Cryptographic Algorithm Testing

What atsec offers
atsec offers the following algorithm testing under the NIST Cryptographic Algorithm Validation (CAVP) Scheme:

  • Symmetric Key encryption algorithms: AES (mode: ECB, CBC, OFB, CFB, CTR, and XTS); Triple-DES (mode: ECB, CBC, OFB, CFB, and CTR)
  • Asymmetric Key encryption algorithms: DSA(FIPS 186-4); Elliptic Curve DSA (FIPS 186-4); RSA (FIPS 186-4)
  • Secure Hash Standard: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
  • Random Number Generator (RNG) algorithms: FIPS 186-2 Appendix 3.1 and 3.2 ; ANS X9.31 Appendix A.2.4 ; ANS X9.62, Appendix A.4
  • Deterministic Random Bit Generator (DRBG) specified in SP800-90A: Hash DRBG; HMAC DRBG; CTR DRBG; Dual EC DRBG
  • Message Authentication (MAC) algorithms:
    • HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-512/224, HMAC-SHA-512/256
    • CMAC based on AES (certificates listed on AES Validation list), CMAC based on Triple-DES (certificates listed on Triple-DES validation list)
    • CCM based on AES (certificates listed on AES Validation list)
    • GCM based on AES (certificates listed on AES Validation list)
  • Key Agreement Scheme (KAS): Finite Field Cryptography (based on ANS X9.42) and Elliptic Curve Cryptography (based on ANS X9.63) for both Diffie-Hellman and MQV
  • AES Key Wrapping (NIST SP 800-38F)
  • Other: The NIST SP 800-56A Elliptic Curve Cryptography Cofactor Diffie-Hellman (ECC CDH) Primitive, Section 5.7.1.2; SP800-135 Existing Application-Specific Key Devivation Functions (KDF); SP 800-108 Key-Based Key Derivation Functions (KDF); RSA Component Tests for Signature Primitive

atsec also offers the following algorithm testing for Non FIPS Approved Algorithms by our laboratory (NOT VALIDATED BY NIST):

  • RC4
  • CRC
  • DES
  • MAC
  • Blowfish
  • and others: please enquire.

Why our services are important to you
NIST metrics have determined that approximately 25% of algorithms are implemented incorrectly. An independent review of algorithm implementation integrity increases your assurance and reduces operational and business risks for your products in the field.