-
**environment**
Demo
**testSessionId**
88644
**vsId**
N/A
**Algorithm registration**
N/A
**Endpoint in which the error is experienced**
`GET https://demo.acvts.nist.gov/acvp/v1/testSe…
-
SHAKE variants of the ECDSA signature algorithms appear to be using truncated digests.
We've found we can pass on demo by truncating SHAKE128 to 16 bytes and SHAKE256 to 32 bytes.
FIPS PUB 186-5…
-
As a suggestion, it might be valuable/beneficial to provide an API or add the data within the existing API to get the algorithm capabilities that were used to create a test session.
If it were me, …
-
### Description
Several outstanding test failures exist for RSA and ECDSA in the cryptotest framework.
RSA:
- [ ] `wycheproof RSA-2048 pss verify sha-384 #64`
- [ ] `wycheproof RSA-3072 pss ve…
-
Section 5 states "The randomized version can be invoked by leaving K as EMPTY." Private key formats are determined by application requirements and should not be used as "APIs" to affect functionality …
-
Is there any road-map/plan for liboqs ML-DSA algorithm to be certified using NIST Cryptographic Algorithm Validation Program (CAVP)?
-
https://github.com/usnistgov/ACVP/blob/master/src/symmetric/sections/05-capabilities.adoc#block-cipher-algorithm-capabilities-json-values states:
"The Keying Option used in TDES. Keying option 1 (1…
-
**vsId**
[PARALLELHASH-128-1.0/prompt.json](https://github.com/usnistgov/ACVP-Server/blob/master/gen-val/json-files/PARALLELHASH-128-1.0/prompt.json) and [PARALLELHASH-256-1.0/prompt.json](https://gi…
-
Hi,
do you plan to add support for the new options presented by FIPS186-5?
this would affect the registration properties for all RSA/ECDSA algorithms and based on the ACVP Github the protocol alre…
-
**environment**
Demo
**testSessionId**
86533
**vsId**
N/A
**Algorithm registration**
N/A
**Endpoint in which the error is experienced**
https://demo.acvts.nist.gov/acvp/v1/testSession…