Skip to content

Analyze and test CC/FIPS140 certificates for non-standard vendor-specific algorithm constants #263

@petrs

Description

@petrs

Example: Oberthur ID-One Cosmo128 v5.5 D, security policy document
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp944.pdf
2.3.2 Additional Cryptographic Algorithms

Alternative: Scan whole range of constants for a given algorithm build factory-style method

Examples from Oberthur ID-One Cosmo128 v5.5 D, security policy document
ALG_SHA_224 (0x08) Message Digest operationsALG_SHA_CHAIN (0x81)
ALG_SHA2_CHAIN (0x82)
Elliptic Curves ALG_ECDSA_SHA224(0x21)
GF(p) algorithm
Signature/verification operations
Elliptic Curves ALG_ECDSA_SHA256(0x22)
Elliptic Curves ALG_ECDSA_SHA384(0x23)
ALG_ECDSA_SHA_LDS (0x25)
ALG_ECDSA_SHA256_LDS(0x26)
ALG_ECDSA_SHA384_LDS(0x27)
Diffie-Hellman KEYAGREEMENT_ALGO_RSA(0x81) Key Agreement OperationsDiffie-Hellman ALG_EC_SVDP_DH_GK (0x82)
Diffie-Hellman ALG_EC_SVDP_DHC_GK (0x83)
Non-Deterministic Random Number Generator (NDRNG) Hardware Seed Generation for
the Deterministic RNG

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions