Projects
Cryptographic Algorithm Validation Program
Cryptographic Algorithm Validation Program CAVP
Description
The implementation of hash algorithm consists of 3 parts: 1) Initialization, 2) Grouping operation. Recovering the data is needed when the datea is not grouped in integer times, and 3) Holding the results of all the data. The implementation of CMAC refers to SP800-38B. SP800-108 KDF uses pseudorandom function in counter mode.
Vendor
Contacts
PENG Jie
pengjie@ftsafe.com
+8610 62304466-419
Fax: +8610 62304477
WenSheng Ju
wensheng@ftsafe.com
+8610 62304466-527
Fax: +8610 62304477
Operating Environment |
Algorithm Capabilities |
M7893 (Infineon Technologies AG& SLx78)
|
AES-CMAC
Expand
|
Created October 05, 2016, Updated November 24, 2020