Reference Guide

28 Crypto-C ME Cryptographic Toolkit
RSA BSAFE Crypto-C Micro Edition 4.1.4 Security Policy Level 1
with Level 2 Roles, Services and Authentication
1.5.3 Non-FIPS 140-2-approved Algorithms
The following table lists the algorithms that are not FIPS 140-2-approved.
For more information about using Crypto-C ME in a FIPS 140-2-compliant manner,
see Secure Operation of Crypto-C ME.
Table 6 Crypto-C ME non-FIPS 140-2-approved Algorithms
Algorithm Type Algorithm
Asymmetric Key ECAES, ECIES
Key Derivation Function SCrypt
PBKDF1
Shamir's Secret Share
Message Digest MD2, MD4
Message Authentication Code HMAC-MD5
Random Number Non-approved RNG (FIPS 186-2)
Non-approved RNG (OTP).
Symmetric Cipher
AES in CFB 64-bit, CTS, and BPS
1
ARIA
DES, Triple-DES (two-key), DESX, DES40,
DES in BPS mode
Camellia
GOST
RC2, RC4, RC5
SEED
1
For format-preserving encryption (FPE).