UNPKG

@cyclonedx/cdxgen

Version:

Creates CycloneDX Software Bill of Materials (SBOM) from source or container image

2,138 lines 96.5 kB
{ "$schema": "http://cyclonedx.org/schema/cryptography-defs.schema.json", "lastUpdated": "2025-03-22T00:00:00Z", "algorithms": [ { "family": "RSASSA-PKCS1", "standard": [ { "name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017" }, { "name": "IEEE1363", "url": "https://doi.org/10.1109/IEEESTD.2000.92290" } ], "variant": [ { "pattern": "RSA-PKCS1-1.5[-{digestAlgorithm}][-{keyLength}]", "primitive": "signature" } ] }, { "family": "RSASSA-PSS", "standard": [ { "name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017" }, { "name": "IEEE1363A", "url": "https://doi.org/10.1109/IEEESTD.2004.94612" } ], "variant": [ { "pattern": "RSA-PSS[-{digestAlgorithm}][-{saltLength}][-{keyLength}]", "primitive": "signature" } ] }, { "family": "RSAES-PKCS1", "standard": [ { "name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017" } ], "variant": [ { "pattern": "RSA-PKCS1-1.5[-{keyLength}]", "primitive": "pke" } ] }, { "family": "RSAES-OAEP", "standard": [ { "name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017" } ], "variant": [ { "pattern": "RSA-OAEP[-{hashAlgorithm}][-{maskGenAlgorithm}][-{keyLength}]", "primitive": "pke" } ] }, { "family": "EdDSA", "standard": [ { "name": "RFC8032", "url": "https://doi.org/10.17487/RFC8032" } ], "variant": [ { "pattern": "Ed(25519|448)[-(ph|ctx)]", "primitive": "signature" } ] }, { "family": "ECDSA", "standard": [ { "name": "FIPS186-4", "url": "https://doi.org/10.6028/NIST.FIPS.186-4" }, { "name": "X9.62", "url": "https://standards.globalspec.com/std/1955141/ansi-x9-62" } ], "variant": [ { "pattern": "ECDSA[-{ellipticCurve}][-{hash}]", "primitive": "signature" } ] }, { "family": "ECIES", "standard": [ { "name": "SEC1", "url": "https://www.secg.org/sec1-v2.pdf" }, { "name": "ISO/IEC 18033-2", "url": "https://www.iso.org/standard/37971.html" } ], "variant": [ { "pattern": "ECIES[-{ellipticCurve}][-{kdf}][-{symmetricCipher}][-{mac}]", "primitive": "pke" } ] }, { "family": "MQV", "standard": [ { "name": "SP800-56A", "url": "https://doi.org/10.6028/NIST.SP.800-56Ar3" } ], "variant": [ { "pattern": "FFMQV[-{namedGroup}]", "primitive": "key-agree" }, { "pattern": "ECMQV[-{ellipticCurve}]", "primitive": "key-agree" } ] }, { "family": "ElGamal", "standard": [ { "name": "ISO/IEC 18033-2", "url": "https://www.iso.org/standard/37971.html" } ], "variant": [ { "pattern": "ElGamal[-{keyLength}]", "primitive": "pke" }, { "pattern": "EC-ElGamal[-{ellipticCurve}]", "primitive": "pke" } ] }, { "family": "DSA", "standard": [ { "name": "FIPS186-4", "url": "https://doi.org/10.6028/NIST.FIPS.186-4" } ], "variant": [ { "pattern": "DSA[-{length}][-{hash}]", "primitive": "signature" } ] }, { "family": "ECDH", "standard": [ { "name": "SP800-56A", "url": "https://doi.org/10.6028/NIST.SP.800-56Ar3" }, { "name": "IEEE1363", "url": "https://doi.org/10.1109/IEEESTD.2000.92290" }, { "name": "X9.63", "url": "https://webstore.ansi.org/standards/ASCX9/ansix9632011r2017" } ], "variant": [ { "pattern": "ECDH[E][-{ellipticCurve}]", "primitive": "key-agree" }, { "pattern": "x25519|x448", "primitive": "key-agree" } ] }, { "family": "FFDH", "standard": [ { "name": "RFC7919", "url": "https://doi.org/10.17487/RFC7919" }, { "name": "SP800-56A", "url": "https://doi.org/10.6028/NIST.SP.800-56Ar3" } ], "variant": [ { "pattern": "FFDH(E)[-{namedGroup}]", "primitive": "key-agree" } ] }, { "family": "SHA-1", "standard": [ { "name": "FIPS180-4", "url": "https://doi.org/10.6028/NIST.FIPS.180-4" } ], "variant": [ { "pattern": "SHA-1", "primitive": "hash" } ] }, { "family": "SHA-2", "standard": [ { "name": "FIPS180-4", "url": "https://doi.org/10.6028/NIST.FIPS.180-4" } ], "variant": [ { "pattern": "SHA-(224|256|384|512|512/224|512/256)", "primitive": "hash" } ] }, { "family": "SHA-3", "standard": [ { "name": "FIPS202", "url": "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf" }, { "name": "SP800-185", "url": "https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf" } ], "variant": [ { "pattern": "SHA-3-(224|256|384|512)", "primitive": "hash" }, { "pattern": "SHAKE(128|256)", "primitive": "xof" }, { "pattern": "cSHAKE(128|256)", "primitive": "xof" }, { "pattern": "KMAC(128|256)", "primitive": "mac" }, { "pattern": "HMACXOF(128|256)", "primitive": "mac" }, { "pattern": "TupleHash(128|256)", "primitive": "hash" }, { "pattern": "TupleHashXOF(128|256)", "primitive": "xof" }, { "pattern": "ParallelHash(128|256)", "primitive": "hash" }, { "pattern": "ParallelHashXOF(128|256)", "primitive": "xof" } ] }, { "family": "AES", "standard": [ { "name": "FIPS197", "url": "https://doi.org/10.6028/NIST.FIPS.197-upd1" }, { "name": "SP800-38{A-G}", "url": "https://doi.org/10.6028/NIST.SP.800-38A" }, { "name": "RFC 5116", "url": "https://doi.org/10.17487/RFC5116" } ], "variant": [ { "pattern": "AES[-(128|192|256)][-(ECB|CBC|CFB(1|8|64|128)|OFB|CTR|XTS|CTS)][-{padding}][-{ivlen}]", "primitive": "block-cipher" }, { "standard": [ { "name": "SP800-38D", "url": "https://doi.org/10.6028/NIST.SP.800-38D" }, { "name": "RFC 3610", "url": "https://doi.org/10.17487/RFC5116" } ], "pattern": "AES[-(128|192|256)][-(GCM|CCM)][-{tagLength}][-{ivLength}]", "primitive": "ae" }, { "standard": [ { "name": "RFC5649", "url": "https://doi.org/10.17487/RFC5649" } ], "pattern": "AES[-(128|192|256)]-Wrap[-(PAD|KWP|PKCS7)]", "primitive": "key-wrap" }, { "pattern": "AES[-(128|192|256)][-(GMAC|CMAC)]", "primitive": "mac" }, { "pattern": "AES[-(128|192|256)][-(XCBC_MAC[_96])]", "primitive": "mac" } ] }, { "family": "HKDF", "standard": [ { "name": "RFC5869", "url": "https://doi.org/10.17487/RFC5869" } ], "variant": [ { "pattern": "HKDF[-{hashFunction}]", "primitive": "kdf" } ] }, { "family": "HMAC", "standard": [ { "name": "SP800-224", "url": "https://doi.org/10.6028/NIST.SP.800-224.ipd" }, { "name": "RFC2104", "url": "https://doi.org/10.17487/RFC2104" } ], "variant": [ { "pattern": "HMAC[-{hashFunction}][-{tagLength}]", "primitive": "mac" } ] }, { "family": "CMAC", "standard": [ { "name": "SP800-38B", "url": "https://doi.org/10.6028/NIST.SP.800-38B" } ], "variant": [ { "pattern": "CMAC[-{cipherAlgorithm}][-{length}]", "primitive": "mac" } ] }, { "family": "KMAC", "standard": [ { "name": "SP800-108r1", "url": "https://doi.org/10.6028/NIST.SP.800-108r1-upd1" } ], "variant": [ { "pattern": "KMAC[-(128|256)]", "primitive": "mac" } ] }, { "family": "ChaCha", "standard": [ { "name": "RFC8439", "url": "https://doi.org/10.17487/RFC8439" } ], "variant": [ { "pattern": "ChaCha20[-(AES|{otherBlockCipher})]", "primitive": "stream-cipher" } ] }, { "family": "Poly1305", "standard": [ { "name": "RFC8439", "url": "https://doi.org/10.17487/RFC8439" } ], "variant": [ { "pattern": "Poly1305", "primitive": "mac" } ] }, { "family": "ChaCha20", "standard": [ { "name": "RFC8439", "url": "https://doi.org/10.17487/RFC8439" } ], "variant": [ { "pattern": "ChaCha20", "primitive": "stream-cipher" }, { "pattern": "ChaCha20-Poly1305", "primitive": "ae" } ] }, { "family": "Salsa20", "standard": [ { "name": "The Salsa20 Family of Stream Ciphers", "url": "https://doi.org/10.1007/978-3-540-68351-3_8" } ], "variant": [ { "pattern": "Salsa20", "primitive": "stream-cipher" }, { "pattern": "Salsa20-Poly1305", "primitive": "ae" } ] }, { "family": "MD5", "standard": [ { "name": "RFC1321", "url": "https://doi.org/10.17487/RFC1321" } ], "variant": [ { "pattern": "MD5", "primitive": "hash" } ] }, { "family": "MD4", "standard": [ { "name": "RFC1320", "url": "https://doi.org/10.17487/RFC1320" } ], "variant": [ { "pattern": "MD4", "primitive": "hash" } ] }, { "family": "RC4", "standard": [ { "name": "Applied Cryptography: Protocols, Algorithms, and Source Code in C", "url": "https://dl.acm.org/doi/book/10.5555/572932" } ], "variant": [ { "pattern": "RC4[-{keyLength}]", "primitive": "stream-cipher" } ] }, { "family": "3DES", "standard": [ { "name": "RFC1851", "url": "https://doi.org/10.17487/RFC1851" }, { "name": "FIPS PUB 46-3", "url": "https://csrc.nist.gov/pubs/fips/46-3/final" } ], "variant": [ { "pattern": "3DES[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "DES", "standard": [ { "name": "FIPS PUB 46-3", "url": "https://csrc.nist.gov/pubs/fips/46-3/final" }, { "name": "ANSI INCITS 92-1981", "url": "https://csrc.nist.gov/pubs/fips/46-3/final" } ], "variant": [ { "pattern": "DES[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "IDEA", "standard": [ { "name": "A Proposal for a New Block Encryption Standard", "url": "https://doi.org/10.1007%2F3-540-46877-3_35" } ], "variant": [ { "pattern": "IDEA[-{mode}]", "primitive": "block-cipher" } ] }, { "family": "RC2", "standard": [ { "name": "RFC2268", "url": "https://doi.org/10.17487/RFC2268" } ], "variant": [ { "pattern": "RC2[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "ML-DSA", "standard": [ { "name": "FIPS 204", "url": "https://doi.org/10.6028/NIST.FIPS.204" } ], "variant": [ { "pattern": "ML-DSA-(44|65|87)", "primitive": "signature" }, { "pattern": "HashML-DSA-(44|65|87)[-{hashFunction}]", "primitive": "signature" } ] }, { "family": "SLH-DSA", "standard": [ { "name": "FIPS 205", "url": "https://doi.org/10.6028/NIST.FIPS.205" } ], "variant": [ { "pattern": "SLH-DSA-(SHA2|SHAKE)-(128s|128f|192s|192f|256s|256f)", "primitive": "signature" }, { "pattern": "HashSLH-DSA-(SHA2|SHAKE)-(128s|128f|192s|192f|256s|256f)[-{hashFunction}]", "primitive": "signature" } ] }, { "family": "XMSS", "standard": [ { "name": "SP800-208", "url": "https://doi.org/10.6028/NIST.SP.800-208" }, { "name": "RFC8391", "url": "https://doi.org/10.17487/RFC8391" } ], "variant": [ { "pattern": "XMSS-(SHA2|SHAKE)[_{h}][_{nbits}]", "primitive": "signature" }, { "pattern": "XMSSMT-(SHA2|SHAKE)[_{h}/{d}][_{nbits}]", "primitive": "signature" }, { "pattern": "WOTSP-(SHA2|SHAKE)[_{nbits}]", "primitive": "signature" } ] }, { "family": "LMS", "standard": [ { "name": "SP800-208", "url": "https://doi.org/10.6028/NIST.SP.800-208" }, { "name": "RFC8554", "url": "https://doi.org/10.17487/RFC8554" } ], "variant": [ { "pattern": "LMS[_{hashFunction}][_M{bytesPerNode}][_H{treeHeight}]", "primitive": "signature" }, { "pattern": "LMOTS[_{hashfun}][_N{bytespernode}][_H{treeheight}]", "primitive": "signature" } ] }, { "family": "ML-KEM", "standard": [ { "name": "FIPS 203", "url": "https://doi.org/10.6028/NIST.FIPS.203" } ], "variant": [ { "pattern": "ML-KEM-(512|768|1024)", "primitive": "kem" } ] }, { "family": "IKE-PRF", "standard": [ { "name": "RFC2409", "url": "https://doi.org/10.17487/RFC2409" }, { "name": "RFC5996", "url": "https://doi.org/10.17487/RFC5996" } ], "variant": [ { "pattern": "IKE_PRF_DERIVE", "primitive": "key-agree" }, { "pattern": "IKE1_(PRF|Extended)_DERIVE", "primitive": "key-agree" }, { "pattern": "IKE2_PRF_PLUS_DERIVE", "primitive": "key-agree" } ] }, { "family": "GOST", "variant": [ { "standard": [ { "name": "RFC4357", "url": "https://doi.org/10.17487/RFC4357" } ], "pattern": "GOSTR3410", "primitive": "signature" }, { "standard": [ { "name": "RFC4357", "url": "https://doi.org/10.17487/RFC4357" } ], "pattern": "GOSTR3411", "primitive": "hash" }, { "standard": [ { "name": "RFC4357", "url": "https://doi.org/10.17487/RFC4357" } ], "pattern": "GOSTR3411_HMAC", "primitive": "mac" }, { "standard": [ { "name": "RFC4357", "url": "https://doi.org/10.17487/RFC4357" } ], "pattern": "GOST38147[-{mode}][-{padding}]", "primitive": "block-cipher" }, { "standard": [ { "name": "RFC4357", "url": "https://doi.org/10.17487/RFC4357" } ], "pattern": "GOST38147_MAC", "primitive": "mac" } ] }, { "family": "SEED", "standard": [ { "name": "RFC4269", "url": "https://doi.org/10.17487/RFC4269" }, { "name": "RFC5669", "url": "https://doi.org/10.17487/RFC5669" } ], "variant": [ { "pattern": "SEED-128[-{mode}][-{padding}]", "primitive": "block-cipher" }, { "pattern": "SEED-128[-{mode}][-{padding}]-HMAC[-{hashFunction}][-{tagLength}]", "primitive": "ae" }, { "pattern": "SEED-128-(CCM|GCM)", "primitive": "ae" } ] }, { "family": "ARIA", "standard": [ { "name": "RFC5794", "url": "https://doi.org/10.17487/RFC5794" } ], "variant": [ { "pattern": "ARIA-(128|192|256)[-{mode}][-{padding}]", "primitive": "block-cipher" }, { "pattern": "ARIA-(128|192|256)[-{authmode}][-{padding}]", "primitive": "ae" } ] }, { "family": "CAMELLIA", "standard": [ { "name": "RFC3713", "url": "https://doi.org/10.17487/RFC3713" } ], "variant": [ { "pattern": "CAMELLIA-(128|192|256)[-{mode}][-{padding}]", "primitive": "block-cipher" }, { "pattern": "CAMELLIA-(128|192|256)[-{authmode}][-{padding}]", "primitive": "ae" } ] }, { "family": "Twofish", "standard": [ { "name": "Twofish: A 128-Bit Block Cipher", "url": "https://www.schneier.com/academic/twofish/" } ], "variant": [ { "pattern": "Twofish-(128|192|256)[-{mode}][-{padding}]", "primitive": "block-cipher" } ] }, { "family": "Blowfish", "standard": [ { "name": "Description of a new variable-length key, 64-bit block cipher (Blowfish)", "url": "https://doi.org/10.1007/3-540-58108-1_24" } ], "variant": [ { "pattern": "Blowfish[-{keyLength}][-{mode}][-{padding}]", "primitive": "block-cipher" } ] }, { "family": "Skipjack", "standard": [ { "name": "Escrowed Encryption Standard (EES)", "url": "https://doi.org/10.6028/NIST.FIPS.185" } ], "variant": [ { "pattern": "Skipjack[-{mode}][-{padding}]", "primitive": "block-cipher" } ] }, { "family": "SP800-108", "standard": [ { "name": "SP800-108", "url": "https://doi.org/10.6028/NIST.SP.800-108r1-upd1" } ], "variant": [ { "pattern": "SP800_108_(CounterKDF|FeedbackKDF|DoublePipelineKDF)[-{prfFunction}][-{dkmLength}]", "primitive": "key-derive" } ] }, { "family": "BLAKE2", "standard": [ { "name": "RFC7693", "url": "https://doi.org/10.17487/RFC7693" } ], "variant": [ { "pattern": "BLAKE2b-(160|256|384|512)", "primitive": "hash" }, { "pattern": "BLAKE2b-(160|256|384|512)-HMAC", "primitive": "mac" }, { "pattern": "BLAKE2s-(160|256)", "primitive": "hash" }, { "pattern": "BLAKE2b-(160|256|384|512)-HMAC", "primitive": "mac" } ] }, { "family": "BLAKE3", "standard": [ { "name": "BLAKE3 Spec", "url": "https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf" } ], "variant": [ { "pattern": "BLAKE3[-{outputLength}]", "primitive": "hash" } ] }, { "family": "X3DH", "standard": [ { "name": "The X3DH Key Agreement Protocol", "url": "https://signal.org/docs/specifications/x3dh/" } ], "variant": [ { "pattern": "X3DH[-{hashFunction}]", "primitive": "key-agree" } ] }, { "family": "BLS", "standard": [ { "name": "Short Signatures from the Weil Pairing", "url": "https://dx.doi.org/10.1007/3-540-45682-1_30" } ], "variant": [ { "pattern": "BLS(13-381|13-377|BN254)", "primitive": "signature" }, { "pattern": "BLS[-{ellipticCurve}]", "primitive": "signature" } ] }, { "family": "MILENAGE", "standard": [ { "name": "3GPP TS 35.206", "url": "https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-i00.zip" } ], "variant": [ { "pattern": "MILENAGE[-MAC]", "primitive": "mac" }, { "pattern": "MILENAGE[-KDF]", "primitive": "kdf" } ] }, { "family": "TUAK", "standard": [ { "name": "SHA-3 based authentication algorithm (3GPP TS 35.231)", "url": "https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-i00.zip" } ], "variant": [ { "pattern": "TUAC[-MAC]", "primitive": "mac" }, { "pattern": "TUAC[-KDF]", "primitive": "kdf" } ] }, { "family": "ZUC", "standard": [ { "name": "3GPP TS 35.221", "url": "https://www.3gpp.org/ftp/Specs/archive/35_series/35.221/35221-i00.zip" } ], "variant": [ { "pattern": "128-EEA3", "primitive": "stream-cipher" }, { "pattern": "128-EIA3", "primitive": "mac" } ] }, { "family": "SNOW3G", "standard": [ { "name": "3GPP TS 35.216", "url": "https://www.3gpp.org/ftp/Specs/archive/35_series/35.216/35216-i00.zip" } ], "variant": [ { "pattern": "128-EEA1", "primitive": "stream-cipher" }, { "pattern": "128-EIA1", "primitive": "mac" } ] }, { "family": "3GPP-XOR", "standard": [ { "name": "Legacy XOR-based AV generation algorithm (3GPP TS 35.201)", "url": "https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-i00.zip" } ], "variant": [ { "pattern": "3GPP-XOR[-MAC]", "primitive": "mac" }, { "pattern": "3GPP-XOR[-KDF]", "primitive": "kdf" } ] }, { "family": "MD2", "standard": [ { "name": "RFC1319", "url": "https://doi.org/10.17487/RFC1319" } ], "variant": [ { "pattern": "MD2", "primitive": "hash" } ] }, { "family": "MD4", "standard": [ { "name": "RFC1320", "url": "https://doi.org/10.17487/RFC1320" } ], "variant": [ { "pattern": "MD4", "primitive": "hash" } ] }, { "family": "MD5", "standard": [ { "name": "RFC1321", "url": "https://doi.org/10.17487/RFC1321" } ], "variant": [ { "pattern": "MD5", "primitive": "hash" } ] }, { "family": "RIPEMD", "standard": [ { "name": "ISO10118-3", "url": "https://www.iso.org/standard/67116.html" } ], "variant": [ { "pattern": "RIPEMD-(128|160|256|320)", "primitive": "hash" } ] }, { "family": "Whirlpool", "standard": [ { "name": "ISO10118-3", "url": "https://www.iso.org/standard/67116.html" }, { "name": "NESSIE", "url": "https://www.cosic.esat.kuleuven.be/nessie/" } ], "variant": [ { "pattern": "Whirlpool", "primitive": "hash" } ] }, { "family": "Serpent", "standard": [ { "name": "AES Finalist", "url": "https://www.cl.cam.ac.uk/~rja14/serpent.html" } ], "variant": [ { "pattern": "Serpent-(128|192|256)[-{mode}][-{padding}]", "primitive": "block-cipher" } ] }, { "family": "CAST5", "standard": [ { "name": "RFC2144", "url": "https://doi.org/10.17487/RFC2144" } ], "variant": [ { "pattern": "CAST5[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "CAST6", "standard": [ { "name": "RFC2612", "url": "https://doi.org/10.17487/RFC2612" } ], "variant": [ { "pattern": "CAST6[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "RC5", "standard": [ { "name": "RFC2040", "url": "https://doi.org/10.17487/RFC2040" } ], "variant": [ { "pattern": "RC5[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "RC6", "standard": [ { "name": "The RC6 Block Cipher", "url": "https://web.archive.org/web/20181223080309/http://people.csail.mit.edu/rivest/rc6.pdf" } ], "variant": [ { "pattern": "RC6[-{keyLength}][-{mode}]", "primitive": "block-cipher" } ] }, { "family": "HC", "standard": [ { "name": "eSTREAM", "url": "https://www.ecrypt.eu.org/stream/" } ], "variant": [ { "pattern": "HC-128", "primitive": "stream-cipher" }, { "pattern": "HC-256", "primitive": "stream-cipher" } ] }, { "family": "RABBIT", "standard": [ { "name": "RFC4503", "url": "https://doi.org/10.17487/RFC4503" }, { "name": "eSTREAM", "url": "https://www.ecrypt.eu.org/stream/" } ], "variant": [ { "pattern": "RABBIT", "primitive": "stream-cipher" } ] }, { "family": "Ascon", "standard": [ { "name": "NIST SP 800-232", "url": "https://doi.org/10.6028/NIST.SP.800-232" } ], "variant": [ { "pattern": "Ascon-AEAD128", "primitive": "ae" }, { "pattern": "Ascon-Hash256", "primitive": "hash" }, { "pattern": "Ascon-XOF128", "primitive": "xof" }, { "pattern": "Ascon-CXOF128", "primitive": "xof" } ] }, { "family": "SipHash", "standard": [ { "name": "SipHash Spec", "url": "https://131002.net/siphash/" } ], "variant": [ { "pattern": "SipHash[-{compressionRounds}-{finalizationRounds}]", "primitive": "hash" } ] }, { "family": "PBKDF1", "standard": [ { "name": "RFC8018", "url": "https://doi.org/10.17487/RFC8018" } ], "variant": [ { "pattern": "PBKDF1[-{hashFunction}][-{iterations}][-{dkLen}]", "primitive": "kdf" } ] }, { "family": "PBKDF2", "standard": [ { "name": "RFC8018", "url": "https://doi.org/10.17487/RFC8018" }, { "name": "SP800-132", "url": "https://doi.org/10.6028/NIST.SP.800-132" } ], "variant": [ { "pattern": "PBKDF2[-{hashFunction}][-{iterations}][-{dkLen}]", "primitive": "kdf" } ] }, { "family": "PBES1", "standard": [ { "name": "RFC8018", "url": "https://doi.org/10.17487/RFC8018" } ], "variant": [ { "pattern": "PBES1[-{encryptionAlgorithm}][-{kdf}][-{dkLen}][-{iterations}]", "primitive": "other" } ] }, { "family": "PBES2", "standard": [ { "name": "RFC8018", "url": "https://doi.org/10.17487/RFC8018" } ], "variant": [ { "pattern": "PBES2[-{encryptionAlgorithm}][-{kdf}][-{dkLen}][-{iterations}]", "primitive": "other" } ] }, { "family": "PBMAC1", "standard": [ { "name": "RFC8018", "url": "https://doi.org/10.17487/RFC8018" } ], "variant": [ { "pattern": "PBMAC1[-{macAlgorithm}][-{hashFunction}][-{iterations}][-{dkLen}]", "primitive": "mac" } ] }, { "family": "bcrypt", "standard": [ { "name": "A Future-Adaptable Password Scheme", "url": "https://www.usenix.org/legacy/events/usenix99/provos/provos.pdf" } ], "variant": [ { "pattern": "bcrypt[-{cost)]", "primitive": "hash" } ] }, { "family": "A5/1", "variant": [ { "pattern": "A5/1", "primitive": "stream-cipher" } ] }, { "family": "A5/2", "standard": [ { "name": "ETSI ETR 278", "url": "https://www.etsi.org/deliver/etsi_etr/200_299/278/01_60/etr_278e01p.pdf" } ], "variant": [ { "pattern": "A5/2", "primitive": "stream-cipher" } ] }, { "family": "CMEA", "standard": [ { "name": "TIA TR45.0.A", "url": "" } ], "variant": [ { "pattern": "CMEA", "primitive": "block-cipher" } ] }, { "family": "Fortuna", "standard": [ { "name": "Fortuna - A secure pseudorandom number generator", "url": "https://www.schneier.com/academic/fortuna" } ], "variant": [ { "pattern": "Fortuna[-{blockCipher}][-{hashFunction}]", "primitive": "drbg" } ] }, { "family": "Yarrow", "standard": [ { "name": "Yarrow - A secure pseudorandom number generator", "url": "https://www.schneier.com/academic/yarrow" } ], "variant": [ { "pattern": "Yarrow[-{blockCipher}][-{hashFunction}]", "primitive": "drbg" } ] } ], "ellipticCurves": [ { "name": "anssi", "description": "Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information: Publication d'un param\u00e9trage de courbe elliptique visant des applications de passeport \u00e9lectronique et de l'administration \u00e9lectronique fran\u00e7aise. 21 November 2011", "curves": [ { "name": "FRP256v1", "description": null, "oid": "1.2.250.1.223.101.256.1", "form": "Weierstrass" } ] }, { "name": "bls", "description": "BLS curves. A family of pairing friendly curves, with embedding degree = 12 or 24.", "curves": [ { "name": "BLS12-377", "description": "Curve from Zexe paper: https://eprint.iacr.org/2018/962, params taken from: https://eips.ethereum.org/EIPS/eip-2539 where they are explicitly listed.", "oid": null, "form": "Weierstrass" }, { "name": "BLS12-381", "description": "Curve from https://electriccoin.co/blog/new-snark-curve/. As used in ZCash.", "oid": null, "form": "Weierstrass" }, { "name": "BLS12-446", "description": "Curve from https://github.com/relic-toolkit/relic.", "oid": null, "form": "Weierstrass" }, { "name": "BLS12-455", "description": "Curve from https://github.com/relic-toolkit/relic.", "oid": null, "form": "Weierstrass" }, { "name": "BLS12-638", "description": "Curve from https://github.com/relic-toolkit/relic. Also in https://eprint.iacr.org/2012/232.pdf.", "oid": null, "form": "Weierstrass" }, { "name": "BLS24-477", "description": "Curve from https://github.com/relic-toolkit/relic. Also in https://eprint.iacr.org/2012/232.pdf.", "oid": null, "form": "Weierstrass" }, { "name": "Bandersnatch", "description": "Curve from https://ethresear.ch/t/introducing-bandersnatch-a-fast-elliptic-curve-built-over-the-bls12-381-scalar-field/9957", "oid": null, "form": "TwistedEdwards" } ] }, { "name": "bn", "description": "BN (Barreto, Naehrig curves) from: A Family of Implementation-Friendly BN Elliptic Curves - <https://eprint.iacr.org/2010/429.pdf>.", "curves": [ { "name": "bn158", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn190", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn222", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn254", "description": null, "oid": null, "form": "Weierstrass", "aliases": [ { "category": "other", "name": "Fp254BNb" } ] }, { "name": "bn286", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn318", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn350", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn382", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn414", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn446", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn478", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn510", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn542", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn574", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn606", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "bn638", "description": null, "oid": null, "form": "Weierstrass" } ] }, { "name": "brainpool", "description": "ECC Brainpool Standard Curves and Curve Generation v. 1.0 19.10.2005", "curves": [ { "name": "brainpoolP160r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.1", "form": "Weierstrass" }, { "name": "brainpoolP160t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.2", "form": "Weierstrass" }, { "name": "brainpoolP192r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.3", "form": "Weierstrass" }, { "name": "brainpoolP192t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.4", "form": "Weierstrass" }, { "name": "brainpoolP224r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.5", "form": "Weierstrass" }, { "name": "brainpoolP224t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.6", "form": "Weierstrass" }, { "name": "brainpoolP256r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.7", "form": "Weierstrass" }, { "name": "brainpoolP256t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.8", "form": "Weierstrass" }, { "name": "brainpoolP320r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.9", "form": "Weierstrass" }, { "name": "brainpoolP320t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.10", "form": "Weierstrass" }, { "name": "brainpoolP384r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.11", "form": "Weierstrass" }, { "name": "brainpoolP384t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.12", "form": "Weierstrass" }, { "name": "brainpoolP512r1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.13", "form": "Weierstrass" }, { "name": "brainpoolP512t1", "description": null, "oid": "1.3.36.3.3.2.8.1.1.14", "form": "Weierstrass" } ] }, { "name": "gost", "description": "GOST R 34.10-2001: RFC5832, GOST R 34.10-2012: RFC7836", "curves": [ { "name": "gost256", "description": "RFC5832", "oid": null, "form": "Weierstrass" }, { "name": "gost512", "description": "RFC5832", "oid": null, "form": "Weierstrass" }, { "name": "id-GostR3410-2001-CryptoPro-A-ParamSet", "description": "RFC4357", "oid": null, "form": "Weierstrass" }, { "name": "id-GostR3410-2001-CryptoPro-B-ParamSet", "description": "RFC4357", "oid": null, "form": "Weierstrass" }, { "name": "id-GostR3410-2001-CryptoPro-C-ParamSet", "description": "RFC4357", "oid": null, "form": "Weierstrass" }, { "name": "id-tc26-gost-3410-12-512-paramSetA", "description": "RFC7836", "oid": null, "form": "Weierstrass" }, { "name": "id-tc26-gost-3410-12-512-paramSetB", "description": "RFC7836", "oid": null, "form": "Weierstrass" }, { "name": "id-tc26-gost-3410-2012-256-paramSetA", "description": "RFC5832", "oid": null, "form": "TwistedEdwards" }, { "name": "id-tc26-gost-3410-2012-512-paramSetC", "description": "RFC5832", "oid": null, "form": "TwistedEdwards" } ] }, { "name": "mnt", "description": "MNT (Miyaji, Nakabayashi, and Takano curves) example curves from: New explicit conditions of elliptic curve traces for FR-reduction - https://dspace.jaist.ac.jp/dspace/bitstream/10119/4432/1/73-48.pdf.", "curves": [ { "name": "mnt1", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt2/1", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt2/2", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt3/1", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt3/2", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt3/3", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt4", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt5/1", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt5/2", "description": null, "oid": null, "form": "Weierstrass" }, { "name": "mnt5/3", "description": null, "oid": null, "form": "Weierstrass" } ] }, { "name": "nist", "description": "RECOMMENDED ELLIPTIC CURVES FOR FEDERAL GOVERNMENT USE July 1999", "curves": [ { "name": "B-163", "description": null, "oid": "1.3.132.0.15", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect163r2" }, { "category": "x963", "name": "ansit163r2" } ] }, { "name": "B-233", "description": null, "oid": "1.3.132.0.27", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect233r1" }, { "category": "wtls", "name": "wap-wsg-idm-ecid-wtls11" }, { "category": "x963", "name": "ansit233r1" } ] }, { "name": "B-283", "description": null, "oid": "1.3.132.0.17", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect283r1" }, { "category": "x963", "name": "ansit283r1" } ] }, { "name": "B-409", "description": null, "oid": "1.3.132.0.37", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect409r1" }, { "category": "x963", "name": "ansit409r1" } ] }, { "name": "B-571", "description": null, "oid": "1.3.132.0.39", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect571r1" }, { "category": "x963", "name": "ansit571r1" } ] }, { "name": "K-163", "description": "Koblitz curve.", "oid": "1.3.132.0.1", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect163k1" }, { "category": "x963", "name": "ansit163k1" }, { "category": "wtls", "name": "wap-wsg-idm-ecid-wtls3" } ] }, { "name": "K-233", "description": "Koblitz curve.", "oid": "1.3.132.0.26", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect233k1" }, { "category": "wtls", "name": "wap-wsg-idm-ecid-wtls10" }, { "category": "x963", "name": "ansit233k1" } ] }, { "name": "K-283", "description": "Koblitz curve.", "oid": "1.3.132.0.16", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect283k1" }, { "category": "x963", "name": "ansit283k1" } ] }, { "name": "K-409", "description": "Koblitz curve.", "oid": "1.3.132.0.36", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect409k1" }, { "category": "x963", "name": "ansit409k1" } ] }, { "name": "K-571", "description": "Koblitz curve.", "oid": "1.3.132.0.38", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "sect571k1" }, { "category": "x963", "name": "ansit571k1" } ] }, { "name": "P-192", "description": null, "oid": "1.2.840.10045.3.1.1", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "secp192r1" }, { "category": "x962", "name": "prime192v1" } ] }, { "name": "P-224", "description": null, "oid": "1.3.132.0.33", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "secp224r1" }, { "category": "wtls", "name": "wap-wsg-idm-ecid-wtls12" }, { "category": "x963", "name": "ansip224r1" } ] }, { "name": "P-256", "description": null, "oid": "1.2.840.10045.3.1.7", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "secp256r1" }, { "category": "x962", "name": "prime256v1" } ] }, { "name": "P-384", "description": null, "oid": "1.3.132.0.34", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "secp384r1" }, { "category": "x963", "name": "ansip384r1" } ] }, { "name": "P-521", "description": null, "oid": "1.3.132.0.35", "form": "Weierstrass", "aliases": [ { "category": "secg", "name": "secp521r1" }, { "category": "x963", "name": "ansip521r1" } ] } ] }, { "name": "nums", "description": "Microsoft Nothing Up My Sleeve (NUMS) curves from: <https://eprint.iacr.org/2014/130> and <https://tools.ietf.org/html/draft-black-numscurves-02>", "curves": [ { "name": "ed-254-mont", "description": "Curve from https://eprint.iacr.org/2014/130.pd