Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Algorithm Validation Program CAVP

Description
Zettaset FIPS Java cryptographic library for XCrypt Product Suite.
Version
1.0.2.1
Type
SOFTWARE
Vendor
Zettaset, Inc.
625 Ellis Street Suite 201
Mountain View, California 94043
USA
Contacts
Zettaset FIPS Team
[email protected]
(650) 340-7920

A2343

   First Validated: 2/15/2022
Operating Environment Algorithm Capabilities
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CBC
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CBC-CS1
  • Direction: decrypt, encrypt
  • Key Length: 128, 192, 256
  • Payload Length: 192, 320
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CBC-CS2
  • Direction: decrypt, encrypt
  • Key Length: 128, 192, 256
  • Payload Length: 192, 320
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CBC-CS3
  • Direction: decrypt, encrypt
  • Key Length: 128, 192, 256
  • Payload Length: 192, 320
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CCM
  • Key Length: 128, 192, 256
  • Tag Length: 96, 128
  • IV Length: 96
  • Payload Length: 64, 128, 192
  • AAD Length: 128, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CFB128
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CFB8
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CMAC
    • Capabilities:
      • Direction: Generation, Verification
      • Key Length: 128, 192, 256
      • MAC Length: 8-128 Increment 8
      • Message Length: 0-4096 Increment 128
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-CTR
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
  • Payload Length: 128
  • Incremental Counter
  • Counter Tests Performed
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-ECB
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-GCM
  • Direction: Decrypt, Encrypt
  • IV Generation: External
  • IV Generation Mode: 8.2.2
  • Key Length: 128, 192, 256
  • Tag Length: 96, 128
  • IV Length: 96
  • Payload Length: 64, 128, 192
  • AAD Length: 128, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-GMAC
  • Direction: Decrypt, Encrypt
  • IV Generation: External
  • IV Generation Mode: 8.2.2
  • Key Length: 128, 192, 256
  • Tag Length: 96, 128
  • IV Length: 96
  • AAD Length: 128, 192, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-KW
  • Direction: Decrypt, Encrypt
  • Cipher: Cipher
  • Key Length: 128, 192, 256
  • Payload Length: 128, 192, 512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-KWP
  • Direction: Decrypt, Encrypt
  • Cipher: Cipher
  • Key Length: 128, 192, 256
  • Payload Length: 128, 192, 512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
AES-OFB
  • Direction: Decrypt, Encrypt
  • Key Length: 128, 192, 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
Counter DRBG
  • Prediction Resistance: Yes, No
  • Supports Reseed
    • Capabilities:
      • Mode: TDES
      • Derivation Function Enabled: Yes
      • Additional Input: 256
      • Entropy Input: 224
      • Nonce: 224
      • Personalization String Length: 256
      • Returned Bits: 256
    • Capabilities:
      • Mode: AES-128
      • Derivation Function Enabled: Yes
      • Additional Input: 256
      • Entropy Input: 256
      • Nonce: 256
      • Personalization String Length: 256
      • Returned Bits: 512
    • Capabilities:
      • Mode: AES-192
      • Derivation Function Enabled: Yes
      • Additional Input: 320
      • Entropy Input: 320
      • Nonce: 320
      • Personalization String Length: 320
      • Returned Bits: 512
    • Capabilities:
      • Mode: AES-256
      • Derivation Function Enabled: Yes
      • Additional Input: 384
      • Entropy Input: 384
      • Nonce: 384
      • Personalization String Length: 384
      • Returned Bits: 512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
cSHAKE-128
  • Message Length: 0-65536 Increment 8
  • Output Length: 16-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
cSHAKE-256
  • Message Length: 0-65536 Increment 8
  • Output Length: 16-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
DSA KeyGen (FIPS186-4)
    • Capabilities:
      • L: 2048
      • N: 224
    • Capabilities:
      • L: 2048
      • N: 256
    • Capabilities:
      • L: 3072
      • N: 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
DSA PQGGen (FIPS186-4)
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical, Unverifiable
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical, Unverifiable
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical, Unverifiable
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
DSA PQGVer (FIPS186-4)
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical, Unverifiable
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical, Unverifiable
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
    • Capabilities:
      • P/Q Generation Methods: Probable
      • G Generation Methods: Canonical, Unverifiable
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512, SHA2-512/256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
DSA SigGen (FIPS186-4)
    • Capabilities:
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
DSA SigVer (FIPS186-4)
    • Capabilities:
      • L: 1024
      • N: 160
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • L: 2048
      • N: 224
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • L: 2048
      • N: 256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
    • Capabilities:
      • L: 3072
      • N: 256
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
ECDSA KeyGen (FIPS186-4)
  • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Secret Generation Mode: Extra Bits, Testing Candidates
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
ECDSA KeyVer (FIPS186-4)
  • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
ECDSA SigGen (FIPS186-4)
    • Capabilities:
      • Curve: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
ECDSA SigVer (FIPS186-4)
    • Capabilities:
      • Curve: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA2-512/224, SHA2-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
Hash DRBG
  • Prediction Resistance: Yes, No
  • Supports Reseed
    • Capabilities:
      • Mode: SHA-1
      • Entropy Input: 160
      • Nonce: 160
      • Personalization String Length: 160
      • Additional Input: 160
      • Returned Bits: 640
    • Capabilities:
      • Mode: SHA2-224
      • Entropy Input: 224
      • Nonce: 224
      • Personalization String Length: 224
      • Additional Input: 224
      • Returned Bits: 896
    • Capabilities:
      • Mode: SHA2-256
      • Entropy Input: 256
      • Nonce: 256
      • Personalization String Length: 256
      • Additional Input: 256
      • Returned Bits: 1024
    • Capabilities:
      • Mode: SHA2-384
      • Entropy Input: 384
      • Nonce: 384
      • Personalization String Length: 384
      • Additional Input: 384
      • Returned Bits: 1536
    • Capabilities:
      • Mode: SHA2-512
      • Entropy Input: 512
      • Nonce: 512
      • Personalization String Length: 512
      • Additional Input: 512
      • Returned Bits: 2048
    • Capabilities:
      • Mode: SHA2-512/224
      • Entropy Input: 224
      • Nonce: 224
      • Personalization String Length: 224
      • Additional Input: 224
      • Returned Bits: 896
    • Capabilities:
      • Mode: SHA2-512/256
      • Entropy Input: 256
      • Nonce: 256
      • Personalization String Length: 256
      • Additional Input: 256
      • Returned Bits: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC DRBG
  • Prediction Resistance: Yes, No
  • Supports Reseed
    • Capabilities:
      • Mode: SHA-1
      • Entropy Input: 160
      • Nonce: 160
      • Personalization String Length: 160
      • Additional Input: 160
      • Returned Bits: 640
    • Capabilities:
      • Mode: SHA2-224
      • Entropy Input: 224
      • Nonce: 224
      • Personalization String Length: 224
      • Additional Input: 224
      • Returned Bits: 896
    • Capabilities:
      • Mode: SHA2-256
      • Entropy Input: 256
      • Nonce: 256
      • Personalization String Length: 256
      • Additional Input: 256
      • Returned Bits: 1024
    • Capabilities:
      • Mode: SHA2-384
      • Entropy Input: 384
      • Nonce: 384
      • Personalization String Length: 384
      • Additional Input: 384
      • Returned Bits: 1536
    • Capabilities:
      • Mode: SHA2-512
      • Entropy Input: 512
      • Nonce: 512
      • Personalization String Length: 512
      • Additional Input: 512
      • Returned Bits: 2048
    • Capabilities:
      • Mode: SHA2-512/224
      • Entropy Input: 224
      • Nonce: 224
      • Personalization String Length: 224
      • Additional Input: 224
      • Returned Bits: 896
    • Capabilities:
      • Mode: SHA2-512/256
      • Entropy Input: 256
      • Nonce: 256
      • Personalization String Length: 256
      • Additional Input: 256
      • Returned Bits: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA-1
  • MAC: 80-160 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA2-224
  • MAC: 112-224 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA2-256
  • MAC: 128-256 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA2-384
  • MAC: 192-384 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA2-512
  • MAC: 256-512 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA2-512/224
  • MAC: 112-224 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA2-512/256
  • MAC: 128-256 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA3-224
  • MAC: 112-224 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA3-256
  • MAC: 128-256 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA3-384
  • MAC: 192-384 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
HMAC-SHA3-512
  • MAC: 256-512 Increment 8
  • Key Length: 8-2048 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • onePassMqv:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • onePassUnified:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • fullUnified:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • ephemeralUnified:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Length: 256
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • fullMqv:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • staticUnified:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • onePassDh:
      • KAS Role: Initiator
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-ECC Sp800-56Ar3
  • Domain Parameter Generation Methods: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
  • Function: Partial Validation
  • Scheme:
    • onePassDh:
      • KAS Role: Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default, random
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default, random
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • dhEphem:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • mqv1:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Full Validation, Key Pair Generation, Partial Validation
  • Scheme:
    • dhHybridOneFlow:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Full Validation, Key Pair Generation, Partial Validation
  • Scheme:
    • dhOneFlow:
      • KAS Role: Initiator
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Full Validation, Partial Validation
  • Scheme:
    • dhOneFlow:
      • KAS Role: Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Key Pair Generation, Partial Validation
  • Scheme:
    • dhHybrid1:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Full Validation, Key Pair Generation, Partial Validation
  • Scheme:
    • dhStatic:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA3-512
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KAS-FFC Sp800-56Ar3
  • Domain Parameter Generation Methods: FB, FC, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
  • Function: Full Validation, Key Pair Generation, Partial Validation
  • Scheme:
    • mqv2:
      • KAS Role: Initiator, Responder
      • KDF Methods:
        • oneStepKdf:
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-256
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-384
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/224
              • MAC Salting Methods: default
            • Auxiliary Function Methods:
              • Auxiliary Function Name: SHA2-512/256
              • MAC Salting Methods: default
          • Fixed Info Pattern: algorithmId||l||uPartyInfo||vPartyInfo
          • Fixed Info Encoding: Concatenation
      • Key Confirmation Methods:
        • Key Confirmation Directions:
        • Key Confirmation Roles:
        • Key Confirmation MAC Methods:
          • CMAC:
            • Key Length: 256
            • MAC Length: 128
          • HMAC-SHA2-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA2-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA2-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA2-512:
            • Key Length: 512
            • MAC Length: 512
          • HMAC-SHA2-512/224:
            • Key Length: 256
            • MAC Length: 224
          • HMAC-SHA2-512/256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-224:
            • Key Length: 224
            • MAC Length: 224
          • HMAC-SHA3-256:
            • Key Length: 256
            • MAC Length: 256
          • HMAC-SHA3-384:
            • Key Length: 384
            • MAC Length: 384
          • HMAC-SHA3-512:
            • Key Length: 512
            • MAC Length: 512
      • Key Length: 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDA OneStep Sp800-56Cr1
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA2-224
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA2-256
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA2-384
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA2-512
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA2-512/224
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA2-512/256
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA3-224
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA3-256
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA3-384
      • MAC Salting Methods: default, random
    • Auxiliary Function Methods:
      • Auxiliary Function Name: SHA3-512
      • MAC Salting Methods: default, random
  • Fixed Info Pattern: algorithmId||uPartyInfo||vPartyInfo
  • Fixed Info Encoding: concatenation
  • Derived Key Length: 1024
  • Shared Secret Length: 224-8192 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDF ANS 9.63
  • Hash Algorithm: SHA2-224, SHA2-256, SHA2-384, SHA2-512
  • Field Size: 224, 521
  • Shared Info Length: 0, 1024
  • Key Data Length: 256, 1024
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDF IKEv2
    • Capabilities:
      • Initiator Nonce Length: 64-2048 Increment 8
      • Responder Nonce Length: 64-2048 Increment 8
      • Diffie-Hellman Shared Secret Length: 224-8192 Increment 8
      • Derived Keying Material Length: 512-16384 Increment 8
      • Hash Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDF SP800-108
    • Capabilities:
      • KDF Mode: Counter
      • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
      • Supported Lengths: 8-256 Increment 8
      • Fixed Data Order: After Fixed Data, Before Fixed Data, In the Middle of Fixed Data
      • Counter Length: 16, 32
      • Supports Empty IV
      • Custom Key In Length: 0
    • Capabilities:
      • KDF Mode: Feedback
      • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
      • Supported Lengths: 8-256 Increment 8
      • Fixed Data Order: After Fixed Data, Before Fixed Data
      • Counter Length: 16, 32
      • Supports Empty IV
      • Custom Key In Length: 0
    • Capabilities:
      • KDF Mode: Double Pipeline Iteration
      • MAC Mode: CMAC-AES128, CMAC-AES192, CMAC-AES256, CMAC-TDES, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, HMAC-SHA2-512
      • Supported Lengths: 8-256 Increment 8
      • Fixed Data Order: After Fixed Data, Before Fixed Data, before iterator
      • Counter Length: 16, 32
      • Supports Empty IV
      • Custom Key In Length: 0
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDF SRTP
  • AES Key Length: 128, 192, 256
  • Supports Empty KDR
  • KDR Exponents: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDF SSH
  • Cipher: AES-128, TDES
  • Hash Algorithm: SHA-1, SHA2-224
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
KDF TLS
  • TLS Version: v1.0/1.1, v1.2
  • Hash Algorithm: SHA2-256, SHA2-384, SHA2-512
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
PBKDF
    • Capabilities:
      • Iteration Count: 10-1000 Increment 1
      • HMAC Algorithm: SHA-1, SHA2-224, SHA2-256, SHA2-384, SHA2-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
      • Password Length: 8-128 Increment 8
      • Salt Length: 128-4096 Increment 8
      • Key Data Length: 128-4096 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
RSA Decryption Primitive
  • Modulus Length: 2048
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
RSA KeyGen (FIPS186-4)
    • Capabilities:
      • Key Generation Mode: B.3.3
        • Properties:
          • Modulo: 2048
          • Primality Tests: Table C.2
        • Properties:
          • Modulo: 3072
          • Primality Tests: Table C.2
        • Properties:
          • Modulo: 4096
          • Primality Tests: Table C.2
        • Properties:
          • Modulo: 2048
          • Primality Tests: Table C.3
        • Properties:
          • Modulo: 3072
          • Primality Tests: Table C.3
        • Properties:
          • Modulo: 4096
          • Primality Tests: Table C.3
  • Public Exponent Mode: Random
  • Private Key Format: Chinese Remainder Theorem
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
RSA SigGen (FIPS186-4)
    • Capabilities:
      • Signature Type: ANSI X9.31
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
    • Capabilities:
      • Signature Type: PKCS 1.5
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
    • Capabilities:
      • Signature Type: PKCSPSS
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 0
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 0
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 0
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
RSA Signature Primitive
  • Private Key Format: standard
  • Public Exponent Mode: random
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
RSA SigVer (FIPS186-2)
  • Public Exponent Mode: Random
    • Capabilities:
      • Signature Type: ANSI X9.31
        • Properties:
          • Modulo: 1024
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 1536
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCS 1.5
        • Properties:
          • Modulo: 1024
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 1536
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
    • Capabilities:
      • Signature Type: PKCSPSS
        • Properties:
          • Modulo: 1024
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 32
        • Properties:
          • Modulo: 1536
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 32
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 32
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 32
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 32
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
RSA SigVer (FIPS186-4)
    • Capabilities:
      • Signature Type: ANSI X9.31
        • Properties:
          • Modulo: 1024
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
    • Capabilities:
      • Signature Type: PKCS 1.5
        • Properties:
          • Modulo: 1024
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA-1
            • Hash Pair:
              • Hash Algorithm: SHA2-224
            • Hash Pair:
              • Hash Algorithm: SHA2-256
            • Hash Pair:
              • Hash Algorithm: SHA2-384
            • Hash Pair:
              • Hash Algorithm: SHA2-512
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
    • Capabilities:
      • Signature Type: PKCSPSS
        • Properties:
          • Modulo: 1024
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 32
        • Properties:
          • Modulo: 2048
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 32
        • Properties:
          • Modulo: 3072
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 32
        • Properties:
          • Modulo: 4096
            • Hash Pair:
              • Hash Algorithm: SHA-1
              • Salt Length: 20
            • Hash Pair:
              • Hash Algorithm: SHA2-224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-256
              • Salt Length: 32
            • Hash Pair:
              • Hash Algorithm: SHA2-384
              • Salt Length: 48
            • Hash Pair:
              • Hash Algorithm: SHA2-512
              • Salt Length: 0
            • Hash Pair:
              • Hash Algorithm: SHA2-512/224
              • Salt Length: 28
            • Hash Pair:
              • Hash Algorithm: SHA2-512/256
              • Salt Length: 32
  • Public Exponent Mode: Random
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
Safe Primes Key Generation
  • Safe Prime Groups: ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
Safe Primes Key Verification
  • Safe Prime Groups: ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192, MODP-2048, MODP-3072, MODP-4096, MODP-6144, MODP-8192
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA-1
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA2-224
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA2-256
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA2-384
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA2-512
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA2-512/224
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA2-512/256
  • Message Length: 0-65536 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA3-224
  • Message Length: 0-65536 Increment 8
  • Large Message Sizes: 1, 2, 4gigabytes
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA3-256
  • Message Length: 0-65536 Increment 8
  • Large Message Sizes: 1, 2, 4gigabytes
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA3-384
  • Message Length: 0-65536 Increment 8
  • Large Message Sizes: 1, 2, 4gigabytes
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHA3-512
  • Message Length: 0-65536 Increment 8
  • Large Message Sizes: 1, 2, 4gigabytes
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHAKE-128
  • Supports Empty Message
  • Output Length: 16-384 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
SHAKE-256
  • Output Length: 16-384 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-CBC
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-CFB64
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-CFB8
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-CMAC
    • Capabilities:
      • Direction: Generation, Verification
      • Keying Option: 1
      • MAC Length: 8-64 Increment 8
      • Message Length: 0-1024 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-CMAC
    • Capabilities:
      • Direction: Generation, Verification
      • Keying Option: 2
      • MAC Length: 8-64 Increment 8
      • Message Length: 0-1024 Increment 8
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-CTR
  • Counter Tests Performed
  • Direction: Decrypt, Encrypt
  • Keying Option: 1
  • Payload Length: 64
  • Supports Counter larger than maximum value
  • Incremental Counter
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-ECB
  • Direction: Decrypt, Encrypt
  • Keying Option: 1, 2
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-KW
  • Direction: Decrypt, Encrypt
  • Cipher: Cipher
  • Payload Length: 192
Red Hat Enterprise Linux 8.2 with Java 8 on Intel® Xeon® E5-2603 v4
  • Processor: Intel® Xeon® E5-2603 v4
  • Operating System: Red Hat Enterprise Linux 8.2 with Java 8
TDES-OFB
  • Direction: Decrypt, Encrypt
  • Keying Option: 1

Created October 05, 2016, Updated April 03, 2025