FIPS 140-2 Algorithms in the Cryptographic Framework

To ensure that a consumer of the Cryptographic Framework is using a FIPS 140-2 validated algorithm, choose an algorithm from the following summary of validated algorithms, modes, and key lengths.

For the definitive lists of algorithms, review the security policy references in FIPS 140-2 Level 1 Guidance Documents for Oracle Solaris Systems.

Note:

The key length of an algorithm can be significant. Shorter key lengths might not be validated for FIPS 140-2.

The following algorithms with specified key lengths are allowed in a FIPS 140-2 configuration:

  • RSA key wrapping – Key lengths longer than 112 bits are allowed.

  • Diffie-Hellman key agreement – Key lengths longer than 112 bits are allowed, userland Cryptographic Framework only.

  • Elliptic Curve Diffie-Hellman (ECDH) key agreement – Key lengths longer than 112 bits are allowed, userland Cryptographic Framework only.