Enhancing information security
Release Date:Dec 17, 2010
Last Updated:Dec 17, 2010
Explanation of terms
The modes of operation tested, states (encryption (e) and/or decryption (d)) and key sizes (128-bit, 192-bit, and/or 256-bit) for which the implementation was validated are described as below. For CFB mode, the number of feedback bits is specified. For Counter (CTR) mode, the counter source (internal(int) and/or external(ext)) is also indicated.
SC2000 Modes of Operation
The list is in reverse numerical order, by certificate number. Thus, the more recent verifications are closer to the top of the list.
Cert. # |
1 |
---|---|
Vendor |
2-3 Kanda-Nishikicho, Chiyoda-ku,
TEL: +81-3-5281-5345 |
Implementation/ |
Cryptographic software for evaluation to Cloud Computing |
Operational |
This algorithm implementation has been confirmed on 12 operational environments. Here are enumerated common hardware and software referenced by the 12 operational environments.
|
Modes/ States/ |
|
For further information, contact to:
IT Security Center, Information-technology Promotion Agency, Japan
TEL
+81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)
FAX
+81-3-5978-7548
Dec 17, 2010
Page created.