Enhancing information security

Approved Security Functions

Release Date:Jun 2, 2008

Last Updated:Jul 1, 2023

Approved Security Functions

The Approved Security Functions in JCMVP are specified below such as encryption functions, hash functions, and signature functions.

Public Key

Signature

  • 1,DSA
  • 2.ECDSA
    • ANS X9.62-2005, Public Key Cryptography for the Financial Services Industry :
      The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • Note: The length of the order of the elliptic curve shall be 224 bits or larger and the length of the output of the hash function shall be 224 bits or larger.
  • 3.ECDSA
  • 4.ECDSA
  • 5.RSASSA-PKCS1-v1_5
    • PKCS#1 v2.2: RSA Cryptography Standard, October 27, 2012.
    • Note: The length of the modulus shall be 2048 bits or larger and the length of the output of the hash function shall be 224 bits or larger.
  • 6.RSASSA-PSS
    • PKCS#1 v2.2: RSA Cryptography Standard, October 27, 2012.
    • Note: The length of the modulus shall be 2048 bits or larger and the length of the output of the hash function shall be 224 bits or larger.

Confidentiality

  • 7.RSA-OAEP
    • PKCS#1 v2.2: RSA Cryptography Standard, October 27, 2012.
    • Note: The length of the modulus shall be 2048 bits or larger and the length of the output of the hash function shall be 224 bits or larger.

Note: Reference Urls of PKCS#1 v2.2 have been changed to RFC8017.

Symmetric Key

128-bit block cipher

n-bit block cipher modes of operations

128-bit block cipher modes of operations

Stream cipher

Hash

  1. Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, SHA-512/224 and SHA-512/256)
  2. SHA-3 Hash Algorithms (SHA3-256, SHA3-384, SHA3-512)
  3. SHA-3 Extendable-Output Functions (SHAKE128, SHAKE256)

Message Authentication

  1. HMAC (HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-512/224, and HMAC-SHA-512/256)
  2. CMAC
  3. CCM
  4. GCM/GMAC
  5. GCM-AES-XPN
    • IEEE Standards Association, Standard for Local and metropolitan area networks, Media Access Control (MAC) Security, Amendment 2: Extended Packet Numbering, 802.1AEbw-2013, February 12, 2013.

Random Number Generators

Deterministic random number generators

  1. Hash_DRBG, HMAC_DRBG and CTR_DRBG

Non-deterministic Random number generators

There are no approved non-deterministic random number generators in JCMVP.

Key Establishment Schemes

Key agreement

  1. DH
  2. MQV
  3. ECDH
  4. ECDH
  5. ECMQV
  6. Key Establishment Schemes in NIST SP800-56B
  7. KDF
  8. KDF
  9. KDF
  10. KDF

Contact information

IT Security Center, Information-technology Promotion Agency, Japan

  • E-mail

    jcmvp-infoアットマークipa.go.jp

  • TEL

    +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)

  • FAX

    +81-3-5978-7548

Change log

  • Jul 1, 2023

    The old specifcation of Approved Security Functions, valid until June 30, 2023, is deleted.

  • Dec 21, 2022

    The list of Approved Security Functions is corrected.

  • Aug 22, 2022

    The list of Approved Security Functions is updated.

  • Sep 21, 2021

    Reference URLs are updated.

  • Jan 8, 2020

    The list of Approved Security Functions is updated.

  • Jul 19, 2019

    The list of Approved Security Functions is updated.

  • Jun 27, 2018

    The list of Approved Security Functions is updated.

  • Jul 24, 2014

    The list of Approved Security Functions is updated.

  • Oct 7, 2013

    Reference URLs are updated.

  • Jun 24, 2013

    The list of Approved Security Functions is updated.