nvlap 600138 0

 

MyKripto

nvlap 600138 0

AKSA MySEAL 2.1 Approved

Cryptographic algorithms that have met high standards of security and compliance. These algorithms have been approved by MySEAL Focus Group, signifying their reliability for secure digital applications in Malaysia’s government, industry, and critical infrastructures.

Cryptographic Primitives Algorithms & Variants
1. Block Cipher

General-Purpose Block Ciphers:

   Algorithm  Key length
1  AES  128, 192, 256
2  Camellia  128, 192, 256
3  CLEFIA  128, 192, 256
4  SEED  128

 

Lightweight Block Cipher:

   Algorithm  Key length
1  HIGHT  128
2  PRESENT 80, 128

 

Tweakable Block Cipher:

   Algorithm  Key length
1  Deoxys-TBC  256, 384
2  Skinny 64/192, 128/256, 128/384
3 XTS-AES 128, 256
2. Stream Cipher
   Algorithm  Key length
1  ChaCha20 256
2  HC 128
3  KCipher-2 128
4  MUGI  128
5  Rabbit  128
3. Cryptographic Hash Function

General-Purpose Hash Function:

   Algorithm  Digest length
1  SHA2 384, 512, 512/224, 512/256
2  SHA3 224, 256, 384, 512
3 SM3 256

 

Lightweight Hash Function:

   Algorithm  Digest length
1  PHOTON 80/20/16 (P100),
128/16/16 (P144),
160/36/36 (P196),
224/32/32 (P256),
256/32/32 (P288)
2  SPONGENT 88, 128, 160, 224, 256
4. Asymmetric Encryption

Encryption Scheme:

   Algorithm
1  ACE-KEM
2 ECIES-KEM
3  FACE-KEM
4  PSEC-KEM
5 RSA-KEM
6 RSA-OAEP

 

Key Agreement Scheme:

   Algorithm
1 DH Ephemeral-Ephemeral (C(2e,0s))
2 DH Ephemeral-Static (C(1e,1s))
3 DH Ephemeral-Static (C(1e,2s))
4 DH Ephemeral-Static (C(2e,2s))
5 ECDH Ephemeral-Ephemeral (C(2e,0s))
6 ECDH Ephemeral-Static (C(1e,2s))
7 ECDH Ephemeral-Static (C(2e,2s))
8 ECDH Ephemeral-Static(C(1e,1s))

 

Post-Quantum Key Encapsulation Mechanisms:

   Algorithm  Parameter Sets
1  mceliece 460896, 460896f, 460896pc
2  mceliece 6688128, 6688128f, 6688128pc
3 mceliece 6960119, 6960119f, 6960119pc
4 mceliece 8192128, 8192128f, 8192128pc
5 FrodoKEM 976, 1344
6 eFrodoKEM 976, 1344
7 HQC 128, 192, 256
8 ML-KEM 512, 768, 1024
9 NTRUHPS 2048677, 4096821, 40961229,
10 NTRUHRSS 701, 1373
5. Digital Signature Scheme

Classic Hard Problem-Based Signature Schemes:

1 BLS Signature Scheme
2 Elliptic Curve Digital Signature Algorithm (ECDSA)
3 Elliptic Curve Schnorr DSA (ECSDSA)
4 RSA-PSS (RSA-Probabilistic Signature Scheme)
5 ShangMi2 (SM2)

 

Stateful Hash-Based Signature Schemes:

1 LMS
2 XMSS
3 XMSSMT

 

Post-Quantum Digital Signature Schemes:

   Algorithm Variant
1  ML-DSA 44, 65, 87
2  Falcon 512, 1024
3 SLH-DSA-SHA2 128s, 192s, 256s, 128f, 192f, 256f
4 SLH-DSA-SHAKE 128s, 192s, 256s, 128f, 192f, 256f
6. Cryptographic Prime Number Generators

Primality Testing Algorithms:

   Algorithm
1 Elliptic Curve Primality Test
2 Miller-Rabin Primality Test
3 Probabilistic Lucas Primality Test
4 Pocklington Primality Test
7. Deterministic Random Bit Generator (DRBG)
   Algorithm Key length / Digest length
 1 AES-CTR-DRBG 128, 192, 256
 2 HMAC-SHA2-DRBG 224, 256, 384, 512, 512/224, 512/256
 3 SHA2-DRBG 224, 256, 384, 512, 512/224, 512/256
8. Message Authentication Code (MAC)
   Algorithm
1 CMAC
2 GMAC
3 HMAC
4 KMAC
5 UMAC
6 XCBC-MAC
7 Chaskey-12
8 LightMAC
9 MDx-MAC
10 MDx-MAC-Short
11 Poly1305
12 Tsudik's Keymode
9. Key Derivation Function (KDF)

General KDF:

   Algorithm Key length / Digest length
1 One Step HASH-KDF-SHA 224, 256, 384, 512, 512/224, 512/256
2 One Step HASH-KDF-SHA3 224, 256, 384, 512
3 One Step HMAC-KDF-SHA 224, 256, 384, 512, 512/224, 512/256
4 One Step HMAC-KDF-SHA3 224, 256, 384, 512
5 One Step KMAC-KDF 128, 256
6 Two Step HMAC-KDF-SHA 224, 256, 384, 512, 512/224, 512/256
7 Two Step HMAC-KDF-SHA3 224, 256, 384, 512
8 Two Step AES-CMAC-KDF 128, 192, 256
9 KMAC-PRF-KDF 128, 256

 

Password-based KDF:

   Algorithm Key length / Digest length
1 Argon 2i, 2d, 2id
2 bcrypt -
3 PBKDF2-HMAC-SHA 224, 256, 384, 512, 512/224, 512/256
4 PBKDF2-HMAC-SHA3 224, 256, 384, 512
5 scrypt -
10. Authenticated Encryption (AE)
   Algorithm Variant
1 ASCON-AEAD 128, 128a
2 ChaCha20-Poly1305 -
3 XChaCha20-Poly1305 -
4 AES-CCM 128, 192, 256
5 GCM-AES-XPN 128, 256
6 AES-GCM 128, 192, 256
7 AES-GCM-SIV 128, 256
8 Sophie Germain
Counter Mode (SGCM)
-
9 AES-SIV-CMAC 256, 384, 512
11. Homomorphic Encryption
1 Exponential ElGamal Encryption
2 Paillier Encryption
3 Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption
12. Threshold Cryptography

Threshold Signing:

1 FROST (Ed25519, SHA-512)
2 FROST (Ed448, SHAKE256)
3 FROST (Ristretto255, SHA-512)
4 FROST (Secp256k1, SHA-256)

 

MyKripto

CDD is a department within CyberSecurity Malaysia under the Proactive Technology & Services Division.

CRYPTOGRAPHY DEVELOPMENT DEPARTMENT

Email: mykripto [at] cybersecurity.my 

Phone: +60 3 8800 7999

Fax: +60 3 8008 7000

CSM MARKETING

Email: marketing [at] cybersecurity.my 

Phone: +60 3 8800 7999

Fax: +60 3 8008 7000

Search