Enhancing information security
Release Date:Feb 26, 2009
Last Updated:Nov 12, 2024
The modes of operation tested and states (encryption (e) and/or decryption (d)) for which the implementation was validated are described as below. For CFB mode, the number of feedback bits is specified.
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
3 |
---|---|
Vendor |
NEC Corporation
|
Implementation/Version/Ver. Date |
SecureWare/Development Kit Ver5.0
Ver. Date: 6/11/2012 |
Operational Environment |
|
Modes/ States/ Key size/ Notes |
|
Cert. # |
2 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing
Ver. Date: 4/26/2010 |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
Cert. # |
1 |
---|---|
Vendor |
NEC Corporation
|
Implementation/Version/Ver. Date |
“SecureWare/Development Kit Ver5.0”with
Ver. Date: 12/8/2008 |
Operational Environment |
|
Modes/ States/ Key size/ Notes |
|
For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
Nov 12, 2024
Contact Information is updated.
Jun 22, 2012
The list of CIPHERUNICORN-E verified implementations is updated.
Dec 17, 2010
The list of CIPHERUNICORN-E verified implementations is updated.
Feb 26, 2009
Page created