Previous Topic: Cryptographic Module – RSA CryptoNext Topic: Component-Specific Cryptographic Use


Cryptographic Security Functions

The following table provides the cryptographic algorithms from the RSA Crypto-C module that CA ITCM uses for various security functions:

Security Function

Crypto Algorithm

Validation Certificate Number

Comments

Asymmetric encryption and decryption

RSA encrypt or decrypt

Non-approved

Allowed in FIPS 140-2 mode for key transport

Symmetric encryption and decryption

AES CBC

490

FIPS PUB 197 – Advanced Encryption Standard

Triple-DES

510

FIPS PUB 46-3 - Data Encryption Standards

FIPS SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

ANSI X9.52 – TDEA approved modes of operation

Hash Functions

SHA-1

560

FIPS PUB 180-3 – Secure Hash Standard

SHA-256

560

FIPS PUB 180-3 – Secure Hash Standard

SHA-512

560

FIPS PUB 180-3 – Secure Hash Standard

Random Number Generation

PRNG

270

FIPS PUB 186-2 – Digital Signature Standard

For more information, see Appendix 3: Random Number Generation For The DSA in the FIPS PUB 186-2 Digital Signature Standard document.

Asymmetric Key Establishment

TLS 1.0

Not Applicable

Allowed by the FIPS 140-2 Implementation Guidance document with FIPS approved cipher suites

 

SSH v2

Not Applicable

Allowed by the FIPS 140-2 Implementation Guidance document with FIPS approved cipher suites