Compliance & Validations

Our Validations Help Your Organization Meet Compliance

Townsend Security AES Encryption 

The National Institute of Standards and Technology (NIST) defines the standard for AES encryption, and provides a rigorous testing process for software vendors. The  process is carried out by independent testing labs who report the results to NIST for validation. The AES validation process tests every aspect of encryption and involves millions of encryption and decryption operations. Only the most dedicated security vendors are able to pass the tests and achieve NIST validation. Townsend Security has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform.

Below lists the certificate number, implementation, and operational environment for all NIST validated products offered by Townsend Security. All products listed are certified in the following modes:

ECB (e/d; 128, 192, 256)

CBC (e/d; 128, 192, 256)

CFB1 (e/d; 128, 192, 256)

CFB8 (e/d; 128, 192, 256)

CFB12 (e/d; 128, 192, 256)

OFB (e/d; 128, 192, 256)

CTR (e/d; 128, 192, 256; ext)

 

IBM i

Alliance AES Encryption for IBM iSeries - Validation #568

Implementation: IBM Power with IBM i5/OS on 64-bit Power

Alliance AES Library (IBM i V5R4) - Validation #1338

Implementation: IBM Power6 w/ IBM i V5R4

Alliance AES Library (IBM i V6R1) - Validation #1339

Implementation: IBM Power6 w/ IBM i V6R1

Alliance AES Library (IBM i V7R1) - Validation #1340

Implementation: IBM Power6 w/ IBM i V7R1

 

IBM z

Alliance AES Encryption for zSeries z/OS - Validation #576

Implementation: IBM 64-bit CP wtih IVM z/OS version 1.6 Windows

Alliance AES Encryption for Windows 2000 Server on Intel - Validation #575

Implementation: Intel with Windows 2000 Server on 32-bit Intel Linux

Alliance AES Encryption for SUSE Linux Enterprise 9 on Power - Validation #573

Implementation: IBM Power with SUSE Linux Enterprise Server 9 on 64-bit Power

Alliance AES Encryption for SLES 9 on Intel - Validation #572

Implementation: Intel with SUSE Linux Enterprise Server 9 on 32-bit Intel

Alliance AES Encryption for Red Hat Enterprise 4 Linux on Power - Validation #571

Implementation: IBM PPC 64-bit with Red Hat Enterprise 4 Linux on 64-bit Power

Alliance AES Encryption for Red Hat Enterprise 4 Linux on Intel - Validation #570

Implementation: Intel 32-bit with Red Hat Enterprise 4 Linux on 32-bit Intel Unix

Alliance AES Encryption for AIX 5.3 on Power - Validation #569

Implementation: IBM Power 64-bit with AIX version 5.3

Alliance AES Encryption for Solaris 10 on Sparc - Validation #574

Implementation: Sun Sparc with Solaris 10 on Sparc

 

Encryption Key Management

Alliance Key Manager - Validation #1449

The Alliance Key Manager implements a client/server interface for key administration. The user application has the client role, and the key manager has the server role. The user opens a secure connection to the key server, sends an administrative request (create a key, change a key, etc.), receives a response from the server, and the session is disconnected.

Validated to Meet PCI Compliance

For VMware users who need to meet compliance, Alliance Key Manager has been validated for PCI DSS in VMware by Coalfire, a PCI-qualified QSA assessor and independent IT and audit firm.     

Additional Certifications

Alliance AES Library v1.5.5 - Validation #1245

Implementation: Intel 64-Bit w/ Linux

Modes/States/Key Sizes: ECB: (e/d; 128, 192, 256)

Alliance X9.31 Library v1.1.0 - Validation #692

Implementation: Intel 64-Bit w/ Linux

Modes/States/Key Sizes: ANSI X9.31 (AES-256Key)

Alliance Hash Library v2.0.3 - Validation #1144

Implementation: Intel 64-Bit w/ Linux

Modes/States/Key Sizes: SHA-256 (BYTE-only)

Alliance Hash Library v2.0.3 - Validation #728

Implementation: Intel 64-Bit w/ Linux

Modes/States/Key Sizes: HMAC-SHA256 (Key Size Ranges Tested: KS=BS) SHS Val#1144