This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program CAVP

Implementation Name
Description
The implementation of hash algorithm consists of 3 parts: 1) Initialization, 2) Grouping operation. Recovering the data is needed when the datea is not grouped in integer times, and 3) Holding the results of all the data. The implementation of CMAC refers to SP800-38B. SP800-108 KDF uses pseudorandom function in counter mode.
Version
1.0.1 (Firmware)
Type
SOFTWARE
Vendor
Feitian Technologies Co., Ltd.
Floor 17, Tower B, Huizhi Mansion
No.9 Xueqing Road
Haidian, Beijing 100085
China
Contacts
PENG Jie
pengjie@ftsafe.com
+8610 62304466-419
Fax: +8610 62304477
WenSheng Ju
wensheng@ftsafe.com
+8610 62304466-527
Fax: +8610 62304477

AES 3920 Expand All First Validated: 3/31/2016

Operating Environment Algorithm Capabilities
M7893 (Infineon Technologies AG& SLx78) AES-CMAC Expand

Created October 05, 2016, Updated November 24, 2020