Approved Security Functions
Last modified: 14 Feb. 2013
Page created: 2 June 2008
The specifications about the approved security functions (ASF-01; in Japanese)![[PDF]](../../images/icon_pdf.gif)
such as an encryption function, a hash function, and the signature function are shown as follows.
Public Key
Signature
- DSA
FIPS PUB 186-2 with Change Notice 1, Digital Signature Standard (DSS), October 05, 2001.
Note: The length of the parameter p shall be 1,024 bits or larger.
- DSA
![[New]](/images/icon_new_ani.gif)
FIPS PUB 186-3, Digital Signature Standard (DSS), June 2009.
- ECDSA
ANS X9.62-2005, Public Key Cryptography for the Financial Services Industry :
The Elliptic Curve Digital Signature Algorithm (ECDSA)
- ECDSA
FIPS PUB 186-3, Digital Signature Standard (DSS), June 2009
- ECDSA
SEC 1: Elliptic Curve Cryptography (September 20, 2000 Version 1.0)
Note: The underlying field of the elliptic curve and the curve order shall be 160 bits or larger.
- RSASSA-PKCS1-v1_5
PKCS#1 v2.1: RSA Cryptography Standard, June 14, 2002.
Note: The length of the parameter n shall be 1,024 bits or larger.
- RSASSA-PSS
PKCS#1 v2.1: RSA Cryptography Standard, June 14, 2002.
Note: The length of the parameter n shall be 1,024 bits or larger.
Confidentiality
- RSA-OAEP
PKCS#1 v2.1: RSA Cryptography Standard, June 14, 2002.
Note: The length of the parameter n shall be 1,024 bits or larger.
- RSAES-PKCS1-v1_5
PKCS#1 v2.1: RSA Cryptography Standard, June 14, 2002.
Note: The length of the parameter n shall be 1,024 bits or larger.
Symmetric Key
64-bit block cipher
- CIPHERUNICORN-E
Cipher technology specifications CIPHERUNICORN-E
- Hierocrypt-L1
Cipher technology specifications: Hierocrypt-L1 (May 2002)
- MISTY1
Cipher technology specifications: MISTY1 (updated May 13, 2002)
- 3-key Triple DES
SP 800-67, Recommendation for the Triple Data Encryption Algorithm
(TDEA) Block Cipher, May 2004.
Note: Only 3-key Triple-DES is approved.
128-bit block cipher
- AES
FIPS PUB 197, Advanced Encryption Standard (AES), November 26, 2001
- Camellia
128 bits block cipher Camellia algorithm specifications (the second edition: September 26, 2001)
- CIPHERUNICORN-A
Code technology specifications CIPHERUNICORN-A
- Hierocrypt-3
Code technology specifications: Hierocrypt-3(May 2002)
- SC2000
Symmetric key block code SC2000 code technology specifications (September 26, 2001)
n-bit block cipher modes of operations
- Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher
Feedback (CFB), Output Feedback (OFB), and Counter (CTR)
SP 800-38A, Recommendation for Block Cipher Modes of Operation, December 2001.
128-bit block cipher modes of operations
- XTS
SP 800-38E, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, January 2010.
Stream cipher
- MUGI
Pseudorandom number generator MUGI specifications Ver. 1.3 (May 8, 2002)
- MUlTI-S01
MULTI-S01 Cipher Specifications Version1.2 (May 12, 2002)
- 128-bit RC4 (Arcfour)
Fluhrer Scott, Itsik Mantin, and Adi Shamir. Attacks On RC4 and
WEP. CryptoBytes, Vol5, No.2, P.26, Summer/Fall 2002
Note: The use of 128-bit RC4 is limited for SSL3.0/TLS1.0 or later.
Hash
Message Authentication
- HMAC (HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-512/224, and HMAC-SHA-512/256)
![[Update]](../../images/icon_update_ani.gif)
The Keyed-Hash Message Authentication Code, FIPS PUB 198-1, July 2008.
- CMAC
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38B, May 2005.
- CCM
Recommendation for Block Cipher Modes of Operation: The CCM Mode for
Authentication and Confidentiality, NIST Special Publication 800-38C, May 2004.
- GCM/GMAC
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D, November 2007.
Random Number Generators
Deterministic random number generators
- PRNG based on SHA-1 in ANSI X9.42-2001 Annex C.1
American Bankers Association, Public Key Cryptography for the Financial
Services Industry, ANSI X9.42-2001 - Annex C.1
- PRNG based on SHA-1 for general purpose in FIPS 186-2 (+ change
notice 1) Appendix 3.1
National Institute of Standards and Technology, Digital Signature
Standard (DSS), Federal Information Processing Standards Publication
186-2, January 27, 2000 - Appendix 3.1.
- PRNG based on SHA-1 for general purpose in FIPS 186-2 (+ change
notice 1) revised Appendix 3.1
National Institute of Standards and Technology, Digital Signature
Standard (DSS), Federal Information Processing Standards Publication
186-2, January 27, 2000 - Appendix 3.1.
- ANSI X9.31 Appendix A.2.4 Using 3-Key Triple DES
National Institute of Standards and Technology, NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms, January 31, 2005.
- ANSI X9.31 Appendix A.2.4 Using AES
National Institute of Standards and Technology, NIST-Recommended Random Number Generator Based on ANSI X9.31 Appendix A.2.4 Using the 3-Key Triple DES and AES Algorithms, January 31, 2005.
- Hash_DRBG, HMAC_DRBG and CTR_DRBG
![[Update]](../../images/icon_update_ani.gif)
National Institute of Standards and Technology, Recommendation for Random Number
Generation Using Deterministic Random Bit Generators (Revised), Special Publication 800-90A, January 2012.
Non-deterministic Random number generators
There are no approved non-deterministic random number generators in JCMVP.
Key Establishment Schemes
Key agreement
- DH
ANS X9.42-2003, Public Key Cryptography for the Financial Services Industry:
Agreement of Symmetric Keys Using Discrete Logarithm Cryptography
Note: The length of the parameter p shall be 1,024 bits or larger.
- DH
National Institute of Standards and Technology, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), Special Publication 800-56A, March 2007.
- MQV
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Pair-Wise Key
Establishment Schemes Using Discrete Logarithm Cryptography (Revised), Special Publication 800-56A, March 2007.
- ECDH
![[Update]](../../images/icon_update_ani.gif)
National Institute of Standards and Technology, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), Special Publication 800-56A, March 2007.
- ECDH
SEC 1: Elliptic Curve Cryptography(September 20, 2000 Version 1.0)
Note: The underlying field of the elliptic curve and the curve order shall be 160 bits or larger.
- ECMQV
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Pair-Wise Key
Establishment Schemes Using Discrete Logarithm Cryptography (Revised), Special Publication 800-56A, March 2007.
- PSEC-KEM
PSEC-KEM specifications version 2.2 (April 14, 2008)
Note: The length of the parameter q shall be 1,024 bits or larger.
- Key Establishment Schemes in NIST SP800-56B
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Pair-Wise Key
Establishment Schemes Using Integer Factorization Cryptography, Special Publication 800-56B, August 2009.
- KDF
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Key Derivation
through Extraction-then-Expansion, Special Publication 800-56C, November 2011.
- KDF
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Key Derivation Using Pseudorandom Functions (Revised), Special Publication 800-108, October 2009.
- KDF
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Password-Based
Key Derivation, Special Publication 800-132, December 2010.
- KDF
![[New]](/images/icon_new_ani.gif)
National Institute of Standards and Technology, Recommendation for Existing Application-Specific Key Derivation Functions, Special Publication 800-135 Revision 1, December 2011.
Note: TPM KDF is excluded.
Contact
For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
E-mail:
TEL +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX +81-3-5978-7548
Revision Record
| 14 Feb. 2013 |
The list of Approved Security Functions is updated. |
| 20 Apr. 2012 |
XTS and GCM has been added to the list of Approved Security Functions. |
| 26 Oct. 2009 |
The list of Approved Security Functions is updated. |
| 26 Feb. 2009 |
The list of Approved Security Functions is updated. |
| 2 June 2008 |
Page created. |