This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The implementation of hash algorithm consists of 3 parts: 1) Initialization, 2) Grouping operation. Recovering the data is needed when the datea is not grouped in integer times, and 3) Holding the results of all the data. The implementation of CMAC refers to SP800-38B. SP800-108 KDF uses pseudorandom function in counter mode.
Version
1.0.1 (Firmware)
Type
SOFTWARE
Vendor
Feitian Technologies Co., Ltd.
Floor 17, Tower B, Huizhi Mansion
No.9 Xueqing Road
Haidian, Beijing 100085
China
Contacts
PENG Jie
pengjie@ftsafe.com
+8610 62304466-419
Fax: +8610 62304477
WenSheng Ju
wensheng@ftsafe.com
+8610 62304466-527
Fax: +8610 62304477

KDF 89 Expand All First Validated: 3/31/2016

Operating Environment Algorithm Capabilities
M7893 (Infineon Technologies AG& SLx78) KDF SP800-108 Expand

Created October 05, 2016, Updated November 24, 2020