Projects
Cryptographic Algorithm Validation Program
Cryptographic Algorithm Validation Program CAVP
Description
The Cord3 Cryptographic Library provides protection for individual information assets in support of data-centric security principles that ensure that access to content adheres to a organizational security policy.
Vendor
Contacts
Glen Henderson
glen@cord3inc.com
613-808-9979
Operating Environment |
Algorithm Capabilities |
Centos 7 64-bit on VMware ESXi 6.5 on Intel Xeon
|
SHA-1
Expand
|
Centos 7 64-bit on VMware ESXi 6.5 on Intel Xeon
|
SHA-256
Expand
|
Operating Environment |
Algorithm Capabilities |
Centos 7 64-bit on VMware ESXi 6.5 on Intel Xeon
|
AES-CBC
Expand
|
Centos 7 64-bit on VMware ESXi 6.5 on Intel Xeon
|
AES-ECB
Expand
|
Operating Environment |
Algorithm Capabilities |
Centos 7 64-bit on VMware ESXi 6.5 on Intel Xeon
|
HMAC-SHA-1
Expand
|
Centos 7 64-bit on VMware ESXi 6.5 on Intel Xeon
|
HMAC-SHA2-256
Expand
|
Created October 05, 2016, Updated November 24, 2020