Algorithm Support

This page describes the algorithms supported by Fortanix Data Security Manager (DSM).

For more information on Fortanix DSM cryptographic policies, refer to User's Guide: Cryptographic Policy.

Crypto Primitive Type Algorithm Mode/Method Key Size/Curve Import/export key format (Private/Public) Use
Symmetric Block cipher AES ECB, CBC, CBC (no padding), CFB, CTR, GCM, CCM, OFB, KW, KWP, FF1, CMAC 128, 192, or 256 bits raw Data Encryption/Decryption, Key, Wrapping/Unwrapping, MAC, Key Generation, Key Derivation, and Tokenization
DES ECB, CBC, CBC (no padding)

56 bits
3DES 112, 168 bits
Cryptographic hash functions SHA-1 SHA-1 HMAC key length: between 112 and 8192 bits (HMAC) raw Message Digest, MAC, Key Generation
SHA-2 SHA-224, SHA-256, SHA-384, SHA-512
RIPEMD RIPEMD-160
SHA-3 SHA3-224, SHA3-256, SHA3-384, SHA3-512     Message Digest and Key Generation
Asymmetric Finite field DSA standard¹, deterministic signatures (RFC 6979)² Between 1024 and 8192 bits³ PKCS#8 DER/SubjectPublicKeyInfo DER (RFC5208/RFC5280) Digital Signature sign/verify and Key Generation
Elliptic Curve ECDSA NIST P-192, NIST P-224, NIST P-256, NIST P-384, NIST P-521, SecP192K1, SecP224K1, SecP256K1 PKCS#8 DER/SubjectPublicKeyInfo DER (RFC5480/RFC5915)
EdDSA standard, prehash⁴  Ed25519 PKCS#8 DER/SubjectPublicKeyInfo DER (RFC8410)
ECDH   NIST P-192, NIST P-224, NIST P-256, NIST P-384, NIST P-521, SecP192K1, SecP224K1, SecP256K1, X.25519, X.448 PKCS#8 DER/SubjectPublicKeyInfo DER (RFC5480/RFC5915/RFC8410) Key Exchange and Key Generation
RSA RSA

PKCS#1 v1.5, OAEP, PSS

Between 1024 and 8192 bits PKCS#8 DER/SubjectPublicKeyInfo DER (RFC5208/RFC5280) Digital Signature sign/verify and Key Generation
Hash-based signature LMS

 

SHA-256 M32 H5/H10/H15/H20/H25 Custom/SubjectPublicKeyInfo DER (RFC8708)

 

¹ - With hash algorithms: SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, Blake2b* (256, 384, 512), Blake2s-256*

² - With hash algorithms: SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512

³ - Imported keys can use any parameters. The key generation will use the following specific parameters:

- With hash algorithms: SHA-512

- With hash algorithms (sign/verify): SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SSL3*

- Supported mask generation functions: MGF1 with SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512. The MGF hash function must be the same as the data hash function..

* - Hash algorithms not listed as a supported “Cryptographic hash function” on this page can only be used in signature generation/verification with prehashed data.

 

Comments

Please sign in to leave a comment.

Was this article helpful?
0 out of 0 found this helpful