Enhancing information security
Release Date:Feb 26, 2009
Last Updated:Jun 22, 2012
Explanation of terms
The modes of operation tested, states (encryption (e) and/or decryption (d)) and key sizes (128-bit, 192-bit, and/or 256-bit) for which the implementation was validated are described as below. For CFB mode, the number of feedback bits is specified. For Counter (CTR) mode, the counter source (internal(int) and/or external(ext)) is also indicated.
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
3 |
---|---|
Vendor |
|
Implementation/ Version/ Ver. Date |
SecureWare/Development Kit Ver5.0
|
Operational Environment |
|
Modes/ States/Key size/ Notes |
|
Cert. # |
2 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing
Ver. Date: 4/26/2010 |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
Cert. # |
1 |
---|---|
Vendor |
|
Implementation/ Version/ Ver. Date |
“SecureWare/Development Kit Ver5.0” with
|
Operational Environment |
|
Modes/ States/Key size/ Notes |
|
For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
TEL
+81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX
+81-3-5978-7548
Jun 22, 2012
The list of AES verified implementations is updated.
Jun 29, 2010
The list of AES verified implementations is updated.
Feb 26, 2009
Page created