburg Pike
Suite 208
Tysons, VA 22182
USA
Contacts
Mark Currie
mark.currie@cellcrypt.com
+1 703-879-3328

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C577
3/22/2019
  • Android 7.0 on Qualcomm Snapdragon 820 ARMv8
    • software
    • processor
      • manufacturer: Qualcomm
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128, 256
  • AES-CTR
    • Direction: Encrypt
    • Key Length: 128, 256
  • AES-GCM
    • Direction: Decrypt, Encrypt
    • IV Generation: External
    • Key Length: 128, 256
    • Tag Length: 128
    • IV Length: 96
    • Payload Length: 96, 128, 192, 256
    • AAD Length: 0
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 256
    Prerequisites:
  • ECDSA KeyGen (186-4)
    • Curve: P-256, P-384, P-521
    • Secret Generation Mode: Extra Bits, Testing Candidates
    Prerequisites:
  • ECDSA KeyVer (186-4)
    • Curve: P-256, P-384, P-521
  • ECDSA SigGen (186-4)
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-384
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-512
    Prerequisites:
  • ECDSA SigVer (186-4)
      • Capabilities:
        • Curve: P-256
        • Hash Algorithm: SHA2-256
      • Capabilities:
        • Curve: P-384
        • Hash Algorithm: SHA2-384
      • Capabilities:
        • Curve: P-521
        • Hash Algorithm: SHA2-512
    Prerequisites:
  • HMAC-SHA-1
    • MAC: 160
    • Key sizes < block size
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 256
    • Key sizes < block size
    Prerequisites:
  • HMAC-SHA2-384
    • MAC: 384
    • Key sizes < block size
    Prerequisites:
  • KAS-ECC Component
    • Function: Key Pair Generation
    • Scheme:
      • Ephemeral Unified:
        • KAS Role: Responder
        • Shared Secret Computation:
          • Parameter Set:
            • EC:
              • Hash Algorithm: SHA2-256
              • Curve: P-256
            • ED:
              • Hash Algorithm: SHA2-384
              • Curve: P-384
            • EE:
              • Hash Algorithm: SHA2-512
              • Curve: P-521
    Prerequisites:
  • KAS-FFC Component
    • Function: Key Pair Generation
    • Scheme:
      • dhEphem:
        • KAS Role: Responder
        • Shared Secret Computation:
          • Parameter Set:
            • FC:
              • Hash Algorithm: SHA2-256
    Prerequisites:
  • RSA SigGen (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
    Prerequisites:
  • RSA SigVer (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
    • Public Exponent Mode: Fixed
    • Fixed Public Exponent: 10001
    Prerequisites:
  • SHA-1
    • Message Length: 0-51200 Increment 8
  • SHA-256
    • Message Length: 0-51200 Increment 8
  • SHA-384
    • Message Length: 0-102400 Increment 8
  • SHA-512
    • Message Length: 0-102400 Increment 8