Our Online Store have the new products: RFID antenna board. Currently it can work with JC10M24R and JCOP4 card chips.
Compared with normal cards, the antenna board module has a smaller size and fixed holes, which is easy to integrate in the IOT(Internet Of Things) project.

eJava Token

Card Products

Moderator: horse dream

thirsty
Posts: 2
Joined: Thu May 26, 2016 5:58 am
Points :50
Contact:

eJava Token

Post by thirsty » Thu May 26, 2016 9:01 am

Does anyone have output of JCAlgTest off eJava Token?

Tarantino
Posts: 101
Joined: Wed Aug 19, 2015 1:56 am
Points :478
Contact:

Re: eJava Token

Post by Tarantino » Thu May 26, 2016 11:05 pm

Just for your information, here is the JCAlgTest result of eJava Token. And also the result sheet is attached to this post.

Code: Select all

INFO: This file was generated by AlgTest utility. See http://www.fi.muni.cz/~xsvenda/jcsupport.html for more results source codes and other details.;
Tested and provided by; insert your name please.;
Execution date/time; 2016/05/27 10:32:34
AlgTestJClient version; 1.6.0
AlgTest applet version; 1.6.0
Used reader; PC/SC terminal FT Java Token 0
Card ATR; 3b fc 18 00 00 81 31 80 45 90 67 46 4a 01 64 2f 70 c1 72 fe e0 fd
Card name; eJavaToken
Used protocol; T=1

JCSystem.getVersion()[Major.Minor];2.2;
JCSystem.isObjectDeletionSupported;yes;
JCSystem.MEMORY_TYPE_PERSISTENT;>32767B;
JCSystem.MEMORY_TYPE_TRANSIENT_RESET;1357B;
JCSystem.MEMORY_TYPE_TRANSIENT_DESELECT;512B;
JCSystem.MEMORY_TYPE_TRANSIENT_DESELECT;512B;

CPLC; 9f 7f 2a 00 00 00 00 46 54 0e 05 64 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
CPLC.ICFabricator;0000;unknown
CPLC.ICType;0000
CPLC.OperatingSystemID;4654
CPLC.OperatingSystemReleaseDate;0e05
CPLC.OperatingSystemReleaseLevel;642f
CPLC.ICFabricationDate;0000;(Y DDD) date in that year
CPLC.ICSerialNumber;00000000
CPLC.ICBatchIdentifier;0000
CPLC.ICModuleFabricator;0000
CPLC.ICModulePackagingDate;0000
CPLC.ICCManufacturer;0000
CPLC.ICEmbeddingDate;0000
CPLC.ICPrePersonalizer;0000
CPLC.ICPrePersonalizationEquipmentDate;0000
CPLC.ICPrePersonalizationEquipmentID;00000000
CPLC.ICPersonalizer;0000
CPLC.ICPersonalizationDate;0000
CPLC.ICPersonalizationEquipmentID;00000000
CPLC.ICPersonalizationEquipmentID;00000000

javacardx.crypto.Cipher
ALG_DES_CBC_NOPAD;yes;0.234000
ALG_DES_CBC_ISO9797_M1;yes;0.296000
ALG_DES_CBC_ISO9797_M2;yes;0.296000
ALG_DES_CBC_PKCS5;yes;0.296000
ALG_DES_ECB_NOPAD;yes;0.312000
ALG_DES_ECB_ISO9797_M1;yes;0.296000
ALG_DES_ECB_ISO9797_M2;yes;0.312000
ALG_DES_ECB_PKCS5;yes;0.296000
ALG_RSA_ISO14888;no;
ALG_RSA_PKCS1;yes;0.314000
ALG_RSA_ISO9796;no;
ALG_RSA_NOPAD;yes;0.312000
ALG_AES_BLOCK_128_CBC_NOPAD;yes;0.312000
ALG_AES_BLOCK_128_ECB_NOPAD;yes;0.312000
ALG_RSA_PKCS1_OAEP;no;
ALG_KOREAN_SEED_ECB_NOPAD;yes;0.312000
ALG_KOREAN_SEED_CBC_NOPAD;yes;0.312000
ALG_AES_BLOCK_192_CBC_NOPAD;no;
ALG_AES_BLOCK_192_ECB_NOPAD;no;
ALG_AES_BLOCK_256_CBC_NOPAD;no;
ALG_AES_BLOCK_256_ECB_NOPAD;no;
ALG_AES_CBC_ISO9797_M1;no;
ALG_AES_CBC_ISO9797_M2;no;
ALG_AES_CBC_PKCS5;no;
ALG_AES_ECB_ISO9797_M1;no;
ALG_AES_ECB_ISO9797_M2;no;
ALG_AES_ECB_PKCS5;no;

javacard.crypto.Signature
ALG_DES_MAC4_NOPAD;yes;0.249000
ALG_DES_MAC8_NOPAD;yes;0.314000
ALG_DES_MAC4_ISO9797_M1;yes;0.312000
ALG_DES_MAC8_ISO9797_M1;yes;0.312000
ALG_DES_MAC4_ISO9797_M2;yes;0.312000
ALG_DES_MAC8_ISO9797_M2;yes;0.312000
ALG_DES_MAC4_PKCS5;yes;0.312000
ALG_DES_MAC8_PKCS5;yes;0.312000
ALG_RSA_SHA_ISO9796;yes;0.312000
ALG_RSA_SHA_PKCS1;yes;0.312000
ALG_RSA_MD5_PKCS1;yes;0.327000
ALG_RSA_RIPEMD160_ISO9796;no;
ALG_RSA_RIPEMD160_PKCS1;no;
ALG_DSA_SHA;no;
ALG_RSA_SHA_RFC2409;no;
ALG_RSA_MD5_RFC2409;no;
ALG_ECDSA_SHA;yes;0.499000
ALG_AES_MAC_128_NOPAD;yes;0.359000
ALG_DES_MAC4_ISO9797_1_M2_ALG3;yes;0.312000
ALG_DES_MAC8_ISO9797_1_M2_ALG3;yes;0.312000
ALG_RSA_SHA_PKCS1_PSS;no;
ALG_RSA_MD5_PKCS1_PSS;no;
ALG_RSA_RIPEMD160_PKCS1_PSS;no;
ALG_HMAC_SHA1;no;
ALG_HMAC_SHA_256;no;
ALG_HMAC_SHA_384;no;
ALG_HMAC_SHA_512;no;
ALG_HMAC_MD5;no;
ALG_HMAC_RIPEMD160;no;
ALG_RSA_SHA_ISO9796_MR;yes;0.312000
ALG_RSA_RIPEMD160_ISO9796_MR;no;
ALG_SEED_MAC_NOPAD;yes;0.343000
ALG_ECDSA_SHA_256;no;
ALG_ECDSA_SHA_384;no;
ALG_AES_MAC_192_NOPAD;no;
ALG_AES_MAC_256_NOPAD;no;
ALG_ECDSA_SHA_224;no;
ALG_ECDSA_SHA_512;no;
ALG_RSA_SHA_224_PKCS1;no;
ALG_RSA_SHA_256_PKCS1;no;
ALG_RSA_SHA_384_PKCS1;no;
ALG_RSA_SHA_512_PKCS1;no;
ALG_RSA_SHA_224_PKCS1_PSS;no;
ALG_RSA_SHA_256_PKCS1_PSS;no;
ALG_RSA_SHA_384_PKCS1_PSS;no;
ALG_RSA_SHA_512_PKCS1_PSS;no;
ALG_DES_MAC4_ISO9797_1_M1_ALG3;no;
ALG_DES_MAC8_ISO9797_1_M1_ALG3;no;

javacard.security.MessageDigest
ALG_SHA;yes;0.250000
ALG_MD5;yes;0.328000
ALG_RIPEMD160;no;
ALG_SHA_256;yes;0.343000
ALG_SHA_384;yes;0.343000
ALG_SHA_512;yes;0.328000
ALG_SHA_224;yes;0.328000

javacard.security.RandomData
ALG_PSEUDO_RANDOM;yes;0.234000
ALG_SECURE_RANDOM;yes;0.328000

javacard.security.KeyBuilder
TYPE_DES_TRANSIENT_RESET;yes;0.297000
TYPE_DES_TRANSIENT_DESELECT;yes;0.390000
TYPE_DES LENGTH_DES;yes;0.375000
TYPE_DES LENGTH_DES3_2KEY;yes;0.359000
TYPE_DES LENGTH_DES3_3KEY;yes;0.359000
TYPE_AES_TRANSIENT_RESET;yes;0.374000
TYPE_AES_TRANSIENT_DESELECT;yes;0.393000
TYPE_AES LENGTH_AES_128;yes;0.374000
TYPE_AES LENGTH_AES_192;yes;0.343000
TYPE_AES LENGTH_AES_256;yes;0.359000
TYPE_RSA_PUBLIC LENGTH_RSA_512;yes;0.390000
TYPE_RSA_PUBLIC LENGTH_RSA_736;no;
TYPE_RSA_PUBLIC LENGTH_RSA_768;yes;0.408000
TYPE_RSA_PUBLIC LENGTH_RSA_896;yes;0.375000
TYPE_RSA_PUBLIC LENGTH_RSA_1024;yes;0.515000
TYPE_RSA_PUBLIC LENGTH_RSA_1280;yes;0.421000
TYPE_RSA_PUBLIC LENGTH_RSA_1536;yes;0.437000
TYPE_RSA_PUBLIC LENGTH_RSA_1984;yes;0.452000
TYPE_RSA_PUBLIC LENGTH_RSA_2048;yes;0.406000
TYPE_RSA_PUBLIC LENGTH_RSA_3072;no;
TYPE_RSA_PUBLIC LENGTH_RSA_4096;no;
TYPE_RSA_PRIVATE LENGTH_RSA_512;yes;0.374000
TYPE_RSA_PRIVATE LENGTH_RSA_736;no;
TYPE_RSA_PRIVATE LENGTH_RSA_768;yes;0.390000
TYPE_RSA_PRIVATE LENGTH_RSA_896;yes;0.375000
TYPE_RSA_PRIVATE LENGTH_RSA_1024;yes;0.390000
TYPE_RSA_PRIVATE LENGTH_RSA_1280;yes;0.406000
TYPE_RSA_PRIVATE LENGTH_RSA_1536;yes;0.422000
TYPE_RSA_PRIVATE LENGTH_RSA_1984;yes;0.421000
TYPE_RSA_PRIVATE LENGTH_RSA_2048;yes;0.437000
TYPE_RSA_PRIVATE LENGTH_RSA_3072;no;
TYPE_RSA_PRIVATE LENGTH_RSA_4096;no;
TYPE_RSA_PRIVATE_TRANSIENT_RESET;no;
TYPE_RSA_PRIVATE_TRANSIENT_DESELECT;no;
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_512;yes;0.530000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_736;no;
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_768;yes;0.546000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_896;yes;0.546000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_1024;yes;0.577000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_1280;yes;0.577000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_1536;yes;0.564000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_1984;yes;0.608000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_2048;yes;0.624000
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_3072;no;
TYPE_RSA_CRT_PRIVATE LENGTH_RSA_4096;no;
TYPE_RSA_CRT_PRIVATE_TRANSIENT_RESET;no;
TYPE_RSA_CRT_PRIVATE_TRANSIENT_DESELECT;no;
TYPE_DSA_PRIVATE LENGTH_DSA_512;no;
TYPE_DSA_PRIVATE LENGTH_DSA_768;no;
TYPE_DSA_PRIVATE LENGTH_DSA_1024;no;
TYPE_DSA_PRIVATE_TRANSIENT_RESET;no;
TYPE_DSA_PRIVATE_TRANSIENT_DESELECT;no;
TYPE_DSA_PUBLIC LENGTH_DSA_512;no;
TYPE_DSA_PUBLIC LENGTH_DSA_768;no;
TYPE_DSA_PUBLIC LENGTH_DSA_1024;no;
TYPE_EC_F2M_PRIVATE LENGTH_EC_F2M_113;no;
TYPE_EC_F2M_PRIVATE LENGTH_EC_F2M_131;no;
TYPE_EC_F2M_PRIVATE LENGTH_EC_F2M_163;no;
TYPE_EC_F2M_PRIVATE LENGTH_EC_F2M_193;no;
TYPE_EC_F2M_PRIVATE_TRANSIENT_RESET;no;
TYPE_EC_F2M_PRIVATE_TRANSIENT_DESELECT;no;
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_112;no;
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_128;no;
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_160;no;
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_192;yes;0.608000
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_224;no;
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_256;yes;0.608000
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_384;yes;0.624000
TYPE_EC_FP_PRIVATE LENGTH_EC_FP_521;no;
TYPE_EC_FP_PRIVATE_TRANSIENT_RESET;no;
TYPE_EC_FP_PRIVATE_TRANSIENT_DESELECT;no;
TYPE_KOREAN_SEED_TRANSIENT_RESET;yes;0.422000
TYPE_KOREAN_SEED_TRANSIENT_DESELECT;yes;0.390000
TYPE_KOREAN_SEED LENGTH_KOREAN_SEED_128;yes;0.375000
TYPE_HMAC_TRANSIENT_RESET;no;
TYPE_HMAC_TRANSIENT_DESELECT;no;
TYPE_HMAC LENGTH_HMAC_SHA_1_BLOCK_64;no;
TYPE_HMAC LENGTH_HMAC_SHA_256_BLOCK_64;no;
TYPE_HMAC LENGTH_HMAC_SHA_384_BLOCK_64;no;
TYPE_HMAC LENGTH_HMAC_SHA_512_BLOCK_64;no;

javacard.security.KeyAgreement
ALG_EC_SVDP_DH;yes;0.328000
ALG_EC_SVDP_DHC;yes;0.468000
ALG_EC_SVDP_DH_KDF;yes;0.468000
ALG_EC_SVDP_DH_PLAIN;yes;0.483000
ALG_EC_SVDP_DHC_KDF;yes;0.468000
ALG_EC_SVDP_DHC_PLAIN;yes;0.468000

javacard.security.Checksum
ALG_ISO3309_CRC16;yes;0.343000
ALG_ISO3309_CRC32;yes;0.327000

javacard.security.KeyPair ALG_RSA on-card generation
ALG_RSA LENGTH_RSA_512;error(ILLEGAL_VALUE);
ALG_RSA LENGTH_RSA_736;no;
ALG_RSA LENGTH_RSA_768;error(ILLEGAL_VALUE);
ALG_RSA LENGTH_RSA_896;error(ILLEGAL_VALUE);
ALG_RSA LENGTH_RSA_1024;yes;2.465000
ALG_RSA LENGTH_RSA_1280;error(ILLEGAL_VALUE);
ALG_RSA LENGTH_RSA_1536;error(ILLEGAL_VALUE);
ALG_RSA LENGTH_RSA_1984;error(ILLEGAL_VALUE);
ALG_RSA LENGTH_RSA_2048;yes;9.705000
ALG_RSA LENGTH_RSA_3072;no;
ALG_RSA LENGTH_RSA_4096;no;

javacard.security.KeyPair ALG_RSA_CRT on-card generation
ALG_RSA_CRT LENGTH_RSA_512;error(ILLEGAL_VALUE);
ALG_RSA_CRT LENGTH_RSA_736;no;
ALG_RSA_CRT LENGTH_RSA_768;error(ILLEGAL_VALUE);
ALG_RSA_CRT LENGTH_RSA_896;error(ILLEGAL_VALUE);
ALG_RSA_CRT LENGTH_RSA_1024;yes;2.059000
ALG_RSA_CRT LENGTH_RSA_1280;error(ILLEGAL_VALUE);
ALG_RSA_CRT LENGTH_RSA_1536;error(ILLEGAL_VALUE);
ALG_RSA_CRT LENGTH_RSA_1984;error(ILLEGAL_VALUE);
ALG_RSA_CRT LENGTH_RSA_2048;yes;6.100000
ALG_RSA_CRT LENGTH_RSA_3072;no;
ALG_RSA_CRT LENGTH_RSA_4096;no;

javacard.security.KeyPair ALG_DSA on-card generation
ALG_DSA LENGTH_DSA_512;no;
ALG_DSA LENGTH_DSA_768;no;
ALG_DSA LENGTH_DSA_1024;no;

javacard.security.KeyPair ALG_EC_F2M on-card generation
ALG_EC_F2M LENGTH_EC_F2M_113;no;
ALG_EC_F2M LENGTH_EC_F2M_131;no;
ALG_EC_F2M LENGTH_EC_F2M_163;no;
ALG_EC_F2M LENGTH_EC_F2M_193;no;

javacard.security.KeyPair ALG_EC_FP on-card generation
ALG_EC_FP LENGTH_EC_FP_112;no;
ALG_EC_FP LENGTH_EC_FP_128;no;
ALG_EC_FP LENGTH_EC_FP_160;no;
ALG_EC_FP LENGTH_EC_FP_192;yes;1.170000
ALG_EC_FP LENGTH_EC_FP_224;no;
ALG_EC_FP LENGTH_EC_FP_256;yes;1.251000
ALG_EC_FP LENGTH_EC_FP_384;yes;1.342000
ALG_EC_FP LENGTH_EC_FP_521;no;

"Support for variable public exponent for RSA 1024. If supported user-defined fast modular exponentiation can be executed on the smart card via cryptographic coprocessor.
This is very specific feature and you will probably not need it;"
Allocate RSA 1024 objects;yes;0.249000 sec;
Set random modulus;yes;0.078000 sec;
Set random public exponent;no;
Initialize cipher with public key with random exponent;no;
Use random public exponent;no;

Total test time:; 84 seconds.

You do not have the required permissions to view the files attached to this post. Please login first.
The greatest glory in living lies not in never falling, but in rising every time we fall.--Nelson Mandela

marclo
Posts: 20
Joined: Thu Nov 19, 2015 5:41 am
Points :127
Contact:

Re: eJava Token

Post by marclo » Fri May 27, 2016 1:48 am

FYI












You do not have the required permissions to view the files attached to this post. Please login first.

thirsty
Posts: 2
Joined: Thu May 26, 2016 5:58 am
Points :50
Contact:

Re: eJava Token

Post by thirsty » Fri May 27, 2016 3:43 am

Thank you very much.
I order 2 devices.

Post Reply Previous topicNext topic

Who is online

Users browsing this forum: No registered users and 23 guests

JavaCard OS : Disclaimer