Projects
Cryptographic Algorithm Validation Program
Cryptographic Algorithm Validation Program CAVP
Description
The BeCrypt Cryptographic Library provides core cryptographic functionality for BeCrypt's security products providing a capability to develop complex and flexible security applications that require cryptographic functionality for pre-OS (16-bit), 32-bit and 64-bit operating environments.
Vendor
Becrypt Ltd.
11-19 Artillery Row Covent Garden London, England SW1P 1RT United Kingdom
Contacts
Mark Wilce
MWilce@becrypt.com
+44 207 557 6515
Fax: +44 845 838 2060
Andrew Palka
apalka@becrypt.com
+44 163 586 9170
Operating Environment |
Algorithm Capabilities |
Android v4.2.2 on Google Nexus 7 (2012) with NVidia Tegra 3 ARM v6
|
SHA-1
Expand
|
Microsoft Windows 7 Enterprise Edition on Dell Vostro 1500 with Intel Centrino Duo 64-bit processor
|
SHA-1
Expand
|
Microsoft Windows 7 Ultimate Edition on Dell D630 with Intel Centrino Duo 32-bit processor
|
SHA-1
Expand
|
Microsoft Windows 8.1 Professional on Dell Venue 11 Pro (7130) with Intel Core i5-4300Y 64-bit AES-NI processor
|
SHA-1
Expand
|
Ubuntu Linux 12.04 LTS on Dell D630 with Intel Centrino Duo 32-bit processor
|
SHA-1
Expand
|
Ubuntu Linux 12.04 LTS on Dell Vostro 1500 with Intel Centrino Duo 64-bit processor
|
SHA-1
Expand
|
Android v4.2.2 on Google Nexus 7 (2012) with NVidia Tegra 3 ARM v6
|
SHA-256
Expand
|
Microsoft Windows 7 Enterprise Edition on Dell Vostro 1500 with Intel Centrino Duo 64-bit processor
|
SHA-256
Expand
|
Microsoft Windows 7 Ultimate Edition on Dell D630 with Intel Centrino Duo 32-bit processor
|
SHA-256
Expand
|
Microsoft Windows 8.1 Professional on Dell Venue 11 Pro (7130) with Intel Core i5-4300Y 64-bit AES-NI processor
|
SHA-256
Expand
|
Ubuntu Linux 12.04 LTS on Dell D630 with Intel Centrino Duo 32-bit processor
|
SHA-256
Expand
|
Ubuntu Linux 12.04 LTS on Dell Vostro 1500 with Intel Centrino Duo 64-bit processor
|
SHA-256
Expand
|
Created October 05, 2016, Updated November 24, 2020