Enhancing information security
Release Date:Jul 1, 2008
Last Updated:Feb 8, 2021
Explanation of term
The modes of operation tested, states (encryption (e) and/or decryption (d)) and key sizes (128-bit, 192-bit, and/or 256-bit) for which the implementation was validated are described as below. For CFB mode,the number of feedback bits is specified.
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
4 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing
Ver. Date: 4/26/2010 |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
Cert. # |
3 |
---|---|
Vendor |
30-2,Shimomaruko3-chome, Ohta-ku,
(Software Development Center 1) |
Implementation/ |
C-SELECT |
Operational |
|
Description / |
|
Cert. # |
2 |
---|---|
Vendor |
30-2,Shimomaruko3-chome, Ohta-ku,
(Software Development Center 1) |
Implementation/ |
C-SELECT |
Operational |
|
Modes/States/ |
|
Cert. # |
1 |
---|---|
Vendor |
30-2,Shimomaruko3-chome, Ohta-ku,
(Software Development Center 1) |
Implementation/ |
C-SELECT |
Operational |
|
Modes/States/ |
|
IT Security Center, Information-technology Promotion Agency, Japan
TEL
+81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX
+81-3-5978-7548
Feb 8, 2021
The information of Cert.# 3,2,1 has been updated due to personnel changes.
Dec 17, 2010
The list of Camellia verified implementations is updated
Jun 2, 2009
The list of Camellia verified implementations is updated
Jul 1, 2008
Page created