Enhancing information security
Release Date:Dec 17, 2010
Last Updated:Dec 17, 2010
Explanation of terms
The modes of operation tested and states (encryption (e) and/or decryption (d)) for which the implementation was validated are described as below. For CFB mode, the number of feedback bits is specified.
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
1 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing
Ver. Date: 4/26/2010 |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
For further information, contact to: IT Security Center, Information-technology Promotion Agency, Japan
TEL
+81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX
+81-3-5978-7548
Dec 17, 2010
Page created