HOMEIT SecurityIT Security Evaluation and CertificationJCMVP (Japan Cryptographic Module Validation Program) Home IPA/ISEC：JCMVP：Register of Cryptographic Algorithm Verified Implementations

Last modified : 6 March 2020

Page created : 1 July 2008

IPA issues a cryptographic algorithm verification certificate on the module that passes the cryptographic algorithm implementation test of JCMVP. The following list is updated one by one as soon as a new cryptographic algorithm certificate is issued.

NOTE:

All questions regarding the implementation and/or use of any algorithm located on the following lists should first be directed to the appropriate VENDOR.

Approved Security Functions | Limited Security Functions | No longer approved cryptographic algorithms

**Approved Security Functions****Public Key****128-bit block cipher****Hash****Message Authentication****Random Number Generator****Key Establishment Technique**

For further information, contact to:

IT Security Center, Information-technology Promotion Agency, Japan

E-mail:

TEL +81-3-5978-7545 (10:00-12:00, 13:30-17:00 JST, Monday-Friday)

FAX +81-3-5978-7548

6 Mar. 2020 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( ECDSA, RSA, AES, SHS, HMAC, DRBG ) |
---|---|

20 Dec. 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( ECDSA, RSA, SHS ) |

16 Dec. 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( DRBG ) |

7 June 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( ECDSA, RSA, AES, SHS, HMAC , DRBG ) |

24 May 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, AES, SHS, HMAC ) |

1 Mar. 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( AES ) |

18 Jan. 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, AES, SHS, DRBG) |

7 Jan. 2019 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, AES, SHS, HMAC, DRBG, KDF) |

26 July 2018 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, AES, SHS, HMAC, DRBG) |

10 July 2018 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( AES, SHS HMAC) |

22 June 2018 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, 3-key Triple DES, AES, SHS HMAC) |

10 Jan. 2018 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( AES, SHS HMAC, DRBG) |

11 Sep. 2017 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, AES, SHS HMAC, DRBG) |

12 July 2017 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, AES, SHS) |

21 May 2015 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( AES, SHS, HMAC, DRBG) |

23 Aug. 2013 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, 3-key Triple DES, AES, SHS, HMAC, DRBG) |

6 Nov. 2012 | The Register of Cryptographic Algorithm Verified Implementations is updated. (AES, DRBG) |

22 June 2012 | The Register of Cryptographic Algorithm Verified Implementations is updated. ( RSA, CIPHERUNICORN-E, 3-key Triple DES, AES, CIPHERUNICORN-A, SHS, HMAC, DH) |

2 Apr. 2012 | The Register of Cryptographic Algorithm Verified Implementations is updated. (AES, SHS, HMAC) |

10 Feb. 2010 | The Register of Cryptographic Algorithm Verified Implementations is updated. |

3 Feb. 2010 | The Register of Cryptographic Algorithm Verified Implementations is updated due to business succession. |

2 June 2009 | The Register of Cryptographic Algorithm Verified Implementations is updated. |

1 Apr. 2009 | The Register of Cryptographic Algorithm Verified Implementations is updated. |

26 Feb. 2009 | The Register of Cryptographic Algorithm Verified Implementations is updated. |

4 Nov. 2008 | The Register of Cryptographic Algorithm Verified Implementations is updated. |

1 July 2008 | Page created |