Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program CAVP

Product Name
Description
FAST C-LIB is software cryptographic library embedded in vehicle ECUs. FAST C-LIB is used to meet OEM's automotive security requirements. For example, FAST C-LIB is used to implement secure In-Vehicle communication and secure V2X communication.
Version
1.0.0
Type
SOFTWARE
Vendor
FESCARO Co.Ltd.
#C-469, 815, Daewangpangyo-ro, Sujeong-gu
Seongnam-si, Gyeonggi-do 13449
Korea
Contacts
HyunJung Lee
hyunjung.lee@fescaro.com
+82(0) 70.4236.6788
+82(0) 50.4275.0968
SungBong Hong
sungbong.hong@fescaro.com
+82(0) 70.4236.6788
+82(0) 50.4275.0968

Validations

Number
Date
Operating Environments
Algorithm Capabilities
C1076
9/6/2019
  • OSEK/VDX 2.2.3 on Infineon AURIX TC27X with HSM, ARM Cortex-M3(HSM Core), 100MHz
    • processor
    • software
  • AES-CBC
    • Direction: Decrypt, Encrypt
    • Key Length: 128
  • AES-CMAC
      • Capabilities:
        • Direction: Generation
        • Key Length: 128
        • MAC: 32, 64, 128
        • Message Length: 128, 160, 256, 296, 32768
      • Capabilities:
        • Direction: Verification
        • Key Length: 128
        • MAC: 32, 64, 128
        • Message Length: 128, 160, 256, 296, 32768
  • AES-CTR
    • Direction: Encrypt
    • Key Length: 128
  • AES-ECB
    • Direction: Decrypt, Encrypt
    • Key Length: 128
  • AES-GCM
    • Direction: Decrypt, Encrypt
    • IV Generation: Internal
    • IV Generation Mode: 8.2.2
    • Key Length: 128
    • Tag Length: 128
    • IV Length: 96
    • Payload Length: 104, 128, 256, 408
    • AAD Length: 128, 160, 384, 720
    Prerequisites:
  • DSA KeyGen (186-4)
      • Capabilities:
        • L: 2048
        • N: 256
  • DSA PQGGen (186-4)
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Unverifiable
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-256
    Prerequisites:
  • DSA PQGVer (186-4)
      • Capabilities:
        • P/Q Generation Methods: Probable
        • G Generation Methods: Unverifiable
        • L: 2048
        • N: 256
        • Hash Algorithm: SHA2-256
    Prerequisites:
  • Hash DRBG
    • Prediction Resistance: Yes, No
    • Supports Reseed
      • Capabilities:
        • Mode: SHA2-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
      • Capabilities:
        • Mode: SHA2-512
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 2048
    Prerequisites:
  • HMAC DRBG
    • Prediction Resistance: Yes, No
    • Supports Reseed
      • Capabilities:
        • Mode: SHA2-256
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 1024
      • Capabilities:
        • Mode: SHA2-512
        • Entropy Input: 256
        • Nonce: 128
        • Personalization String Length: 0-256
        • Additional Input: 0-256
        • Returned Bits: 2048
    Prerequisites:
  • HMAC-SHA2-256
    • MAC: 128, 192, 256
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • HMAC-SHA2-512
    • MAC: 256, 320, 384, 448, 512
    • Key sizes < block size
    • Key size = block size
    • Key sizes > block size
    Prerequisites:
  • KAS-FFC
    • Function: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
    • Scheme:
      • dhEphem:
        • KAS Role: Initiator, Responder
        • KDF without Key Confirmation:
          • KDF Option:
            • Concatenation:
          • Parameter Set:
            • FC:
              • Hash Algorithm: SHA2-256
              • MAC Option:
                • HMAC-SHA2-256:
                  • Key Length: 256
                  • MAC Length: 256
    Prerequisites:
  • RSA Decryption Primitive
    • Modulus Length: 2048
  • RSA KeyGen (186-4)
      • Capabilities:
        • Key Generation Mode: B.3.3
          • Properties:
            • Modulo: 2048
            • Primality Tests: C.2
    • Public Exponent Mode: Fixed
    • Fixed Public Exponent: 10001
    • Private Key Format: Standard
    Prerequisites:
  • RSA SigGen (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
    Prerequisites:
  • RSA Signature Primitive
    • Private Key Format: standard
  • RSA SigVer (186-4)
      • Capabilities:
        • Signature Type: PKCS 1.5
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
      • Capabilities:
        • Signature Type: PKCSPSS
          • Properties:
            • Modulo: 2048
              • Hash Pair:
                • Hash Algorithm: SHA2-256
                • Salt Length: 256
    • Public Exponent Mode: Fixed
    • Fixed Public Exponent: 10001
    Prerequisites:
  • SHA-256
    • Message Length: 8-51200 Increment 8
  • SHA-512
    • Message Length: 8-102400 Increment 8
Created October 05, 2016, Updated June 22, 2020