fips-1.1.2 does not have validation for Diffie-Hellmann. Which version are you looking at?
-Kyle H On Tue, Jul 8, 2008 at 2:57 AM, Nilay Tripathi <[EMAIL PROTECTED]> wrote: > Hi All, > > I have a query regarding FIPS compliance for Diffie-Hellman api's in the > openssl stack. > > FIPS uses the recommendation for pairwise-key establishment schemes from > NIST. Document is SP800-56A. Rev.1 > > As per FIPS compliance requirement for DH, there are a couple of KAT > (Known Answer Test) specified in the aforementioned document (which are > specified in Sec. 5.6.2.4 and Sec. 5.7.1.1). > [Sec. 5.6.2.4 - FFC Full Public Key Validation] > [Sec. 5.7.1.1 - FFC DH Primitive] > > Generating 'p' randomly as a safe prime and using 'g' order as 5, the > keys generated are not consistently passing Sec 5.6.2.4 KAT test. The > public key does not fall into 'q' cyclic group where 'q' is defined as > [q=(p-1)/2] and is a prime number. > If I loop for few times I do get such generated values which passes this > KAT. But I was expecting that FIPS compliant DH api's in openssl stack > will generate and return only such values which satisfy this KAT. > > The only difference I found in normal and FIPS compliant DH code is that > in latter, FIPS_self_tests api is also called; which really doesn't help > in the issue noted above. > > I would really appreciate if anyone can throw some light on the state > and any development on this issue. > > Regards, > Nilay Tripathi > One Convergence ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [email protected] Automated List Manager [EMAIL PROTECTED]
