This page describes the algorithms supported by Fortanix Data Security Manager (DSM).
For more information on Fortanix DSM cryptographic policies, refer to User's Guide: Cryptographic Policy.
Crypto | Primitive Type | Algorithm | Mode/Method | Key Size/Curve | Import/export key format (Private/Public) | Use |
---|---|---|---|---|---|---|
Symmetric | Block cipher | AES | ECB, CBC, CBC (no padding), CFB, CTR, GCM, GCM (no padding), CCM, OFB, KW, KWP, FF1: Complex alphabet options not supported, CMAC | 128, 192, or 256 bits | raw | Data Encryption/Decryption, Key Wrapping/Unwrapping, MAC, Key Generation, Key Derivation, and Tokenization |
DES | ECB, CBC, CBC (no padding) | 56 bits | Data Encryption/Decryption, Key Wrapping/Unwrapping, MAC, Key Generation, and Key Derivation | |||
3DES | 112, 168 bits | |||||
ARIA | ECB, CBC, CBCNOPAD, CFB, CTR, GCM, CCM | 128, 192, 256 bits | Data Encryption/Decryption, Key Wrapping/Unwrapping, and Key Derivation | |||
SEED | ECB, CTR, CBC, CBC (no padding) | 128 bits | ||||
Cryptographic hash functions | SHA-1 | SHA-1 | HMAC key length: between 112 and 8192 bits | (HMAC) raw | Message Digest, MAC, Key Generation | |
SHA-2 | SHA-224, SHA-256, SHA-384, SHA-512 | |||||
RIPEMD | RIPEMD-160 | |||||
SHA-3 | SHA3-224, SHA3-256, SHA3-384, SHA3-512 | Message Digest and Key Generation | ||||
Asymmetric | Finite field | KCDSA | standarda | Between 512 and 2048 bitsb | PKCS#8 DER/SubjectPublicKeyInfo DER | Digital Signature sign/verify and Key Generation |
DSA | standard1, deterministic signatures (RFC 6979)2 | Between 1024 and 8192 bits3 | PKCS#8 DER/ SubjectPublicKeyInfo DER (RFC5208/RFC5280) | |||
Elliptic Curve | ECDSA | NIST P-192, NIST P-224, NIST P-256, NIST P-384, NIST P-521, SecP192K1, SecP224K1, SecP256K1 | PKCS#8 DER/ SubjectPublicKeyInfo DER (RFC5480/RFC5915) | |||
EC-KCDSA | standarda | NIST P-192, NIST P-224, NIST P-256, NIST P-384, NIST P-521, SecP192K1, SecP224K1, SecP256K1 | PKCS#8 DER/ SubjectPublicKeyInfo DER | |||
EdDSA | standard4, prehash4 | Ed25519 | PKCS#8 DER/ SubjectPublicKeyInfo DER (RFC8410) | |||
ECDH | NIST P-192, NIST P-224, NIST P-256, NIST P-384, NIST P-521, SecP192K1, SecP224K1, SecP256K1, X.25519, X.448 | PKCS#8 DER/ SubjectPublicKeyInfo DER (RFC5480/RFC5915/RFC8410) | Key Exchange and Key Generation | |||
BIP32 | SecP256K1 | BIP32 (mainnet, testnet) | Signature/verification of cryptocurrency transactions | |||
RSA | RSA | PKCS#1 v1.55, OAEP6, OAEPPADDING, PSS6, ECB | Between 1024 and 8192 bits | PKCS#8 DER/ SubjectPublicKeyInfo DER (RFC5208/RFC5280) | Digital Signature sign/verify and Key Generation | |
Hash-based signature | LMS | L=2 | SHA-256 M32 H5/H10/H15/H20/H25 | Custom/ SubjectPublicKeyInfo DER (RFC8708) |
1 With hash algorithms: SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, Blake2b* (256, 384, 512), Blake2s-256*
2 With hash algorithms: SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512
3 Imported keys can use any parameters. The key generation will use the following specific parameters:
- 2048/224 and 2048/256: [RFC 5114]
- 3072/256: [NIST example parameters]
4 With hash algorithms: SHA-512
5 With hash algorithms (sign/verify): SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SSL3*
6 Supported mask generation functions: MGF1 with SHA-1, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512. The MGF hash function must be the same as the data hash function.
a As specified in [KISA].
b Imported keys can use any parameters. The key generation will use the following specific parameters:
- 2048/224/SHA224 and 2048/256/SHA256: [KISA]
* Hash algorithms not listed as a supported “Cryptographic hash function” on this page can only be used in signature generation/verification with prehashed data.
Comments
Please sign in to leave a comment.