Projects
Cryptographic Algorithm Validation Program
Cryptographic Algorithm Validation Program CAVP
Description
This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.
Vendor
Contacts
Unbound Tech
contact@unboundtech.com
631-316-8114
Operating Environment |
Algorithm Capabilities |
Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit on Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA)
|
RSA Decryption Primitive
Expand
|
Red Hat Enterprise Linux Server release 7.3 on Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA)
|
RSA Decryption Primitive
Expand
|
Red Hat Enterprise Linux Server release 7.3 on Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA)
|
RSA Decryption Primitive
Expand
|
SUSE Linux Enterprise Server Version 12 on Intel Xeon E5450, 3 GHz without AES-NI (PAA)
|
RSA Decryption Primitive
Expand
|
Windows Server 2016 Standard Evaluation, 64-bit on Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA)
|
RSA Decryption Primitive
Expand
|
Windows Server 2016 Standard Evaluation, 64-bit on Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA)
|
RSA Decryption Primitive
Expand
|
Created October 05, 2016, Updated November 24, 2020