The following table provides the cryptographic algorithms from the RSA Crypto-C module that CA ITCM uses for various security functions:
|
Security Function |
Crypto Algorithm |
Validation Certificate Number |
Comments |
|---|---|---|---|
|
Asymmetric encryption and decryption |
RSA encrypt or decrypt |
Non-approved |
Allowed in FIPS 140-2 mode for key transport |
|
Symmetric encryption and decryption |
AES CBC |
490 |
FIPS PUB 197 – Advanced Encryption Standard |
|
Triple-DES |
510 |
FIPS PUB 46-3 - Data Encryption Standards FIPS SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher ANSI X9.52 – TDEA approved modes of operation |
|
|
Hash Functions |
SHA-1 |
560 |
FIPS PUB 180-3 – Secure Hash Standard |
|
SHA-256 |
560 |
FIPS PUB 180-3 – Secure Hash Standard |
|
|
SHA-512 |
560 |
FIPS PUB 180-3 – Secure Hash Standard |
|
|
Random Number Generation |
PRNG |
270 |
FIPS PUB 186-2 – Digital Signature Standard For more information, see Appendix 3: Random Number Generation For The DSA in the FIPS PUB 186-2 Digital Signature Standard document. |
|
Asymmetric Key Establishment |
TLS 1.0 |
Not Applicable |
Allowed by the FIPS 140-2 Implementation Guidance document with FIPS approved cipher suites |
|
|
SSH v2 |
Not Applicable |
Allowed by the FIPS 140-2 Implementation Guidance document with FIPS approved cipher suites |
|
Copyright © 2013 CA.
All rights reserved.
|
|