Townsend Security AES Encryption
The National Institute of Standards and Technology (NIST) defines the standard for AES encryption, and provides a rigorous testing process for software vendors. The process is carried out by independent testing labs who report the results to NIST for validation. The AES validation process tests every aspect of encryption and involves millions of encryption and decryption operations. Only the most dedicated security vendors are able to pass the tests and achieve NIST validation. Townsend Security has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform.
Below lists the certificate number, implementation, and operational environment for all NIST validated products offered by Townsend Security. All products listed are certified in the following modes:
ECB (e/d; 128, 192, 256)
CBC (e/d; 128, 192, 256)
CFB1 (e/d; 128, 192, 256)
CFB8 (e/d; 128, 192, 256)
CFB12 (e/d; 128, 192, 256)
OFB (e/d; 128, 192, 256)
CTR (e/d; 128, 192, 256; ext)
IBM i
Alliance AES Encryption for IBM iSeries - Validation #568
Implementation: IBM Power with IBM i5/OS on 64-bit Power
Alliance AES Library (IBM i V5R4) - Validation #1338
Implementation: IBM Power6 w/ IBM i V5R4
Alliance AES Library (IBM i V6R1) - Validation #1339
Implementation: IBM Power6 w/ IBM i V6R1
Alliance AES Library (IBM i V7R1) - Validation #1340
Implementation: IBM Power6 w/ IBM i V7R1
IBM z
Alliance AES Encryption for zSeries z/OS - Validation #576
Implementation: IBM 64-bit CP wtih IVM z/OS version 1.6 Windows
Alliance AES Encryption for Windows 2000 Server on Intel - Validation #575
Implementation: Intel with Windows 2000 Server on 32-bit Intel Linux
Alliance AES Encryption for SUSE Linux Enterprise 9 on Power - Validation #573
Implementation: IBM Power with SUSE Linux Enterprise Server 9 on 64-bit Power
Alliance AES Encryption for SLES 9 on Intel - Validation #572
Implementation: Intel with SUSE Linux Enterprise Server 9 on 32-bit Intel
Alliance AES Encryption for Red Hat Enterprise 4 Linux on Power - Validation #571
Implementation: IBM PPC 64-bit with Red Hat Enterprise 4 Linux on 64-bit Power
Alliance AES Encryption for Red Hat Enterprise 4 Linux on Intel - Validation #570
Implementation: Intel 32-bit with Red Hat Enterprise 4 Linux on 32-bit Intel Unix
Alliance AES Encryption for AIX 5.3 on Power - Validation #569
Implementation: IBM Power 64-bit with AIX version 5.3
Alliance AES Encryption for Solaris 10 on Sparc - Validation #574
Implementation: Sun Sparc with Solaris 10 on Sparc
Encryption Key Management
Alliance Key Manager - Validation #1449
The Alliance Key Manager implements a client/server interface for key administration. The user application has the client role, and the key manager has the server role. The user opens a secure connection to the key server, sends an administrative request (create a key, change a key, etc.), receives a response from the server, and the session is disconnected.
Validated to Meet PCI Compliance
For VMware users who need to meet compliance, Alliance Key Manager has been validated for PCI DSS in VMware by Coalfire, a PCI-qualified QSA assessor and independent IT and audit firm.
Additional Certifications
Alliance AES Library v1.5.5 - Validation #1245
Implementation: Intel 64-Bit w/ Linux
Modes/States/Key Sizes: ECB: (e/d; 128, 192, 256)
Alliance X9.31 Library v1.1.0 - Validation #692
Implementation: Intel 64-Bit w/ Linux
Modes/States/Key Sizes: ANSI X9.31 (AES-256Key)
Alliance Hash Library v2.0.3 - Validation #1144
Implementation: Intel 64-Bit w/ Linux
Modes/States/Key Sizes: SHA-256 (BYTE-only)
Alliance Hash Library v2.0.3 - Validation #728
Implementation: Intel 64-Bit w/ Linux
Modes/States/Key Sizes: HMAC-SHA256 (Key Size Ranges Tested: KS=BS) SHS Val#1144