Enhancing information security
Release Date:Dec 17, 2010
Last Updated:Nov 12, 2024
The modes of operation tested and states (encryption (e) and/or decryption (d)) for which the implementation was validated are described as below. For CFB mode, the number of feedback bits is specified.
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
1 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing
Ver. Date: 4/26/2010 |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
Nov 12, 2024
Contact Information is updated.
Dec 17, 2010
Page created