Key Agreement Scheme Validation List

Last Update: 10/17/2014

NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths goes into effect January 1, 2014. The SP800-131A Transition plan states that, after December 31, 2013,SP 800-56A DH and MQV schemes using finite fields |p| = 1024 bits, and |q| = 160 bits shall not be used in a key agreement scheme. For SP 800-56A DH and MQV schemes using elliptic curves, |n| less than or equal to 223 bits shall not be used in a key agreement scheme. All of the non-compliant features of the Components validation have been moved to a Historical KAS Validation List for reference.

A note and link to the Historical validation list have been added to validations containing non-compliant features that have been moved to the Historical Validation List. This note is displayed in red print. If a complete validation has become non-compliant, the complete validation entry is displayed in red to signify it is now non-compliant and therefore revoked.

Overview

This page provides technical information about implementations that have been validated as conforming to the Key Agreement Schemes and/or Key Confirmation using Finite Field Cryptography (FFC) or Elliptic Curve Cryptography (ECC) as specified in SP 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, using tests described in The KAS Validation System (KASVS) User's Guide. The testing is handled by NVLAP-accredited Cryptographic And Security Testing (CST) Laboratories.

The implementations below consist of software, firmware, hardware, and any combination thereof. The National Institute of Standards and Technology (NIST) has made every attempt to provide complete and accurate information about the implementations described in this document. However, due to the possibility of changes made within individual companies, NIST cannot guarantee that this document reflects the current status of each product. It is the responsibility of the vendor to notify NIST of any necessary changes to its entry in the following list.

In addition to a general description of each implementation, this list mentions the features that were tested as conforming to the KAS; these features are listed below for each validation. The following notation is used to describe the implemented features that were successfully tested.

Legend for Description Field

Functions included in IUT:
DPG - Domain Parameter Generation
DPV - Domain Parameter Validation
KPG - Key Pair Generation
Full Validation - Full Public Key Validation (Sect 5.6.2.4 and/or Sect 5.6.2.5)
Partial Validation - Partial Public Key Validation (Sect 5.6.2.6) (ECC Only)
Key Regeneration - Public Key Regeneration
A list of functions from other algorithms included in the IUT that are used by the SP800-56A KAS implementation. This information may be used to help obtain information pertaining to the assurances listed in SP800-56A. Actually obtaining these assurances is out of scope of the CAVP.
ALG([FFC] [ECC]) Finite Field Cryptography, Elliptic Curve Cryptography
For FFC,
SCHEMES([HYBRID1] [MQV2] [EPHEM] [HYBRID1FLOW] [MQV1] [ONEFLOW] [STATIC])

For ECC,
SCHEMES ([FULLUNIF] [FULLMQV] [EPHEMUNIF] [ONEPASSUNIF] [ONEPASSMQV] [ONEPASSDH] [STATICUNIF])

Key Agreement Schemes. Refer to SP800-56A for details on the specific schemes.
KAROLES([INITIATOR] [RESPONDER] Key Agreement Roles
KCROLES([NA] [PROVIDER] [RECIPIENT]) Key Confirmation Roles. If Key Confirmation is not tested, indicate N/A.
KCTYPES([NA] [UNILATERAL] [BILATERAL]) Key Confirmation Types. If Key Confirmation is not tested, indicate N/A.
For FFC,
PARAMSET([FB][FC])

For ECC,
PARAMSET([EB][EC][ED][EE])

Parameter Sets supported by IUT. Refer to Section 5.5.1.1 Table 1 for the FFC Parameter Size Sets and Section 5.5.1.2 Table 2 for the ECC Parameter Size Sets.
For ECC,
CURVE(....)
The NIST-recommended ECDSA curves supported by the IUT.
SHA(SHA1) Hash functions supported by the IUT
If KC,
MAC(CMAC, CCM, HMAC)
Only if Key Confirmation is supported, indicate the MACing algorithms tested.
KDF ([ASN.1] [CONCAT]) KDFs tested in the IUT

The KAS validation process requires the following prerequisite testing:

1. The underlying DSA and/or ECDSA algorithm's functions determined by the specified functions included in the implementation. See CAVP FAQ GEN.5 for a list of the required functions within the specified underlying algorithm that must be tested.
2. The supported SHA algorithm(s),
3. The supported MAC algorithms (CCM, CMAC, and/or HMAC) only if key confirmation is implemented, and
4. The supported random number generations including the approved RNG algorithms and the DRBG algorithm(s).
This list is ordered in reverse numerical order, by validation number. Thus, the more recent validations are located closer to the top of the list. The column after the Validation Date column contains information indicating what modes and features for these modes has been successfully tested.

Key Agreement Scheme Validated Implementations

Validation
No.
Vendor Implementation Operational Environment Val.
Date
Description/Notes
50 Certicom Corp.
4701 Tahoe Blvd, Building A
Mississauga, ON L4W 0B5
Canada

-Randy Tsang
TEL: 1-289-261-4189
FAX: 1-905-507-4230

-Ian Laidlaw
TEL: 1-289-261-4277
FAX: 1-905-507-4230

Security Builder® FIPS Core

Version 6.0.2.1
Intel Core i7-2720QM w/ AES-NI w/ Windows 7 Enterprise 64-bit; ARMv7 w/ Windows Phone 8.0; ARMv7 w/ Android 4.4.2; Intel Atom CPU Z2460 w/ Android 4.0.4; ARMv7 w/ iOS version 6.1.4 10/16/2014 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256   HMAC ) ) FC: SHA256   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#2530 DSA Val#891 RNG Val#1310 DRBG Val#579

ECC: SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > < KDF: CONCAT > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512 HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#2530 ECDSA Val#553 RNG Val#1310 DRBG Val#579

"Security Builder® FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules."

49 Pitney Bowes, Inc.
37 Executive Drive
Danbury, CT 06810
USA

-Dave Riley
TEL: 203-796-3208

libkas

Version 01.01.000A (Firmware)
Part # MAX32590 Rev B4
n/a 8/11/2014

ECC: SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ) ]
ECDSA Val#529

"Pitney Bowes X4 HSM Cryptographic Module"

48 Oberthur Technologies
402 rue d’Estienne d’Orves
Colombes, n/a 92700
France

-GOYET Christophe
TEL: +1 703 322 8951

-BOUKYOUD Saïd
TEL: +33 1 78 14 72 58
FAX: +33 1 78 14 70 20

ECC CDH on Cosmo V8

Version 07837.9 (Firmware)
Part # 0F
ID-One PIV-C on Cosmo V8 ;  N/A 7/31/2014

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPV KPG Full Validation ) SCHEMES [ OnePassDH ( KC < KCRole(s): Responder > ) ( EB: P-224   SHA256   CMAC ) ( EC: P-256   SHA256   CMAC ) ]
SHS Val#2449 ECDSA Val#526 DRBG Val#537

"ID-One Cosmo V8 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform compliant with Javacard 3.0.1 and GlobalPlatform 2.2.1 chip which support ECC CDH both for in module key establishment and for primitive only as required by PIV."

08/07/14: Updated implementation information;

47 Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

-Tim Myers
TEL: 800-Microsoft

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry Cryptography Next Generation Cryptographic Implementations

Version 6.3.9600
NVIDIA Tegra 4 Quad-Core w/ Microsoft Surface 2 w/ Windows RT 8.1 (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Windows RT 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon S4 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon 400 w/ Windows Phone 8.1 (ARMv7 Thumb-2); Windows Phone 8.1 (ARMv7 Thumb-2) w/ Windows Phone 8.1 (ARMv7 Thumb-2); Qualcomm Snapdragon S4 w/ Windows RT 8.1 (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Microsoft Surface w/ Windows RT 8.1 (ARMv7 Thumb-2); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows 8.1 Enterprise (x86); AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows 8.1 Enterprise (x86); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows 8.1 Enterprise (x86); Intel Pentium without AES-NI w/ Microsoft Windows 8.1 Enterprise (x86); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86); Intel Pentium without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x86); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows 8.1 Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows 8.1 Enterprise (x64); Intel Pentium without AES-NI w/ Microsoft Windows 8.1 Enterprise (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Server 2012 R2 (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Server 2012 R2 (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Embedded 8.1 Industry Enterprise (x64); Intel Core i3 without AES-NI and with PCLMULQDQ and SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64); AMD A4 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64); Intel Core i7 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Server 2012 R2 (x64); AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Server 2012 R2 (x64); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Microsoft Windows Server 2012 R2 (x64); AMD A4 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64); AMD Athlon 64 X2 without AES-NI w/ Microsoft Windows Storage Server 2012 R2 (x64); Intel Core i7 without AES-NI or PCLMULQDQ or SSSE3 w/ Microsoft Windows Storage Server 2012 R2 (x64); Intel Pentium without AES-NI w/ Microsoft Windows Storage Server 2012 R2 (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Microsoft Windows 8.1 Enterprise (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro w/ Windows 8.1 Pro (x64); Intel Core i5 with AES-NI and PCLMULQDQ and SSSE3 w/ Microsoft Surface Pro 2 w/ Windows 8.1 Pro (x64) 7/10/2014 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#2373 DSA Val#855 DRBG Val#489

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#2373 ECDSA Val#505 DRBG Val#489

"The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography."

46 INSIDE Secure
Arteparc Bachasson, Bât A
Rue de la carrière de Bachasson, CS70025
Meyreuil, Bouches-du-Rhône 13590
France

-Bob Oerlemans
TEL: +31 736-581-900
FAX: +31 736-581-999

VaultIP

Part # 1.1
N/A 5/23/2014

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Full Validation Key Regeneration ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > < KDF: CONCAT / ASN.1 > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256   HMAC ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256 ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA256   P-224 ) ( EC: P-256   SHA256   HMAC ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA256 ) ( EC: P-256   SHA256   HMAC ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA256   P-224 ) ( EC: P-256   SHA256   HMAC ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256   HMAC ) ]
SHS Val#2389 ECDSA Val#502 DRBG Val#500

"VaultIP is a Silicon IP Security Module which includes a complete set of high- and low-level cryptographic functions. It offers key management and crypto functions needed for platform and application security such as Content Protection and Mobile Payment, and can be used stand-alone or as a ''Root of Trust'' to support a TEE-based platform."

45 Pitney Bowes, Inc.
37 Executive Drive
Danbury, CT 06810
USA

-Dave Riley
TEL: 203-796-3208

libkas

Version 01.01.0008 (Firmware)
Part # MAX32590 Rev B4
N/A 4/9/2014

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Partial Validation ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ) ]
SHS Val#2369 ECDSA Val#495 DRBG Val#487

"Pitney Bowes X4 HSM Cryptographic Module"

44 SafeNet, Inc.
4690 Millennium Drive
Belcamp, MD 21017
USA

-Chris Brych
TEL: 613.221.5081
FAX: 613.723.5079

-Laurie Smith
TEL: 613.221.5026
FAX: 613.723.5079

Luna G5 Cryptographic Library

Version 6.10.2 (Firmware)
AMCC 440EPx PowerPC (PPC440EPx) Embedded Processor 11/8/2013

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: Partial Validation ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#2241 ECDSA Val#464 DRBG Val#428
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#44.

"The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor."

43 SafeNet, Inc.
4690 Millennium Drive
Belcamp, MD 21017
USA

-Chris Brych
TEL: 613.221.5081
FAX: 613.723.5079

-Laurie Smith
TEL: 613.221.5026
FAX: 613.723.5079

Luna K6 Cryptographic Library

Version 6.10.2 (Firmware)
AMCC 440EPx Power PC (PPC440EPx) Embedded Processor 11/8/2013

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: Partial Validation ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#2240 ECDSA Val#462 DRBG Val#428
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#43.

"The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor."

42 BlackBerry
295 Phillip Street
Waterloo, ON N2L3W8
Canada

-Security Certifications Team
TEL: 519-888-7465x72921
FAX: 905-507-4230

BlackBerry Cryptographic Algorithm Library

Version 6.1
Intel Xeon X5650 w/ CentOS 5.5 Linux 32-bit; Intel Xeon X5650 w/ CentOS 5.5 Linux 64-bit; Intel Xeon X5650 w/ Windows XP 32-bit; Intel Xeon X5650 w/ Windows XP 64-bit; ARMv7 w/ QNX Neutrino 8.0 9/30/2013 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ Hybrid1 ( No_KC ) ( FB: SHA256   HMAC ) ) FC: SHA256   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#2207 DSA Val#795 RNG Val#1245 DRBG Val#406

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > < KDF: CONCAT > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512 HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#2207 ECDSA Val#455 RNG Val#1245 DRBG Val#406
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#42.

"The BlackBerry Cryptographic Algorithm Library is a suite of cryptographic algorithms that provides advanced cryptographic functionality to systems running BlackBerry 10 OS and components of BlackBerry Enterprise Service 10."

41 Harris Corporation
1680 University Avenue
Rochester, NY 14610
USA

-Robert Magnant
TEL: 585-242-3785
FAX: 585-241-8459

-Elias Theodorou
TEL: 585-242-3785
FAX: 585-241-8459

RF-7800W OU47x, OU49x, OU50x

Version 2.00 (Firmware)
Broadcom XLS108 8/29/2013 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Full Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
( FC: SHA256 ) ]
SHS Val#2190 DSA Val#791 DRBG Val#398

"This is a firmware library that provides the cryptographic functions used on Harris'' industry leading reliable, secure and high performance Broadband Ethernet Radio (BER) products: RF-7800W-OU50x, -OU47x, -OU49x."

40 FRAMA AG
Unterdorf
Lauperswil, Bern CH-3438
Switzerland

-Beat Waelti
TEL: +41-34-49698-98
FAX: +41-34-49698-00

PSD-II by FRAMA

Version V2.0.6 (Firmware)
Part # FRM-II Version 1.2
firmware: running on built-in Fujitsu MB91302APM1R micro controller 8/16/2013 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: Full Validation ) SCHEMES [ dhEphem ( KARole(s): Responder )
( FB: SHA256 ) ]
SHS Val#2179 DRBG Val#393

"The PSD-II (Postal Security Device-II) is a hardware/firmware cryptographic module to be used in automated franking machines."

39 Certicom Corp.
4701 Tahoe Blvd.
Building A
Missisauga, ON L4W 0B5
Canada

-Certicom Sales
TEL: 1-905-507-4220
FAX: 1-905-507-4230

-Ian Laidlaw
TEL: 1-289-261-4277
FAX: 1-905-507-4230

Security Builder® FIPS Core

Version 6.1
Intel x86 (Xeon X5650) w/ CentOS Linux 32-bit; Intel x64 (Xeon X5650) w/ CentOS Linux 64-bit; Intel x86 (Xeon X5650) w/ Windows XP 32-bit; Intel x64 (Xeon X5650) w/ Windows XP 64-bit; ARMv7 w/ QNX Neutrino 8.0 7/15/2013 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256   SHA512   HMAC ) ) FC: SHA256   SHA512   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 SHA512 ) ( FC: SHA256   SHA512 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 SHA512 HMAC ) ( FC: SHA256   SHA512   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 SHA512 ) ( FC: SHA256   SHA512 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 SHA512 HMAC ) ( FC: SHA256   SHA512   HMAC ) ] SHS Val#2164 DSA Val#784 RNG Val#1219 DRBG Val#388

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > < KDF: CONCAT > ) ( EB: P-224   SHA256   SHA512   HMAC ) ( EC: P-256   SHA256   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512 HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#2164 DSA Val#784 RNG Val#1219 DRBG Val#388
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#39.

"Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec and SSL modules."

38 SafeNet, Inc.
4690 Millennium Drive
Belcamp, MD 21017
USA

-Chris Brych
TEL: 613.221.5081
FAX: 613.723.5079

-Laurie Smith
TEL: 613.221.5026
FAX: 613.723.5079

Luna IS Cryptographic Library

Version 6.3.1 (Firmware)
AMCC 440EPx Power PC (PPC440EPx) Embedded Processor 11/21/2012

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1964 ECDSA Val#369 DRBG Val#277
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#38.

"The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor."

37 SafeNet, Inc.
4690 Millennium Drive
Belcamp, MD 21017
USA

-Chris Brych
TEL: 613-221-5081
FAX: 613-723-5079

-Laurie Smith
TEL: 613-221-5026
FAX: 613-723-5079

Luna G5 Cryptographic Library

Version 6.2.3 (Firmware)
AMCC PowerPC 440EPx 10/23/2012

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1948 ECDSA Val#365
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#37.

"The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor."

10/31/12: Updated implementation information;

36 Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

-Tim Myers
TEL: 800-Microsoft
FAX: (none)

Windows 8, Windows RT, Windows Server 2012, Surface Windows RT, Surface Windows 8 Pro, and Windows Phone 8 Cryptography Next Generation (CNG) Implementations

Version 6.2.9200
Qualcomm Snapdragon S4 w/ Windows RT (ARMv7 Thumb-2); NVIDIA Tegra 3 Quad-Core w/ Windows RT (ARMv7 Thumb-2); Intel Core i7 with AES-NI w/ Windows 8 Enterprise (x64); Intel Pentium D w/ Windows 8 Enterprise (x64); AMD Athlon 64 X2 Dual Core w/ Windows 8 Enterprise (x86); Intel Pentium D w/ Windows Server 2012 (x64); Intel Core i7 with AES-NI w/ Windows Server 2012 (x64); Qualcomm Snapdragon S4 w/ Windows Phone 8 (ARMv7 Thumb-2); Intel x64 Processor with AES-NI w/ Surface Windows 8 Pro (x64) 9/26/2012 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation ) SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#1903 DSA Val#687 DRBG Val#258

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   DPV   KPG   Partial Validation   Key Regeneration ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1903 ECDSA Val#341 DRBG Val#258
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#36.

"The Microsoft Windows Cryptographic Primitives Library is a general purpose, software-based, cryptographic module which can be dynamically linked into applications by developers to permit the use of FIPS 140-2 Level 1 compliant cryptography."

11/29/12: Added new tested information;
01/16/13: Updated and added new tested implementation information;
05/31/13: Added new tested information;
06/20/13: Updated implementation information;

35 3S Group Incorporated
125 Church Street, N.E., Suite 204
Vienna, VA 22180
USA

-Satpal S. Sahni
TEL: 703-281-5015
FAX: 703-281-7816

3SGX

Version 1.0 (Firmware)
Cavium Octeon 5/25/2012 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: Full Validation ) SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA224   SHA256   SHA384   SHA512   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA224   SHA256   SHA384   SHA512 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA224   SHA256   SHA384   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA1   SHA256   SHA384   SHA512 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA224   SHA256   SHA384   SHA512   HMAC ) ] SHS Val#1784 DSA Val#646 DRBG Val#200

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Full Validation ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
SHS Val#1784 ECDSA Val#297 DRBG Val#200
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#35.

"3SGX is a high performance PCIe cryptograhic module that provides complete cryptographic support to large numbers of users or applications simultaneously. 3SGX is the core of 3S Group''s hardare security appliances, ideal for enterprise key management, virtualization and cloud server solutions that demand high throughput."

34 Thales e-Security
2200 North Commerce Parkway
Suite 200
Weston, FL 33326
USA

-Joe Warren
TEL: 321-264-2928

Thales Datacryptor

Version 5.0 (Firmware)
PowerPC Core 405 4/30/2012

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Full Validation ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( ED: P-384   SHA384   HMAC ) ]
SHS Val#1764 ECDSA Val#289 DRBG Val#188

"The Thales Datacryptor protects the confidentiality and integrity of sensitive data travelling over public networks."

33 Pitney Bowes, Inc.
37 Executive Drive
Danbury, CT 06810
USA

-Dave Riley
TEL: 203-796-3208

appKas

Version 02000007 (Firmware)
ARM 7 TDMI 4/9/2012

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Partial Validation ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   HMAC ) ) ]
SHS Val#1733 ECDSA Val#286 DRBG Val#181

"The Pitney Bowes Cygnus X-3 Hardware Security Module (HSM) employs strong cryptographic and physical security techniques for the protection of funds in Pitney Bowes Postage systems."

32 Certicom Corp.
4701 Tahoe Blvd.
Building A
Missisauga, ON L4W 0B5
Canada

-Certicom Sales
TEL: 905-507-4220
FAX: 905-507-4230

-Kris Orr
TEL: 289-261-4104
FAX: 905-507-4230

Security Builder FIPS Core

Version 6.0.2
64-bit Intel Core i5-2300 w/ Red Hat Linux 5.6; 64-bit Intel Core i5-2300 w/ Windows 7 3/26/2012 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256   HMAC ) ) FC: SHA256   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#1729 DSA Val#630 DRBG Val#178

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512 HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
SHS Val#1729 DSA Val#630 DRBG Val#178
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#32.

"Security Builder FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules."

31 FRAMA AG
Unterdorf
Lauperswil, Bern CH-3438
Switzerland

-Beat Waelti
TEL: +41-34-49698-98
FAX: +41-34-49698-00

PSD-II by FRAMA

Version V2.0.4 (Firmware)
Part # FRM-II Version 1.2
firmware: running on built-in Fujitsu MB91302APM1R micro controller 2/21/2012 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: Full Validation ) SCHEMES [ dhEphem ( KARole(s): Responder )
( FB: SHA256 ) ]
SHS Val#1699 DRBG Val#169

"The PSD-II (Postal Security Device-II) is a hardware/firmware cryptographic module to be used in automated franking machines."

30 Covia Labs
465 Fairchild Dr. Suite 130
Mountain View, CA 94043
USA

-Bruce Bernstein
TEL: 650-351-6444
FAX: 650-564-9740

CCCM Library

Version 2.0
Intel Pentium 4 w/ Ubuntu Linux version 11; AMD E-350 w/ Red Hat Enterprise Linux version 5.8 1/26/2012

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: KPG Partial Validation ) SCHEMES [ FullUnified ( KC < KCRole(s): Provider / Recipient > < KCType(s): Bilateral > < KARole(s): Initiator / Responder > < KDF: CONCAT > ) ( EB: P-224   SHA224   SHA256   HMAC ) ( EC: P-256   SHA256   SHA384   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1665 ECDSA Val#265 DRBG Val#158 HMAC Val#1136

"The cccmLib is a dynamically linked library whose sole use is to serve as a cryptographic engine to the Covia Labs Connector application. In particular the cccmLib will provide the underlying functionality needed to implement secured communications and an encrypted file system."

08/21/12: Added new tested information;

29 SafeNet, Inc.
20 Colonnade Road
Suite 200
Ottawa, ON K2E 7M6
Canada

-Chris Brych
TEL: 613 221 5081
FAX: 613 723 5079

-Laurie Smith
TEL: 613 221 5026
FAX: 613 723 5079

Luna K5 Cryptographic Library

Version 4.8.7 (Firmware)
StrongARM II 80219 12/16/2011

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: ) SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: K-233   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: B-283   SHA256   SHA384   SHA512   HMAC ) ( ED: K-409   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: K-233   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: B-283   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1671 ECDSA Val#269 RNG Val#998
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#29.

"The Luna K5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware and associated co-processor."

28 Motorola Solutions, Inc.
1301 East Algonquin Road
Schaumburg, IL 60196
USA

-Kirk Mathews
TEL: 847-576-4101

Motorola Solutions µMace KAS

Version R00.00.01_KAS (Firmware)
Part # AT58Z04
Motorola µMace AT58Z04 11/17/2011

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: Partial Validation ) SCHEMES [ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( ED: P-384   SHA384 ) ]
[ EphemeralUnified ( ED: P-384   SHA384 ) ) ]
ECDSA Val#263 DRBG Val#154

"The µMace cryptographic processor is used in security modules embedded in Motorola Solutions security products."

27 NEC Corporation
1753
Shimonumabe
Nakahara-ku
Kawasaki-si, Kanagawa 211-8666
Japan

-NEC Corporation
TEL: +81-44-455-8326

iPASOLINK Diffie-Hellman AES

Version 01.00 (Firmware)
MPC8314CVRAFDA; 10/13/2011 Completely moved to Historical page per SP800-131A transition, all tested components non-compliant. See Historical KAS List Val#27.
26 N/A N/A N/A 9/30/2011 N/A
25 Certicom Corp.
4701 Tahoe Blvd.
Building A
Missisauga, ON L4W 0B5
Canada

-Certicom Sales
TEL: 905-507-4220
FAX: 905.507.4230

-Kris Orr
TEL: 289.261.4104
FAX: 905.507.4230

Security Builder FIPS Core

Version 6.0
64-bit Intel Core i5-2300 w/ RedHat Linux 5.6; 32-bit Intel Core i7 w/ RedHat Linux 5.6; 32-bit Intel Pentium III w/ QNX 6.5; ARM Cortex A9 MPCore w/ QNX 6.6; Intel Core 2 Duo w/ Mac OS X 10.5; 32-bit Intel Core i5-2300 w/ Windows 7 9/20/2011 FFC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256   HMAC ) ) FC: SHA256   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#1571 DSA Val#563 RNG Val#949 DRBG Val#127

ECC: (FUNCTIONS INCLUDED IN IMPLEMENTATION: DPG   KPG   Key Regeneration ) SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA256   HMAC ) ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512 HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1571 ECDSA Val#242 RNG Val#949 DRBG Val#127
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#25.

"Security Builder FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules."

10/01/11: Update implementation information;
01/19/12: Added new tested information;

24 SafeNet, Inc.
20 Colonnade Road
Suite 200
Ottawa, ON K2E 7M6
Canada

-Chris Brych
TEL: 613-221-5081
FAX: 613-723-5079

-Laurie Smith
TEL: 613-221-5026
FAX: 613-723-5079

Luna G4

Version 4.8.7 (Firmware)
StrongARM-11 80200 600 MHz 9/6/2011

ECC: SCHEMES [ EphemeralUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: K-233   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: B-283   SHA256   SHA384   SHA512   HMAC ) ( ED: K-409   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( No_KC < KCRole(s): Initiator   Responder > ) ( EB: K-233   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: B-283   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1567 ECDSA Val#241 RNG Val#947
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#24.

"The Luna PCM/PCM KE/CA4 offer dedicated hardware key management to protect sensitive cryptographic keys from attack. Digital sign/verify operations are performed in the HSM to increase performance and maintain security. Cryptographic keys are backed up by a FIPS-approved algorithm and can be stored in software or replicated on one or more tokens."

23 SafeNet, Inc.
4690 Millennium Drive
Belcamp, MD 21017
USA

-Chris Brych
TEL: 613.221-5081
FAX: 613.723.5079

-Laurie Smith
TEL: 613.221-5026
FAX: 613.723.5079

Luna K6 Cryptographic Library

Version 6.2.1 (Firmware)
AMCC PowerPC 440EPx 8/3/2011

ECC: SCHEMES [ EphemeralUnified ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: P-224   SHA224   SHA256   SHA384   SHA512   HMAC ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1537 DRBG Val#114
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#23.

"The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor."

11/08/11: Update implementation information; 01/05/12: Correction made to the tested information;

22 SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131-2203
USA

-Jack Young
TEL: 408-392-0319
FAX: 408-392-9131

SPYRUS FIPS Sector-based Encryption Module

Version 03.00.0C (Firmware)
Part # 8800740013F
NXP LPC3131 6/16/2011

ECC: ASSURANCES < 5.5.2: #1 > < 5.6.2.1: #1 > < 5.6.2.3: #3 > < 5.6.3.1: #5 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1483 ECDSA Val#220 DRBG Val#104

"The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files."

06/27/11: Update implementation information;

21 SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131-2203
USA

-Jack Young
TEL: 408-392-0319
FAX: 408-392-9131

SPYRUS FIPS Sector-based Encryption Module

Version 03.00.0C (Firmware)
Part # 8800740012F
NXP LPC3131 6/16/2011

ECC: ASSURANCES < 5.5.2: #1 > < 5.6.2.1: #3 > < 5.6.2.1: #1 > < 5.6.2.3: #3 > < 5.6.3.1: #5 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1482 ECDSA Val#219 DRBG Val#103

"The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files."

06/27/11: Update implementation information;

20 SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131-2203
USA

-Jack Young
TEL: 408-392-0319
FAX: 408-392-9131

SPYRUS FIPS Sector-based Encryption Module

Version 03.00.0C (Firmware)
Part # 8800740010F
NXP LPC3131 6/16/2011

ECC: ASSURANCES < 5.5.2: #1 > < 5.6.2.1: #3 > < 5.6.2.1: #1 > < 5.6.2.3: #3 > < 5.6.3.1: #5 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1481 ECDSA Val#218 DRBG Val#102

"The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files."

06/27/11: Update implementation information;

19 SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131-2203
USA

-Jack Young
TEL: 408-392-0319
FAX: 408-392-9131

SPYRUS FIPS Sector-based Encryption Module

Version 03.00.0C (Firmware)
Part # 880074009F
NXP LPC3131 6/16/2011

ECC: ASSURANCES < 5.5.2: #1 > < 5.6.2.1: #3 > < 5.6.2.1: #1 > < 5.6.2.3: #3 > < 5.6.3.1: #5 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1474 ECDSA Val#217 DRBG Val#101

"The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files."

06/27/11: Update implementation information;

18 SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131-2203
USA

-Jack Young
TEL: 408-392-0319
FAX: 408-392-9131

SPYRUS FIPS Sector-based Encryption Module

Version 03.00.0C (Firmware)
Part # 880074007F
NXP LPC3131 6/16/2011

ECC: ASSURANCES < 5.5.2: #1 > < 5.6.2.1: #3 > < 5.6.2.1: #1 > < 5.6.2.3: #3 > < 5.6.3.1: #5 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1471 ECDSA Val#216 DRBG Val#100

"The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files."

06/27/11: Update implementation information;

17 SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131-2203
USA

-Jack Young
TEL: 408-392-0319
FAX: 408-392-9131

SPYRUS FIPS Sector-based Encryption Module

Version 03.00.0C (Firmware)
Part # 880074006F
NXP LPC3131 6/16/2011

ECC: ASSURANCES < 5.5.2: #1 > < 5.6.2.1: #3 > < 5.6.2.1: #1 > < 5.6.2.3: #3 > < 5.6.3.1: #5 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   HMAC ) ( ED: P-521   SHA384   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1468 ECDSA Val#215 DRBG Val#99

"The Spyrus FIPS Sector-based Encryption Module is a multifunctional USB security device combining security token and portable secure storage drive features with the strongest hardware-based encryption technology commercially available for protection of user data files."

06/27/11: Update implementation information;

16 Francotyp Postalia GmbH
Triftweg 21-26
Birkenwerder, 16547
Germany

-Dirk Rosenau
TEL: +49/3303/525/616
FAX: +49/3303/525/07/616

FP mCryptoLibrary - KAS

Version 1.1 (Firmware)
Maxim IC0400 6/16/2011 FFC: SCHEMES [ dhEphem ( KARole(s): Responder )
( FB: SHA256 ) ]
SHS Val#1346 DSA Val#522 DRBG Val#61

"The firmware implementation of the FPmCryptoLibrary, which runs on an embedded hardware module, with a Maxim IC0400 processor. The cryptographic algortihm implementation is used in context of security critical services."

15 N/A N/A N/A 6/7/2011 N/A
14 Certicom Corp.
5520 Explorer Drive., 4th Floor
Mississauga, Ontario L4W 5L1
Canada

-Atsushi Yamada
TEL: 905-501-3884
FAX: 905-508-4230

-Kris Orr
TEL: 605-501-3804
FAX: 908-507-4230

Security Builder® FIPS Core

Version 5.6
ARMv7 w/ QNX Neutrino 6.6 4/8/2011 FFC: ASSURANCES < 5.5.2: #1 , #3 > < 5.6.2.1: #1 , #3 > < 5.6.2.2: #1 > < 5.6.2.3: #1 > < 5.6.3.1: , #4 , #5 > < 5.6.3.2: #1 , #2 >
SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256   HMAC ) ) FC: SHA256   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#1422 DSA Val#500 RNG Val#863

ECC: ASSURANCES < 5.5.2: #3 > < 5.6.2.1: #1 , #3 > < 5.6.2.1: #1 > < 5.6.2.3: #1 > < 5.6.3.1: #4 #5 > < 5.6.3.2: #1   >
SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
SHS Val#1422 DSA Val#500 ECDSA Val#200 RNG Val#863 DRBG Val#82
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#14.

"Security Builder® FIPS Core provides application developpers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec SSL and DRM modules."

13 Research in Motion
295 Phillip Street
Waterloo, Ontario N2L 3W8
Canada

-Security Certifications Team
TEL: 519-888-7465 X72921
FAX: 519-888-9852

BlackBerry Tablet Cryptographic Library

Version 5.6
ARMv7 w/ BlackBerry Tablet OS 4/8/2011 FFC: ASSURANCES < 5.5.2: #1 , #3 > < 5.6.2.1: #1 , #3 > < 5.6.2.2: #1 > < 5.6.2.3: #1 > < 5.6.3.1: , #4 , #5 > < 5.6.3.2: #1 , #2 >
SCHEMES [ Hybrid1 ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256   HMAC ) ) FC: SHA256   HMAC ) ]
[ dhEphem ( KARole(s): Initiator / Responder )
( FB: SHA256 ) ( FC: SHA256 ) ]
[ dhHybirdOneFlow ( No_KC < KARole(s): Initiator Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ]
[ dhOneFlow ( KARole(s): Initiator / Responder ) ( FB: SHA256 ) ( FC: SHA256 ) ] [ dhStatic ( No_KC < KARole(s): Initiator / Responder > ) ( FB: SHA256 HMAC ) ( FC: SHA256   HMAC ) ] SHS Val#1421 DSA Val#499 RNG Val#862

ECC: ASSURANCES < 5.5.2: #3 > < 5.6.2.1: #1 , #3 > < 5.6.2.1: #1 > < 5.6.2.3: #1 > < 5.6.3.1: #4 #5 > < 5.6.3.2: #1   >
SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( EC: P-256   SHA256   SHA384   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( EB: ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EC: P-256   SHA256   SHA384   SHA512   HMAC ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
SHS Val#1421 DSA Val#499 RNG Val#862
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#13.

"The BlackBerry Tablet Cryptographic Library is the software module that provides advanced cryptographic functionality to BlackBerry Tablets."

12 Imation Corp.
Discovery Bldg. 1A-041
Oakdale, MN 55128
USA

-Larry Hamid
TEL: 408-737-4308

Bluefly Processor Firmware

Version 2.4 (Firmware)
Bluefly Processor 6/7/2011 FFC: SCHEMES [ dhEphem ( KARole(s): Responder )
( FC: SHA256 ) ]
SHS Val#1456 DSA Val#519 RNG Val#884

"The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals."

04/23/12: Updated vendor information;

11 Imation Corp.
Discovery Bldg. 1A-041
Oakdale, MN 55128
USA

-Larry Hamid
TEL: 408-737-4308

Bluefly Processor Firmware

Version 2.3 (Firmware)
Bluefly Processor 2/24/2011 FFC: ASSURANCES < 5.5.2: #3 > < 5.6.2.3: #1 >
SCHEMES [ dhEphem ( KARole(s): Responder )
( FC: SHA256 ) ]
SHS Val#1394 DSA Val#485 RNG Val#848

"The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals."

04/23/12: Updated vendor information;

10 Fortress Technologies, Inc.
1 Technology Park Drive
Westford, MA 01886
USA

-Cerification Director
TEL: 978-923-6400
FAX: 978-923-6498

Fortress KAS Implementation

Version 1.0 (Firmware)
AMD Alchemy MIPS Processor 12/6/2010 FFC: SCHEMES [ dhEphem ( KARole(s): Initiator / Responder )
( FC: SHA256 ) ]
SHS Val#1357 DRBG Val#66

ECC: SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ( ED: P-384   SHA384   HMAC ) ) ]
SHS Val#1357 DRBG Val#66

"Fortress KAS Implementation version 1.0 from Fortress Technologies, Inc."

9 Imation Corp.
Discovery Bldg. 1A-041
Oakdale, MN 55128
USA

-Larry Hamid
TEL: 408-737-4308

Bluefly Processor Firmware

Version 2.2 (Firmware)
Bluefly Processor 8/30/2010 FFC: ASSURANCES < 5.5.2: #3 > < 5.6.2.3: #1 >
SCHEMES [ dhEphem ( KARole(s): Responder )
( FC: SHA256 ) ]
SHS Val#1315 RNG Val#795

"The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals."

04/23/12: Updated vendor information;

8 Certicom Corp.
5520 Explorer Drive., 4th Floor
Mississauga, Ontario L4W 5L1
Canada

-Rob Williams
TEL: 289-261-4187
FAX: 905-507-4230

-Atsushi Yamada
TEL: 289-261-4184
FAX: 905-507-4230

Security Builder GSE-J Crypto Core

Version 2.8
Intel Pentium D w/ Red Hat Enterprise Linux AS 5.5 with SUN JRE 1.5.0; Intel Pentium D w/ Red Hat Enterprise Linux AS 5.5 with SUN JRE 1.6.0; Intel Xeon w/ Red Hat Enterprise Linux AS 5.5 x64 with SUN JRE 1.5.0; Intel Xeon w/ Red Hat Enterprise Linux AS 5.5 x64 with SUN JRE 1.6.0; SPARC v9 w/ Sun Solaris 10 (32-bit) with SUN JRE 1.5.0; SPARC v9 w/ Sun Solaris 10 (32-bit) with SUN JRE 1.6.0; SPARC v9 w/ Sun Solaris 10 (64-bit) with SUN JRE 1.5.0; SPARC v9 w/ Sun Solaris 10 (64-bit) with SUN JRE 1.6.0; Intel Xeon w/ MS-Windows Vista SP2 (32-bit) with SUN JRE 1.5.0; Intel Xeon w/ MS-Windows Vista SP2 (32-bit) with SUN JRE 1.6.0; Intel Xeon w/ MS-Windows Vista SP2 (64-bit) with SUN JRE 1.5.0; Intel Xeon w/ MS-Windows Vista SP2 (64-bit) with SUN JRE 1.6.0; Intel Xeon w/ MS-Windows 2008 Server SP2 (64-bit) with JRE 1.5.0; Intel Xeon w/ MS-Windows 2008 Server SP2 (64-bit) with JRE 1.6.0 6/30/2010 FFC: ASSURANCES < 5.5.2: #2 > < 5.6.2.1: #1 , #3 > < 5.6.2.2: #1 > < 5.6.2.3: #1 >
SCHEMES SHS Val#1281 DSA Val#455 RNG Val#773 DRBG Val#52

ECC: ASSURANCES < 5.5.2: #2 > < 5.6.2.1: #1 , #3 > < 5.6.2.1: #1 > < 5.6.2.3: #1 >
SCHEMES [ FullUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   CCM ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ FullMQV ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512 CCM ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ EphemeralUnified ( EB: P-224   SHA224   SHA256   SHA384   SHA512   CCM ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521 HMAC (SHA512, HMAC_SHA512) ) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassMQV ( No_KC < KARole(s): Initiator   Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   CCM ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassDH ( EB: P-224   SHA224   SHA256   SHA384   SHA512   CCM ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-521   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ OnePassUnified ( No_KC < KARole(s) Initiator / Responder > ) ( EB: P-224   SHA224   SHA256   SHA384   SHA512   P-224 ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
[ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EB: P-192   SHA224   SHA256   SHA384   SHA512   CCM ) ( EC: P-256   SHA256   SHA384   SHA512   CCM ) ( ED: P-384   SHA384   SHA512   HMAC ) ( EE: P-521   HMAC (SHA512, HMAC_SHA512) ) ]
SHS Val#1281 DSA Val#455 ECDSA Val#179 RNG Val#773 DRBG Val#52
Some of the previously validated components for this validation have been removed because they are now non-compliant per the SP800-131A transition. See Historical KAS List Val#8.

"Java cryptographic toolkit."

10/12/10: Update vendor information;
08/30/11: Update implementation information;

7 Imation Corp.
Discovery Bldg. 1A-041
Oakdale, MN 55128
USA

-Larry Hamid
TEL: 408-737-4308

Bluefly Processor Firmware

Version 2.1 (Firmware)
Bluefly Processor 4/26/2010 FFC: ASSURANCES < 5.5.2: #3 > < 5.6.2.3: #1 >
SCHEMES [ dhEphem ( KARole(s): Responder )
( FC: SHA256 ) ]
SHS Val#1220 RNG Val#735

"The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals."

04/23/12: Updated vendor information;

6 Imation Corp.
Discovery Bldg. 1A-041
Oakdale, MN 55128
USA

-Larry Hamid
TEL: 408-737-4308

Bluefly Processor Firmware

Version 2.0 (Firmware)
Bluefly Processor 3/17/2010 FFC: ASSURANCES < 5.5.2: #3 > < 5.6.2.3: #1 >
SCHEMES [ dhEphem ( KARole(s): Responder )
( FC: SHA256 ) ]
SHS Val#1186 RNG Val#720

"The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals."

5 Cavium Networks
805 E Middlefield Road
Mountain View, CA 94109
USA

-TA Ramanujam
TEL: 650-623-7039
FAX: 650-625-9751

NITROX XL CN16XX-NFBE

Version 1.0 (Firmware)
Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX Security Processor 1/7/2010

ECC: ASSURANCES < 5.5.2: #3 > < 5.6.2.1: #3 > < 5.6.2.1: #1 > < 5.6.3.1: #5 >
SCHEMES [ StaticUnified ( No_KC < KARole(s): Initiator / Responder > ) ( EE: P-521 (SHA512, HMAC_SHA512) ) ]
SHS Val#1165 DRBG Val#32

"NITROX XL CN16XX-NFBE HSM (Hardware Security Module) Adapter family."

4 Renesas Technology America, Inc.
450 Holger Way
San Jose, CA 95134
USA

-Murthy Vedula
TEL: 408-382-7615
FAX: 408-382-7700

Auth_ffc

Version BOS_AE57C1_v_2.1_1012 (Firmware)
Part # AE57C1, Version 19
Renesas AE57C1 10/9/2009 FFC: ASSURANCES < 5.5.2: #3 > < 5.6.2.1: #1 , #4 > < 5.6.2.2: #1 , #3 > < 5.6.3.1: , #4 >
SCHEMES [ dhStatic ( KC < KCRole(s): Recipient > < KCType(s): Unilateral > < KARole(s): Responder > ) ( FC: SHA256   HMAC ) ] SHS Val#982 RNG Val#585

"Renesas BOS software development framework is a mask ROM used for prototyping and mass production of embedded smart chip systems based on AE4XC/AE5XC/N2xx devices. BOS provides authentication and secure program download mechanism. Users can develop embedded applications using the BOS cryptographic, communication, and OS application interfaces."

3 Pitney Bowes, Inc.
35 Waterview Drive
Shelton, CT 06484-8000
USA

-Robert Sisson
TEL: 203-924-3061
FAX: 203-924-3518

appKAS

Version 01.00.0004 (Firmware)
Sigma ASIC 8/17/2009

ECC: ASSURANCES < 5.5.2: #3 > < 5.6.2.3: #4 >
SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ) ]
SHS Val#650 DRBG Val#20

"The Pitney Bowes Cygnus X-3 Postal Security Device (PSD) is designed in compliance with FIPS 140-2 and IPMAR standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products."

2 Memory Experts International Inc.
227 Montcalm
Suite 101 & 202
Gatineau, Quebec J8Y 3B9
Canada

-Larry Hamid
TEL: 819-595-3069
FAX: 819-595-3353

Bluefly Processor Firmware

Version 1.3 (Firmware)
Bluefly Processor 6/26/2009 FFC: ASSURANCES < 5.5.2: #3 > < 5.6.2.3: #1 >
SCHEMES [ dhEphem ( KARole(s): Responder )
( FC: SHA256 ) ]
SHS Val#1042 RNG Val#622

"The Bluefly processor is a cryptographic and authentication engine for Personal Portable Security Devices (PPSDs). It provides secure storage, digital identity functions, and multifactor user authentication for USB-based peripherals."

1 Pitney Bowes, Inc.
35 Waterview Drive
Shelton, CT 06484-8000
USA

-Robert Sisson
TEL: 203-924-3061
FAX: 203-924-3518

Sigma ASIC - PSDApp

Version 03.00.0049 (Firmware)
Sigma ASIC 5/28/2009

ECC: SCHEMES [ EphemeralUnified ( EC: P-256   SHA256   HMAC ) ) ]
SHS Val#650 DRBG Val#13

"The Pitney Bowes Cygnus X-3 Postal Security Device (PSD) is designed in compliance with FIPS 140-2 and IPMAR standards to support the USPS IBIP and international digital indicia standards globally. The PSD employs strong cryptographic and physical security techniques for the protection of customer funds in Pitney Bowes Postage Metering products."


Need Assistance?

Computer Security Division
National Institute of Standards and Technology