Enhancing information security
Release Date:Jul 1, 2008
Last Updated:Nov 12, 2024
The modes of operation tested, states (encryption (e) and/or decryption (d)) and key sizes (128-bit, 192-bit, and/or 256-bit) for which the implementation was validated are described as below. For CFB mode,the number of feedback bits is specified.
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
4 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing
Ver. Date: 4/26/2010 |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
Cert. # |
3 |
---|---|
Vendor |
30-2,Shimomaruko3-chome, Ohta-ku,
(Software Development Center 1) |
Implementation/ |
C-SELECT |
Operational |
|
Description / |
|
Cert. # |
2 |
---|---|
Vendor |
30-2,Shimomaruko3-chome, Ohta-ku,
(Software Development Center 1) |
Implementation/ |
C-SELECT |
Operational |
|
Modes/States/ |
|
Cert. # |
1 |
---|---|
Vendor |
30-2,Shimomaruko3-chome, Ohta-ku,
(Software Development Center 1) |
Implementation/ |
C-SELECT |
Operational |
|
Modes/States/ |
|
For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
Nov 12, 2024
Contact Information is updated.
Feb 8, 2021
The information of Cert.# 3,2,1 has been updated due to personnel changes.
Dec 17, 2010
The list of Camellia verified implementations is updated
Jun 2, 2009
The list of Camellia verified implementations is updated
Jul 1, 2008
Page created