Approved Security Functions
Release Date:Jun 2, 2008
Last Updated:Jul 1, 2023
Approved Security Functions
The Approved Security Functions in JCMVP are specified below such as encryption functions, hash functions, and signature functions.
Public Key
Signature
 1,DSA
 2.ECDSA
 ANS X9.622005, Public Key Cryptography for the Financial Services Industry :
The Elliptic Curve Digital Signature Algorithm (ECDSA)
 Note: The length of the order of the elliptic curve shall be 224 bits or larger and the length of the output of the hash function shall be 224 bits or larger.
 3.ECDSA
 4.ECDSA
 5.RSASSAPKCS1v1_5
 PKCS#1 v2.2: RSA Cryptography Standard, October 27, 2012.
 Note: The length of the modulus shall be 2048 bits or larger and the length of the output of the hash function shall be 224 bits or larger.
 6.RSASSAPSS
 PKCS#1 v2.2: RSA Cryptography Standard, October 27, 2012.
 Note: The length of the modulus shall be 2048 bits or larger and the length of the output of the hash function shall be 224 bits or larger.
Confidentiality
 7.RSAOAEP
 PKCS#1 v2.2: RSA Cryptography Standard, October 27, 2012.
 Note: The length of the modulus shall be 2048 bits or larger and the length of the output of the hash function shall be 224 bits or larger.
Note: Reference Urls of PKCS#1 v2.2 have been changed to RFC8017.
Symmetric Key
128bit block cipher
nbit block cipher modes of operations
 4.Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR)
128bit block cipher modes of operations
Stream cipher
Hash
 Secure Hash Standard (SHA1, SHA224, SHA256, SHA384 and SHA512, SHA512/224 and SHA512/256)
 SHA3 Hash Algorithms (SHA3256, SHA3384, SHA3512)
 SHA3 ExtendableOutput Functions (SHAKE128, SHAKE256)
Message Authentication
 HMAC (HMACSHA1, HMACSHA224, HMACSHA256, HMACSHA384, HMACSHA512, HMACSHA512/224, and HMACSHA512/256)
 CMAC
 CCM
 GCM/GMAC
 GCMAESXPN
 IEEE Standards Association, Standard for Local and metropolitan area networks, Media Access Control (MAC) Security, Amendment 2: Extended Packet Numbering, 802.1AEbw2013, February 12, 2013.
Random Number Generators
Deterministic random number generators
 Hash_DRBG, HMAC_DRBG and CTR_DRBG
Nondeterministic Random number generators
There are no approved nondeterministic random number generators in JCMVP.
Key Establishment Schemes
Key agreement
 DH
 MQV
 ECDH
 ECDH
 ECMQV
 Key Establishment Schemes in NIST SP80056B
 KDF
 KDF
 KDF
 KDF
Contact information
IT Security Center, Informationtechnology Promotion Agency, Japan
Change log

Jul 1, 2023
The old specifcation of Approved Security Functions, valid until June 30, 2023, is deleted.

Dec 21, 2022
The list of Approved Security Functions is corrected.

Aug 22, 2022
The list of Approved Security Functions is updated.

Sep 21, 2021
Reference URLs are updated.

Jan 8, 2020
The list of Approved Security Functions is updated.

Jul 19, 2019
The list of Approved Security Functions is updated.

Jun 27, 2018
The list of Approved Security Functions is updated.

Jul 24, 2014
The list of Approved Security Functions is updated.

Oct 7, 2013
Reference URLs are updated.

Jun 24, 2013
The list of Approved Security Functions is updated.