Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CBC
- Direction: Decrypt, Encrypt
- Key Length: 128, 192, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CBC-CS1
- Direction: decrypt, encrypt
- Key Length: 128, 192, 256
- Payload Length: 192, 320
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CBC-CS2
- Direction: decrypt, encrypt
- Key Length: 128, 192, 256
- Payload Length: 192, 320
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CBC-CS3
- Direction: decrypt, encrypt
- Key Length: 128, 192, 256
- Payload Length: 192, 320
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CCM
- Key Length: 128, 192, 256
- Tag Length: 96, 128
- IV Length: 96
- Payload Length: 64, 128, 192
- AAD Length: 128, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CFB128
- Direction: Decrypt, Encrypt
- Key Length: 128, 192, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CFB8
- Direction: Decrypt, Encrypt
- Key Length: 128, 192, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CMAC
- Capabilities:
- Direction: Generation, Verification
- Key Length: 128, 192, 256
- MAC Length: 8-128 Increment 8
- Message Length: 0-4096 Increment 128
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-CTR
- Direction: Decrypt, Encrypt
- Key Length: 128, 192, 256
- Payload Length: 128
- Incremental Counter
- Counter Tests Performed
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-ECB
- Direction: Decrypt, Encrypt
- Key Length: 128, 192, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-GCM
- Direction: Decrypt, Encrypt
- IV Generation: External
- IV Generation Mode: 8.2.2
- Key Length: 128, 192, 256
- Tag Length: 96, 128
- IV Length: 96
- Payload Length: 64, 128, 192
- AAD Length: 128, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-GMAC
- Direction: Decrypt, Encrypt
- IV Generation: External
- IV Generation Mode: 8.2.2
- Key Length: 128, 192, 256
- Tag Length: 96, 128
- IV Length: 96
- AAD Length: 128, 192, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-KW
- Direction: Decrypt, Encrypt
- Cipher: Cipher
- Key Length: 128, 192, 256
- Payload Length: 128, 192, 512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-KWP
- Direction: Decrypt, Encrypt
- Cipher: Cipher
- Key Length: 128, 192, 256
- Payload Length: 128, 192, 512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
AES-OFB
- Direction: Decrypt, Encrypt
- Key Length: 128, 192, 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
Counter DRBG
- Prediction Resistance: Yes, No
- Supports Reseed
- Capabilities:
- Mode: TDES
- Derivation Function Enabled: Yes
- Additional Input: 256
- Entropy Input: 224
- Nonce: 224
- Personalization String Length: 256
- Returned Bits: 256
- Capabilities:
- Mode: AES-128
- Derivation Function Enabled: Yes
- Additional Input: 256
- Entropy Input: 256
- Nonce: 256
- Personalization String Length: 256
- Returned Bits: 512
- Capabilities:
- Mode: AES-192
- Derivation Function Enabled: Yes
- Additional Input: 320
- Entropy Input: 320
- Nonce: 320
- Personalization String Length: 320
- Returned Bits: 512
- Capabilities:
- Mode: AES-256
- Derivation Function Enabled: Yes
- Additional Input: 384
- Entropy Input: 384
- Nonce: 384
- Personalization String Length: 384
- Returned Bits: 512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
cSHAKE-128
- Message Length: 0-65536 Increment 8
- Output Length: 16-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
cSHAKE-256
- Message Length: 0-65536 Increment 8
- Output Length: 16-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
DSA KeyGen (FIPS186-4)
- Capabilities:
- Capabilities:
- Capabilities:
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
DSA PQGGen (FIPS186-4)
- Capabilities:
- P/Q Generation Methods: Probable
- G Generation Methods: Canonical, Unverifiable
- L: 2048
- N: 224
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- P/Q Generation Methods: Probable
- G Generation Methods: Canonical, Unverifiable
- L: 2048
- N: 256
- Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
- Capabilities:
- P/Q Generation Methods: Probable
- G Generation Methods: Canonical, Unverifiable
- L: 3072
- N: 256
- Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
DSA PQGVer (FIPS186-4)
- Capabilities:
- P/Q Generation Methods: Probable
- G Generation Methods: Canonical, Unverifiable
- L: 2048
- N: 224
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- P/Q Generation Methods: Probable
- G Generation Methods: Canonical, Unverifiable
- L: 2048
- N: 256
- Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
- Capabilities:
- P/Q Generation Methods: Probable
- G Generation Methods: Canonical, Unverifiable
- L: 3072
- N: 256
- Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
DSA SigGen (FIPS186-4)
- Capabilities:
- L: 2048
- N: 224
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- L: 2048
- N: 256
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- L: 3072
- N: 256
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
DSA SigVer (FIPS186-4)
- Capabilities:
- L: 1024
- N: 160
- Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- L: 2048
- N: 224
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- L: 2048
- N: 256
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
- Capabilities:
- L: 3072
- N: 256
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
ECDSA KeyGen (FIPS186-4)
- Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Secret Generation Mode: Extra Bits, Testing Candidates
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
ECDSA KeyVer (FIPS186-4)
- Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
ECDSA SigGen (FIPS186-4)
- Capabilities:
- Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
ECDSA SigVer (FIPS186-4)
- Capabilities:
- Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
Hash DRBG
- Prediction Resistance: Yes, No
- Supports Reseed
- Capabilities:
- Mode: SHA-1
- Entropy Input: 160
- Nonce: 160
- Personalization String Length: 160
- Additional Input: 160
- Returned Bits: 640
- Capabilities:
- Mode: SHA2-224
- Entropy Input: 224
- Nonce: 224
- Personalization String Length: 224
- Additional Input: 224
- Returned Bits: 896
- Capabilities:
- Mode: SHA2-256
- Entropy Input: 256
- Nonce: 256
- Personalization String Length: 256
- Additional Input: 256
- Returned Bits: 1024
- Capabilities:
- Mode: SHA2-384
- Entropy Input: 384
- Nonce: 384
- Personalization String Length: 384
- Additional Input: 384
- Returned Bits: 1536
- Capabilities:
- Mode: SHA2-512
- Entropy Input: 512
- Nonce: 512
- Personalization String Length: 512
- Additional Input: 512
- Returned Bits: 2048
- Capabilities:
- Mode: SHA2-512/224
- Entropy Input: 224
- Nonce: 224
- Personalization String Length: 224
- Additional Input: 224
- Returned Bits: 896
- Capabilities:
- Mode: SHA2-512/256
- Entropy Input: 256
- Nonce: 256
- Personalization String Length: 256
- Additional Input: 256
- Returned Bits: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC DRBG
- Prediction Resistance: Yes, No
- Supports Reseed
- Capabilities:
- Mode: SHA-1
- Entropy Input: 160
- Nonce: 160
- Personalization String Length: 160
- Additional Input: 160
- Returned Bits: 640
- Capabilities:
- Mode: SHA2-224
- Entropy Input: 224
- Nonce: 224
- Personalization String Length: 224
- Additional Input: 224
- Returned Bits: 896
- Capabilities:
- Mode: SHA2-256
- Entropy Input: 256
- Nonce: 256
- Personalization String Length: 256
- Additional Input: 256
- Returned Bits: 1024
- Capabilities:
- Mode: SHA2-384
- Entropy Input: 384
- Nonce: 384
- Personalization String Length: 384
- Additional Input: 384
- Returned Bits: 1536
- Capabilities:
- Mode: SHA2-512
- Entropy Input: 512
- Nonce: 512
- Personalization String Length: 512
- Additional Input: 512
- Returned Bits: 2048
- Capabilities:
- Mode: SHA2-512/224
- Entropy Input: 224
- Nonce: 224
- Personalization String Length: 224
- Additional Input: 224
- Returned Bits: 896
- Capabilities:
- Mode: SHA2-512/256
- Entropy Input: 256
- Nonce: 256
- Personalization String Length: 256
- Additional Input: 256
- Returned Bits: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA-1
- MAC: 80-160 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA2-224
- MAC: 112-224 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA2-256
- MAC: 128-256 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA2-384
- MAC: 192-384 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA2-512
- MAC: 256-512 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA2-512/224
- MAC: 112-224 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA2-512/256
- MAC: 128-256 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA3-224
- MAC: 112-224 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA3-256
- MAC: 128-256 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA3-384
- MAC: 192-384 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
HMAC-SHA3-512
- MAC: 256-512 Increment 8
- Key Length: 8-2048 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- onePassMqv:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- onePassUnified:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- fullUnified:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- ephemeralUnified:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Length: 256
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- fullMqv:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- staticUnified:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Key Pair Generation, Partial Validation
- Scheme:
- onePassDh:
- KAS Role: Initiator
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-ECC Sp800-56Ar3
- Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
- Function: Partial Validation
- Scheme:
- onePassDh:
- KAS Role: Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Key Pair Generation, Partial Validation
- Scheme:
- dhEphem:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Key Pair Generation, Partial Validation
- Scheme:
- mqv1:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Full Validation, Key Pair Generation, Partial Validation
- Scheme:
- dhHybridOneFlow:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Full Validation, Key Pair Generation, Partial Validation
- Scheme:
- dhOneFlow:
- KAS Role: Initiator
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Full Validation, Partial Validation
- Scheme:
- dhOneFlow:
- KAS Role: Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Key Pair Generation, Partial Validation
- Scheme:
- dhHybrid1:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Full Validation, Key Pair Generation, Partial Validation
- Scheme:
- dhStatic:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KAS-FFC Sp800-56Ar3
- Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
- Function: Full Validation, Key Pair Generation, Partial Validation
- Scheme:
- mqv2:
- KAS Role: Initiator, Responder
- KDF Methods:
- oneStepKdf:
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default
- Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
- Fixed Info Encoding: Concatenation
- Key Confirmation Methods:
- Key Confirmation Directions:
- Key Confirmation Roles:
- Key Confirmation MAC Methods:
- CMAC:
- Key Length: 256
- MAC Length: 128
- HMAC-SHA2-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA2-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA2-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA2-512:
- Key Length: 512
- MAC Length: 512
- HMAC-SHA2-512/224:
- Key Length: 256
- MAC Length: 224
- HMAC-SHA2-512/256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-224:
- Key Length: 224
- MAC Length: 224
- HMAC-SHA3-256:
- Key Length: 256
- MAC Length: 256
- HMAC-SHA3-384:
- Key Length: 384
- MAC Length: 384
- HMAC-SHA3-512:
- Key Length: 512
- MAC Length: 512
- Key Length: 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDA OneStep Sp800-56Cr1
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA2-512/256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-224
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-256
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-384
- MAC Salting Methods: default, random
- Auxiliary Function Methods:
- Auxiliary Function Name: SHA3-512
- MAC Salting Methods: default, random
- Fixed Info Pattern: algorithmId||uPartyInfo||vPartyInfo
- Fixed Info Encoding: concatenation
- Derived Key Length: 1024
- Shared Secret Length: 224-8192 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDF ANS 9.63
- Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
- Field Size: 224, 521
- Shared Info Length: 0, 1024
- Key Data Length: 256, 1024
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDF IKEv2
- Capabilities:
- Initiator Nonce Length: 64-2048 Increment 8
- Responder Nonce Length: 64-2048 Increment 8
- Diffie-Hellman Shared Secret Length: 224-8192 Increment 8
- Derived Keying Material Length: 512-16384 Increment 8
- Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDF SP800-108
- Capabilities:
- KDF Mode: Counter
- MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
- Supported Lengths: 8-256 Increment 8
- Fixed Data Order: After Fixed Data, Before Fixed Data, In the Middle of Fixed Data
- Counter Length: 16, 32
- Supports Empty IV
- Custom Key In Length: 0
- Capabilities:
- KDF Mode: Feedback
- MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
- Supported Lengths: 8-256 Increment 8
- Fixed Data Order: After Fixed Data, Before Fixed Data
- Counter Length: 16, 32
- Supports Empty IV
- Custom Key In Length: 0
- Capabilities:
- KDF Mode: Double Pipeline Iteration
- MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
- Supported Lengths: 8-256 Increment 8
- Fixed Data Order: After Fixed Data, Before Fixed Data, before iterator
- Counter Length: 16, 32
- Supports Empty IV
- Custom Key In Length: 0
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDF SRTP
- AES Key Length: 128, 192, 256
- Supports Empty KDR
- KDR Exponents: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDF SSH
- Cipher: AES-128, TDES
- Hash Algorithm: SHA-1, SHA2-224
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
KDF TLS
- TLS Version: v1.0/1.1, v1.2
- Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
PBKDF
- Capabilities:
- Iteration Count: 10-1000 Increment 1
- HMAC Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
- Password Length: 8-128 Increment 8
- Salt Length: 128-4096 Increment 8
- Key Data Length: 128-4096 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
RSA Decryption Primitive
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
RSA KeyGen (FIPS186-4)
- Capabilities:
- Key Generation Mode: B.3.3
- Properties:
- Modulo: 2048
- Primality Tests: Table C.2
- Properties:
- Modulo: 3072
- Primality Tests: Table C.2
- Properties:
- Modulo: 4096
- Primality Tests: Table C.2
- Properties:
- Modulo: 2048
- Primality Tests: Table C.3
- Properties:
- Modulo: 3072
- Primality Tests: Table C.3
- Properties:
- Modulo: 4096
- Primality Tests: Table C.3
- Public Exponent Mode: Random
- Private Key Format: Chinese Remainder Theorem
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
RSA SigGen (FIPS186-4)
- Capabilities:
- Signature Type: ANSI X9.31
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Capabilities:
- Signature Type: PKCS 1.5
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Capabilities:
- Signature Type: PKCSPSS
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 0
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 0
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 0
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
RSA Signature Primitive
- Private Key Format: standard
- Public Exponent Mode: random
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
RSA SigVer (FIPS186-2)
- Public Exponent Mode: Random
- Capabilities:
- Signature Type: ANSI X9.31
- Properties:
- Modulo: 1024
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 1536
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Capabilities:
- Signature Type: PKCS 1.5
- Properties:
- Modulo: 1024
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 1536
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Capabilities:
- Signature Type: PKCSPSS
- Properties:
- Modulo: 1024
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 32
- Properties:
- Modulo: 1536
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 32
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 32
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 32
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 32
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
RSA SigVer (FIPS186-4)
- Capabilities:
- Signature Type: ANSI X9.31
- Properties:
- Modulo: 1024
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Capabilities:
- Signature Type: PKCS 1.5
- Properties:
- Modulo: 1024
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Capabilities:
- Signature Type: PKCSPSS
- Properties:
- Modulo: 1024
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 32
- Properties:
- Modulo: 2048
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 32
- Properties:
- Modulo: 3072
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 32
- Properties:
- Modulo: 4096
- Hash Pair:
- Hash Algorithm: SHA-1
- Salt Length: 20
- Hash Pair:
- Hash Algorithm: SHA2-224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-256
- Salt Length: 32
- Hash Pair:
- Hash Algorithm: SHA2-384
- Salt Length: 48
- Hash Pair:
- Hash Algorithm: SHA2-512
- Salt Length: 0
- Hash Pair:
- Hash Algorithm: SHA2-512/224
- Salt Length: 28
- Hash Pair:
- Hash Algorithm: SHA2-512/256
- Salt Length: 32
- Public Exponent Mode: Random
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
Safe Primes Key Generation
- Safe Prime Groups: ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
Safe Primes Key Verification
- Safe Prime Groups: ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA-1
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA2-224
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA2-256
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA2-384
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA2-512
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA2-512/224
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA2-512/256
- Message Length: 0-65536 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA3-224
- Message Length: 0-65536 Increment 8
- Large Message Sizes: 1, 2, 4gigabytes
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA3-256
- Message Length: 0-65536 Increment 8
- Large Message Sizes: 1, 2, 4gigabytes
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA3-384
- Message Length: 0-65536 Increment 8
- Large Message Sizes: 1, 2, 4gigabytes
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHA3-512
- Message Length: 0-65536 Increment 8
- Large Message Sizes: 1, 2, 4gigabytes
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHAKE-128
- Supports Empty Message
- Output Length: 16-384 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
SHAKE-256
- Output Length: 16-384 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-CBC
- Direction: Decrypt, Encrypt
- Keying Option: 1
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-CFB64
- Direction: Decrypt, Encrypt
- Keying Option: 1
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-CFB8
- Direction: Decrypt, Encrypt
- Keying Option: 1
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-CMAC
- Capabilities:
- Direction: Generation, Verification
- Keying Option: 1
- MAC Length: 8-64 Increment 8
- Message Length: 0-1024 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-CMAC
- Capabilities:
- Direction: Generation, Verification
- Keying Option: 2
- MAC Length: 8-64 Increment 8
- Message Length: 0-1024 Increment 8
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-CTR
- Counter Tests Performed
- Direction: Decrypt, Encrypt
- Keying Option: 1
- Payload Length: 64
- Supports Counter larger than maximum value
- Incremental Counter
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-ECB
- Direction: Decrypt, Encrypt
- Keying Option: 1, 2
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-KW
- Direction: Decrypt, Encrypt
- Cipher: Cipher
- Payload Length: 192
|
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
-
Processor: Intel® Xeon® E5-2603 v4
-
Operating System: Red Hat Enterprise Linux 8.2 with Java 8
|
TDES-OFB
- Direction: Decrypt, Encrypt
- Keying Option: 1
|