Cryptography | - Asymmetric: RSA, DSA, Diffie-Hellman, Elliptic Curve Cryptography (ECDSA, ECDH, Ed25519) with named, user defined and Brainpool curves, and more
- Symmetric: AES, AES-GCM, AES-CCM, AES-GMAC, Triple DES, DES, CAST 128, RC2, RC4, SEED, ARIA plus others
- Hashing: SHA-1, SHA-2, SHA-3, MD5, MD2, RIPEMD 128, RIPEMD 160, DES MDC2 PAD1 and more
- Message authentication codes: SHA-1, SHA-2, SHA-3, MD2, RIPEMD128, RIPEMD160, DES MDC-2 PAD1, SSL3 MD5 MAC, AES MAC, CAST-128 MAC, DES MAC, DES3 MAC, DES3 Retail CFB MAC, DES30x9.19 MAC, IDEA MAC, RC-2 MAC, SEED MAC, ARIA MAC, VISA CVV
- Digital wallet encryption: BIP32
- 5G cryptographic mechanisms for subscriber authentication: MILENAGE and TUAK
- Interoperability: ASC X9 TR-31
|
Safety and environmental compliance | - UL, CSA, CE
- FCC, KC Mark, VCCI, CE
- RoHS, WEEE
- India BIS [IS 13252 (Part 1)/IEC 60950-1]
|