Security Policy: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
Line 96: Line 96:
* SHA-1, SHA-256, SHA-384, or SHA-512 (FIPS PUB 180-2) for hashing,
* SHA-1, SHA-256, SHA-384, or SHA-512 (FIPS PUB 180-2) for hashing,
* HMAC (FIPS PUB 198) for keyed hash,
* HMAC (FIPS PUB 198) for keyed hash,
* random number generator (FIPS PUB 186-2 Change Notice 1),
* Diffie-Hellman, EC Diffie-Hellman, or Key Wrapping using RSA keys for key establishment, and
* Diffie-Hellman, EC Diffie-Hellman, or Key Wrapping using RSA keys for key establishment, and
* DSA (FIPS PUB 186-2), RSA (PKCS #1), or ECDSA (ANSI X9.62) for signature generation and verification.
* DSA (FIPS PUB 186-2), RSA (PKCS #1), or ECDSA (ANSI X9.62) for signature generation and verification.
Line 285: Line 286:
* For the FIPS Approved mode of operation, look up the alternative function <code>"FC_GetFunctionList"</code>.
* For the FIPS Approved mode of operation, look up the alternative function <code>"FC_GetFunctionList"</code>.
|}
|}
==Cryptoalgorithms Supported==
* RC2-ECB and CBC
* RC4
* DES-ECB and CBC
* triple DES-ECB and CBC
* AES-128,-192,-256-ECB and CBC
* MD2
* MD5
* SHA-1, SHA-256, SHA-384, SHA-512
* HMAC
* RSA encryption/decryption
* RSA-SHA-1,-SHA-256,-SHA-384,-SHA-512 Signatures
* DSA Signature
* ECDSA Signature
* PRNG


==Non-NIST-Recommended Elliptic Curves==
==Non-NIST-Recommended Elliptic Curves==
canmove, Confirmed users
937

edits

Navigation menu