Skip to main content

List of Algorithms and Functions - Firmware v3.2

Primus HSM & CloudHSM support a wide variety of cryptographic algorithms and functions essential for secure data management. This list includes fundamental standards like AES and RSA, as well as advanced techniques such as ChaCha20–Poly1305 and BLS12-381.

Some algorithms are enabled by default for basic security needs, while others are optional and can be activated based on specific application requirements and API configurations.

info

Please verify that the algorithm and its functions are supported by your firmware. For more details check Firmware Version Support in each specific algorithm description.

Standard

All the following elements are enabled by default for all the HSM & CloudHSM services.

List valid as of May 2025.

Asymmetric

DSA

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 186-4]
Functions: PQG Generation, Key Pair Generation, Signature Generation, Signature Verification
Key sizes: 2048, 3072 bits
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5693

ECC operations with non-NIST curves

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS IG A.2]
Elliptic Curve operations with non-NIST curves, as follows:
Curve: Security Strength:
Brainpool 224r1, 256r1, 320r1, 384r1, 512r1 112, 128, 160, 192, 256
Frp 256v1 128
X9.62p239v1, v2, v3 119
secp224k1, 256k1 112, 128
Firmware Version Support v3.1 and later
AllowedNon-approved but Allowed

ECDSA

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 186-4]
Functions: Key Pair Generation, Signature Generation, Signature Verification, Public Key Validation
Curves/Key sizes: P-224, P-256, P-384, P-521 (Strength: 112, 128, 192, 260)
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5710

KAS (FFC, ECC)

DescriptionCC Evaluated ConfigurationFIPS Mode
[P 800-56A Section 5.7.1.2 ECC CDH Primitive, SP 800-56Ar1]
Parameter sets/Key sizes: FC, EB, EC, ED, EE
Modes: dhStatic responder, Static Unified responder
Scheme: SHA2
Note: Key establishment methodology provides between 112 and 256 bits of encryption strength
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5699

RSA

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 186-4, ANSI X9.31-1998, and PKCS #1 v2.1 (PSS and PKCS1.5)]
Functions: Key Pair Generation, Signature Generation, Component Test, Signature Verification, Key Wrap, Key Unwrap, Encrypt, Decrypt
Key sizes: 512, 1024 (non-FIPS mode only)
Key sizes: 2048, 3072, 4096, 7680, 8192 bits
Some RSA-4096 functions are listed here but not displayed on RSA Cert. #2946. These are vendor-affirmed, as CAVP does not provide testing for these functions.
Firmware Version Support v3.1 and later;
AllowedApproved, exluding vendor-affirmed RSA-4096 functions;
Validation Number: A5709
KTS (RSA) [SP 800-56B]
Functions: Key Wrap, Key Unwrap, KAS1-basic, KAS 2-basic, RSA-OAEP
Key sizes: 2048, 3072, 4096 bits
Key {Agreement | Transport} – Provides 112 to 150 bits of encryption strength.
Wrap Methods: RSASVE, RSA-OAEP
Firmware Version Support v3.1 and later
AllowedApproved,
IG D.4; Annex D, A5700, A5697

EdDH

DescriptionCC Evaluated ConfigurationFIPS Mode
[RFC8031]
Function: Edwards-curve Diffie-Hellman using X25519 (Curve25519)
Firmware Version Support v3.1 and later
Not AllowedDisabled

EdDSA

DescriptionCC Evaluated ConfigurationFIPS Mode
[RFC8032]
Function: EC digital signature algorithm using Edwards curve (ED25519)
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5694

Symmetric

AES

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 197, SP 800-38A]
Functions: Encryption, Decryption; Modes: ECB, CBC, CTR
Key sizes: 128, 192, 256 bits
Firmware Version Support v3.1 and later
Version 3.2.2 and later; ECB/CBC encryption based key derivation functions
AllowedApproved,
with exception of ECB/CBC key wrap/unwrap.
Validation Number: A5684
AES-CMAC [SP 800-38B]
Functions: MAC Generation, MAC Verification
Key sizes: 128, 192, 256 bits
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5687
AES-GCM/GMAC [FIPS 197, SP 800-38D]
Functions: Authenticated Encryption, Authenticated Decryption, GMAC Generation, GMAC Verification
Key sizes: 128, 192, 256 bits
IV-Construction: RBG-based Construction with 96-bit random field and 0-bit free field. A unique IV is constructed for each usage. For line encryption an IV is calculated for each direction (send/receive) and increased after each packet.
Note: The IV is generated internally at its entirety randomly as per technique 2 of IG A.5.
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5685, A5686
AES-KW [SP 800-38F]
Functions: Key Wrap, Key Unwrap Variants:
38D: AES-GCM (256 bits)
38F: AES-KW, AES-KWP
Key sizes: 128, 192, 256 bits. Key Transport – Provides between 128 and 256 bits of encryption strength.
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5697

Camellia

DescriptionCC Evaluated ConfigurationFIPS Mode
Technical specifications
Function: Encryption, Decryption
Key sizes: 128, 192, 256 bits
Firmware Version Support v3.1 and later
Not AllowedDisabled

ChaCha20-Poly1305

DescriptionCC Evaluated ConfigurationFIPS Mode
[RFC 7905]
Function: Authenticated Encryption, Authenticated Decryption
Firmware Version Support v3.1 and later
Not AllowedDisabled
ChaCha Technical specifications
Function: Stream cipher
Firmware Version Support v3.1 and later
Not AllowedDisabled
Poly1305 Technical specifications
Function: Message Authentication Code
Firmware Version Support v3.1 and later
Not AllowedDisabled

Triple-DES (TDES)

DescriptionCC Evaluated ConfigurationFIPS Mode
[SP 800-67]
Functions: Encryption (non-FIPS Mode), Decryption, Key Wrap (non-FIPS Mode), Key Unwrap ;
Modes: CBC, ECB, TECB, TCBC
Key sizes: 168 bits (effective 112 bits)
Firmware Version Support v3.1 and later;
v3.2.2: ECB/CBC encryption based key derivation functions
AllowedDecryption Approved. Key unwrap Allowed. Key Wrap and Encryption Disabled.
Validation Number: A5688

Hashes

CBC-MAC

DescriptionCC Evaluated ConfigurationFIPS Mode
FIPS PUB 113
Function: Message authentication (superseded by AES-CMAC)
Firmware Version Support v3.1 and later
Not AllowedDisabled

HMAC

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 198-1]
Functions: Generation, Verification
SHA sizes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Firmware Version Support v3.1 and later
Not AllowedDisabled

Keccak 1600

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 202]
Function: Hash
Firmware Version Support v3.1 and later
Not AllowedDisabled

Kerl

DescriptionCC Evaluated ConfigurationFIPS Mode
Function: Hash
Iota.org
Firmware Version Support v3.1 and later
Not AllowedDisabled

MD5

DescriptionCC Evaluated ConfigurationFIPS Mode
[RFC1321]
Function: 128-bit hash
Firmware Version Support v3.1 and later
Not AllowedDisabled

RIPEMD160

DescriptionCC Evaluated ConfigurationFIPS Mode
ISO/IEC 10118-3:2018
Function: Hash
Firmware Version Support v3.1 and later
Not AllowedDisabled

SHA

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 180-4, FIPS 202]
Functions: Digital Signature Generation, Digital Signature Verification, component of HMAC and HMAC_DRBG, general hashing
SHA sizes: SHA-1 verification only (non-verification non-FIPS mode only),
SHA-224, SHA-256, SHA-384, SHA-512,
SHA3-224, SHA3-256, SHA3-384, SHA3-512
Firmware Version Support v3.1 and later
AllowedApproved, with exception of SHA-1 for operations other than verification.
Validation Number: A5689, A5690

Key Derivation

DRBG

DescriptionCC Evaluated ConfigurationFIPS Mode
[SP 800-90A]
HMAC DRBG with internal function SHA-512
CTR DRBG with internal function AES-256
Firmware Version Support v3.2.3 and later;
v3.1 and later; No CTR DRBG with internal function AES-256
Not AllowedApproved,
Validation Number: A5692

HKDF

DescriptionCC Evaluated ConfigurationFIPS Mode
[RFC5869]
Function: Key Derivation
Modes: extract, expand, extract&expand
Firmware Version Support v3.1 and later
Not AllowedDisabled

KDFs, Password-based

DescriptionCC Evaluated ConfigurationFIPS Mode
[SP 800-132]
PRFs: HMAC (SHA-1, SHA2 224/256/384/512, SHA3 224/256/384/512)
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5695

KBKDF

DescriptionCC Evaluated ConfigurationFIPS Mode
[SP 800-108]
Modes: Counter, Feedback, Double Pipeline Iteration Mode
PRFs: CMAC(AES-128/192/256), HMAC (SHA-1, 224, 256, 384, 512)
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A5696

Optional

The following elements might require a specific license to be used on HSM devices & CloudHSM services.

Blockchain

BLS12-381

DescriptionCC Evaluated ConfigurationFIPS Mode
RFC draft-irtf-cfrg-bls-signature-04 - draft-irtf-cfrg-bls-signature-02 (ietf.org)
Function: Sign & Verify according with ETH 2.0
Firmware Version Support v3.1 and later
Not AllowedDisabled

Cardano ED key derivation

DescriptionCC Evaluated ConfigurationFIPS Mode
Function: Authenticated encryption / decryption
Documentation
Firmware Version Support v3.1 and later
Not AllowedDisabled

ISS

DescriptionCC Evaluated ConfigurationFIPS Mode
Function: IOTA Signature Scheme
Iota.org
Firmware Version Support v3.1 and later
Not AllowedDisabled
Looking for compatible cryptocurrencies?

Browse the list of 100 cryptocurrencies, including their symbols, signing algorithms, and curves.

Post-Quantum Algorithms

ML-KEM (CRYSTALS-Kyber)

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 203] (Module-Lattice-Based Key-Encapsulation Mechanism Standard (nist.gov))
Function: Key pair generation, key encapsulation, key decapsulation
Modes: ML-KEM-512, ML-KEM-768, ML-KEM-1024
(formerly CRYSTALS-Kyber)
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A6129
FIPS Round-3 Submission
Function: Key Pair Generation, Key encapsulation
Modes: KYBER512, KYBER768, KYBER1024
Firmware Version Support v3.1 and later;
Not AllowedDisabled

ML-DSA (CRYSTALS-Dilithium)

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 204] (Module-Lattice-Based Digital Signature Standard (nist.gov))
Functions: Key pair generation, deterministic signature generation, randomized signature generation, signature verification
Modes: ML-DSA-44, ML-DSA-65, ML-DSA-87
(formerly CRYSTALS-Dilithium)
Firmware Version Support v3.1 and later
AllowedApproved,
Validation Number: A6130
FIPS Round-3 Submission
Function: Key Pair Generation, Signature Generation, Signature Verification
Modes: DILITHIUM_L2, DILITHIUM_L3, DILITHIUM_L5
Firmware Version Support v3.1 and later
Not AllowedDisabled

SLH-DSA (SPHINCS+)

DescriptionCC Evaluated ConfigurationFIPS Mode
[FIPS 205] ((Stateless Hash-Based Digital Signature Standard (nist.gov))
Functions: Key pair generation, deterministic signature generation, randomized signature generation, signature verification
Modes: SLH-DSA-SHA2-128s, SLH-DSA-SHAKE-128s, SLH-DSA-SHA2-128f, SLH-DSA-SHAKE-128f, SLH-DSA-SHA2-192s, SLH-DSA-SHAKE-192s, SLH-DSA-SHA2-192f, SLH-DSA-SHAKE-192f, SLH-DSA-SHA2-256s, SLH-DSA-SHAKE-256s, SLH-DSA-SHA2-256f, SLH-DSA-SHAKE-256f
(formerly SPHINCS+)
Firmware Version Support v3.1 and later
AllowedApproved, Validation Number: A6131
FIPS Round-3 Submission
Function: Key Pair Generation, Signature Generation, Signature Verification
Modes: SPHINCS_PLUS_SHAKE_L1, SPHINCS_PLUS_SHAKE_L3, SPHINCS_PLUS_SHAKE_L5
Firmware Version Support v3.1 and later
Not AllowedDisabled

HSS-LMS

DescriptionCC Evaluated ConfigurationFIPS Mode
[NIST SP 800-208] (Recommendation for Stateful Hash-Based Signature Schemes (nist.gov))
Functions: Key pair generation, signature generation, signature verification
Modes: SHA-256, SHA-256(192), SHAKE-256(256), SHAKE-256(192)
Firmware Version Support v3.1 and later
Not AllowedApproved, Validation Number: A5702, A5703

XMSS

DescriptionCC Evaluated ConfigurationFIPS Mode
[NIST SP 800-208] (Recommendation for Stateful Hash-Based Signature Schemes (nist.gov))
Functions: Key pair generation, signature generation, signature verification
Modes: XMSS-SHA2_10_256, XMSS-SHA2_16_256, XMSS-SHA2_20_256, XMSS-SHAKE256_10_256, XMSS-SHAKE256_16_256, XMSS-SHAKE256_20_256
Firmware Version Support v3.1 and later
AllowedNon-approved but allowed

Further content: