CMVP Main Page

Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules

Historical, 1995-1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017
All

Last Updated: 7/20/2017

It is important to note that the items on this list are cryptographic modules. A module may either be an embedded component of a product or application, or a complete product in-and-of-itself. If the cryptographic module is a component of a larger product or application, one should contact the product or application vendor in order to determine how the product utilizes the embedded validated cryptographic module. There may be a larger number of security products or applications available which use an embedded validated cryptographic module, than the number of modules which are found in this list. In addition, other vendors, who are not found in this list, may incorporate a validated cryptographic module from this list embedded into their own products.

When selecting a module from a vendor, verify that the module is either the product or application itself (e.g. VPN, SmartCard, USB memory token, etc.) or the module is embedded in a larger product or application (e.g. toolkit, etc.). If the module is embedded in a product or application, ask the product or application vendor to provide a signed letter or statement affirming that the unmodified validated cryptographic module is integrated in the solution; the module provides all the cryptographic services in the solution; and provide reference to the modules validation certificate number from this listing.

NOTE1: Module descriptions are provided by the module vendors and have not been verified for accuracy by the CMVP. The descriptions do not imply endorsement by the U.S. or Canadian Governments or NIST. Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. The algorithms, protocols, and cryptographic functions listed as "Other" or "Allowed" have not been tested through the CMVP and are not FIPS-Approved.

NOTE2: The operator of a cryptographic module is responsible for ensuring that the algorithms and key lengths are in compliance with the requirements of NIST SP 800-131A.

NOTE3: All questions regarding the implementation and/or use of any module located on the CMVP module validation lists should first be directed to the appropriate vendor point-of-contact (listed for each entry).

Please contact the CMVP if any errors are discovered or comments with suggestions for improvement of the validation listings.

Cert#Vendor / CST LabCryptographic ModuleModule
Type
Validation
Date
Sunset
Date
Level / Description
2966Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Loren Shade
TEL: 978-264-6600

CST Lab: NVLAP 200928-0
Allegro Cryptographic Engine
(Software Version: 6.2)
(When installed, initialized and configured as specified in Section 3 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software07/20/20177/19/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Windows 10 running on a Microsoft Surface Pro 4 with PAA
Windows 10 running on a Microsoft Surface Pro 4 without PAA
Linux Mint 18 Cinnamon running on an Intel NUC System with PAA
Linux Mint 18 Cinnamon running on an Intel NUC System without PAA (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4121); CKG (vendor affirmed); CVL (Certs. #927 and #1074); DRBG (Cert. #1241); DSA (Cert. #1116); ECDSA (Cert. #936); HMAC (Cert. #2692); KTS (AES Cert. #4121, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Cert. #2227); SHS (Cert. #3390); SHA-3 (Cert. #8); Triple-DES (Cert. #2251)

-Allowed algorithms: Diffie-Hellman (CVL Cert. #927, key agreement; key establishment methodology provides 112 or 128 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #927, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); MD5; NDRNG
Multi-Chip Stand Alone

"Allegro’s suite of Embedded Device Security toolkits makes embedding standards-based security protocols into resource sensitive embedded systems and consumer electronics fast, easy and reliable. The Allegro Cryptographic Engine (ACE) is a cryptographic library module specifically engineered for embedded devices. The module provides embedded systems developers with an easily understood software interface to enable bulk encryption and decryption, message digests, digital signature creation and validation and key generation and exchange. For full details see www.allegrosoft.com/ace."
2965Dolby Laboratories, Inc.
1275 Market Street
San Francisco, CA 94103
USA

Jean-Philippe Viollet
TEL: 818-524-2956
FAX: N/A

CST Lab: NVLAP 200802-0
IMS3-SM
(Hardware Versions: IMS3-41 [A], IMS3-42 [A] and IMS3-43 [A]; Firmware Versions: (1.2.9-0, 1.2.9-3 and 1.2.4-0) [A])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware07/19/20177/18/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Physical Security: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4418, #4419 and #4421); CKG (vendor affirmed); DRBG (Cert. #1427); HMAC (Cert. #2934); KTS (AES Cert. #4421); RSA (Cert. #2407); SHS (Cert. #3639)

-Allowed algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Embedded

"The IMS3-SM is the module that contains the Security Manager present in the Dolby Laboratories, Inc. IMS3000 (for hardware models IMS3-41, IMS3-42, IMS3-43) that can be hosted inside D-Cinema DLP projectors. It supports highest JPEG-2000 decoding capabilities and accepts alternative content as well."
2964Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley

CST Lab: NVLAP 201029-0
BoringCrypto
(Software Version: 24e5886c0edfc409c8083d10f9f1120111efd6f5)
(When installed, initialized and configured as specified in Section 12.1 of the Security Policy and operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/19/20177/18/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Ubuntu Linux 14.04 LTS running on Intel Xeon E5 without PAA (clang Compiler Version 4.0.0)
Ubuntu Linux 16.04 running on Intel Xeon E5 with PAA (clang Compiler Version 4.0.0)
Ubuntu Linux 15.04 running on POWER8 without PAA (clang Compiler Version 4.0.0)
Ubuntu Linux 17.04 running on POWER8 with PAA (clang Compiler Version 4.0.0)
Ubuntu Linux 17.04 running on POWER9 with PAA (clang Compiler Version 4.0.0) (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4558); CVL (Cert. #1240); DRBG (Cert. #1507); ECDSA (Cert. #1112); HMAC (Cert. #3011); KTS (AES Cert. #4558; key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (Cert. #2485); SHS (Cert. #3736); Triple-DES (Cert. #2428)

-Allowed algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Multi-Chip Stand Alone

"A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications."
2963HGST, a Western Digital company
5601 Great Oaks Parkway
San Jose, CA 95119
USA

Michael Williamson
TEL: 408-717-8458
FAX: 408-717-9494

Jithendra Bethur
TEL: 408-717-5951
FAX: 408-717-9494

CST Lab: NVLAP 100432-0
HGST Ultrastar® He¹² TCG Enterprise HDD
(Hardware Versions: P/Ns HUH721212AL5205 (0001) and HUH721212AL4205 (0001); Firmware Version: R39C)
(When operated in FIPS mode, installed, initialized and configured asspecified in Sections 2.1 and 7.2 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware07/18/20177/17/2022Overall Level: 2

-EMI/EMC: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3880 and #3881); DRBG (Cert. #1108); HMAC (Cert. #2522); PBKDF (vendor affirmed); RSA (Cert. #1978); SHS (Certs. #3203 and #3204)

-Allowed algorithms: NDRNG
Multi-Chip Embedded

"HGST self-encrypting Ultrastar® He¹² TCG Enterprise Hard-Disk drives meet or exceed the most demanding performance and security requirements. The Ultrastar He¹² TCG is based on fourth-generation HelioSeal® technology, uses PMR technology and is the industry's first 12TB drive that is drop-in ready for any enterprise-capacity application or environment. Targeted at 2.5M hours MTBF, the Ultrastar He¹² TCG provides the highest reliability rating available of all HDDs on the market today by building on the successful design of its 10TB, 8TB and 6TB predecessors."
2962Canonical Ltd.
5th floor, Blue Fin Building
110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten

Andrew Cloke

CST Lab: NVLAP 200658-0
Ubuntu Kernel Crypto API Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/18/20177/17/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB without PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR with PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR without PAA
Ubuntu 16.04 LTS 64-bit running on IBM z13 with PAI
Ubuntu 16.04 LTS 64-bit running on IBM z13 without PAI (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4478, #4479, #4480, #4481, #4482, #4483, #4484, #4485, #4486, #4487, #4488, #4489, #4490, #4491, #4492, #4493, #4494, #4495, #4496, #4497, #4498, #4500, #4501, #4502, #4503, #4504, #4505, #4506 and #4507); DRBG (Certs. #1457, #1458, #1459, #1460, #1461, #1462, #1463, #1464, #1465, #1466, #1467, #1469 and #1470); HMAC (Certs. #2970, #2971, #2972, #2973, #2974, #2975, #2976 and #2977); KTS (AES Certs. #4478, #4481, #4484, #4489, #4492, #4498 and #4502; key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (Certs. #2447, #2448, #2449, #2450, #2451, #2452, #2453 and #2454); SHS (Certs. #3687, #3688, #3689, #3690, #3691, #3692, #3693, #3694 and #3695); Triple-DES (Certs. #2401, #2402, #2403, #2404, #2405, #2406 and #2407)

-Allowed algorithms: NDRNG
Multi-Chip Stand Alone

"Ubuntu Kernel Crypto API module is a software module running as part of the operating system kernel that provides general purpose cryptographic services."
2961128 Technology
200 Summit Drive
Burlington, MA 01803
USA

Patrick Melampy
TEL: N/A
FAX: N/A

Prashant Kumar
TEL: N/A
FAX: N/A

CST Lab: NVLAP 201029-0
128 Technology Cryptographic Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/18/20172/4/2021Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755
CentOS 6.3 on a Dell OptiPlex 755
Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Allowed algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Multi-Chip Stand Alone

"The 128T Networking Platform is a software-based, distributed routing and network services solution. The 128T Networking Platform uses Secure Vector Routing to simplify network architectures and provide fine-grained, end-to-end control and visibility. 128T runs on general-purpose computer and allows a wide range of deployment models - from remote branch offices to high-capacity network edges to hyper-scale data centers. The platform enables greater security and agility by distributing intelligence throughout the network - without disrupting your existing network infrastructure. The 128 Tech"
2960Cisco Systems, Inc.
170 W Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco Firepower Cryptographic Module
(Firmware Version: 6.1)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Firmware07/17/20177/16/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): [Cisco ASA 5506-X, Cisco ASA 5506H-X, Cisco ASA 5506W-X, Cisco ASA 5508-X, Cisco ASA 5516-X, Cisco ASA 5512-X, Cisco ASA 5515-X, Cisco ASA 5525-X, Cisco ASA 5545-X, Cisco ASA 5555-X] with Fire Linux OS 6.1

-FIPS Approved algorithms: AES (Cert. #4266); CVL (Cert. #1008); DRBG (Cert. #1337); ECDSA (Cert. #995); HMAC (Cert. #2811); RSA (Cert. #2297); SHS (Cert. #3512); Triple-DES (Cert. #2307)

-Allowed algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"The module is designed to help you handle network traffic in a way that complies with your organization's security policy for protecting your network. The system can affect the flow of traffic using access control, which allows you to specify, in a granular fashion, how to handle the traffic entering, exiting, and traversing your network. All the information gathered from it can be used to filter and control that traffic."
2959Infineon Technologies AG
Am Campeon 1-12
Neubiberg, BY 85579
Germany

Roland Ebrecht
TEL: +49-821-25851-68
FAX: +49-821-25851-40

Thomas Hoffmann
TEL: +49-821-25851-24
FAX: +49-821-25851-40

CST Lab: NVLAP 100432-0
Trusted Platform Module 2.0 SLB 9660/SLB 9665/SLB 9670
(Hardware Versions: P/Ns SLB 9660 (Package PG-TSSOP-28-2 or PG-VQFN-32-13) [1], SLB 9665 (Package PG-TSSOP-28-2 or PG-VQFN-32-13) [1] and SLB 9670 (Package PG-VQFN-32-13) [2]; Firmware Version: 5.80 [1] or 7.80 [2])
(When operated in FIPS mode as specified in Security Policy Sections 1.1 and 8.1)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware07/17/20177/16/2022Overall Level: 2

-EMI/EMC: Level 3
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4318 and #4319); CKG (vendor affirmed); CVL (Certs. #1030, #1032, #1033 and #1035); DRBG (Certs. #1374 and #1375); ECDSA (Certs. #1020 and #1021); HMAC (Certs. #2851 and #2852); KAS (Certs. #105 and #106); KBKDF (Certs. #117 and #118); KTS (AES Certs. #4318 and #4319 and HMAC Certs. #2851 and #2852; key establishment methodology provides 128 bits of encryption strength); KTS (vendor affirmed); RSA (Certs. #2332 and #2333); SHS (Certs. #3554 and #3555)

-Allowed algorithms: NDRNG
Single Chip

"The TPM is a single chip module that provides computer manufacturers with the core components of a subsystem used to assure authenticity, integrity and confidentiality in e-commerce and internet communications within a Trusted Computing Platform. The TPM is a complete solution implementing the Trusted Platform Module Library Specification, Family "2.0", Level 00, Revision 01.16, October 2014 (ISO/IEC 11889:2015, Parts 1-4). See http://www.trustedcomputinggroup.org/ for further information on TCG and TPM."
2958UTC Fire & Security Americas Corporation, Inc.
1212 Pittsford-Victor Road
Pittsford, NY 14534
USA

Michael O'Brien
TEL: 585-267-8345
FAX: 585-248-9185

Robert Pethick
TEL: 585-267-8046
FAX: 585-248-9185

CST Lab: NVLAP 100432-0
Lenel OnGuard Access Control Cryptographic Module
(Software Version: 7.3.345.54)
(When operated in FIPS mode with [(Windows 10 Cryptographic Primitives Library (BCRYPT) validated to FIPS 140-2 under Cert. #2606 operating in FIPS mode), (Windows Server 2012 R2 and Windows 8.1 Cryptographic Primitives Library (BCRYPT) validated to FIPS 140-2 under Cert. #2357 operating in FIPS mode), or (Windows 8 and Windows Server 2012 Cryptographic Primitives Library (BCRYPT) validated to FIPS 140-2 under Cert. #1892 operating in FIPS mode)])

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software07/13/20177/12/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Intel i7-6700 w/ Microsoft Windows 8.1 64-bit on Vmware ESXi 6.0
Intel i7-6700 w/ Microsoft Windows 8 64-bit on Vmware ESXi 6.0
Intel i7-6700 w/ Microsoft Windows Server 2012 64-bit on Vmware ESXi 6.0
Intel i7-6700 w/ Microsoft Windows Server 2012 R2 64-bit on Vmware ESXi 6.0
Intel i7-6700 w/ Microsoft Windows 10 64-bit on Vmware ESXi 6.0 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #2197, #2832, #3497 and #4149); DRBG (Certs. #258, #489 and #868); RSA (Certs. #1134, #1493 and #1783); SHS (Certs. #1903, #2373 and #2886)

-Allowed algorithms: AES (Cert. #4149, key wrapping; key establishment methodology provides 128 bits of encryption strength)
Multi-Chip Stand Alone

"The Lenel OnGuard Access Control Cryptographic Module's primary purpose is to provide secure communications with external access control devices. The module is part of the Lenel's advanced access control and alarm monitoring system which is built on an open architecture platform and offers unlimited scalability, database segmentation, fault tolerance, and biometrics and smart card support. The Lenel advanced access control and alarm monitoring system is fully customizable, and can be seamlessly integrated into the OnGuard total security solution."
2957Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Gokul Karthik Balaswamy
TEL: 425-706-8583
FAX: 425-708-0107

Christine Ahonen
TEL: 425-706-8675
FAX: 425-936-7329

CST Lab: NVLAP 200427-0
Microsoft Corporation Windows Embedded Compact Enhanced Cryptographic Provider 7.00.2872 and Microsoft Corporation Windows Embedded Compact Enhanced Cryptographic Provider 8.00.6246
(Software Versions: 7.00.2872 [1] and 8.00.6246 [2])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/12/20177/11/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Windows Embedded Compact 7 (MIPS II) running on a Sigma Designs Vantage 8654 Development Kit [1]
Windows Embedded Compact 7 (MIPS II FP) running on a Sigma Designs Vantage 8654 Development Kit [1]
Windows Embedded Compact 7 (ARMv7) running on a TI OMAP TMDSEVM3530 [1]
Windows Embedded Compact 7 (ARMv6) running on a Samsung SMDK6410 Development Kit [1]
Windows Embedded Compact 7 (ARMv5) running on a Freescale i.MX27 Development Kit [1]
Windows Embedded Compact 2013 (x86) running on an eBox-330-A [2]
Windows Embedded Compact 2013 (ARMv7) running on a TI TMDSEVM3730 [2] (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4433 and #4434); CKG (vendor affirmed); DRBG (Certs. #1432 and #1433); HMAC (Certs. #2945 and #2946); RSA (Certs. #2414 and #2415); SHS (Certs. #3651 and #3652); Triple-DES (Certs. #2383 and #2384)

-Allowed algorithms: HMAC-MD5; MD5; NDRNG
Multi-Chip Stand Alone

"Microsoft Windows CE and Windows Mobile Enhanced Cryptographic Provider (RSAENH) is a general-purpose, software-based, cryptographic module for Windows CE and Windows Mobile. It can be dynamically linked into applications by software developers to permit the use of general-purpose cryptography."
2956Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Gokul Karthik Balaswamy
TEL: 425-706-8583
FAX: 425-708-0107

Christine Ahonen
TEL: 425-706-8675
FAX: 425-936-7329

CST Lab: NVLAP 200427-0
Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)
(Software Versions: 7.00.2872 [1] and 8.00.6246 [2])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/11/20177/10/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Windows Embedded Compact 7 (MIPS II) running on a Sigma Designs Vantage 8654 Development Kit [1]
Windows Embedded Compact 7 (MIPS II FP) running on a Sigma Designs Vantage 8654 Development Kit [1]
Windows Embedded Compact 7 (ARMv7) running on a TI OMAP TMDSEVM3530 [1]
Windows Embedded Compact 7 (ARMv6) running on a Samsung SMDK6410 Development Kit [1]
Windows Embedded Compact 7 (ARMv5) running on a Freescale i.MX27 Development Kit [1]
Windows Embedded Compact 2013 (x86) running on an eBox-330-A [2]
Windows Embedded Compact 2013 (ARMv7) running on a TI TMDSEVM3730 [2] (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4430 and #4431); CKG (vendor affirmed); CVL (Certs. #1139 and #1140); DRBG (Certs. #1429 and #1430); DSA (Certs. #1187 and #1188); ECDSA (Certs. #1072 and #1073); HMAC (Certs. #2942 and #2943); KAS (Certs. #114 and #115); RSA (Certs. #2411 and #2412); SHS (Certs. #3648 and #3649); Triple-DES (Certs. #2381 and #2382)

-Allowed algorithms: MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength)
Multi-Chip Stand Alone

"The Microsoft Windows Cryptographic Primitives Library is a general purpose, software-based, cryptographic module. The primitive provider functionality is offered through one cryptographic module, BCRYPT.DLL (versions 7.00.2872 and 8.00.6246), subject to FIPS 140-2 validation. BCRYPT.DLL provides cryptographic services, through its documented interfaces, to Windows Embedded Compact 7 and 2013 components and applications running on Windows Embedded Compact 7 and 2013."
2955Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Rick Stanley
TEL: 603-315-7746
FAX: 978-264-5522

CST Lab: NVLAP 200427-0
HPE FlexNetwork 7500 and HPE FlexFabric 7900 and 12904 Switch Series
(Hardware Versions: HPE FlexNetwork 7502 Switch Chassis (JD242C) with (JH208A) [1], HPE FlexNetwork 7503 Switch Chassis (JD240C) with (JH207A) [1], HPE FlexNetwork 7503 Switch with 2x2.4Tbps Fabric and Main Processing Unit Bundle (JH331A) with (JH209A) [1], HPE FlexNetwork 7506 Switch Chassis (JD239C) with (JH207A) [1], HPE FlexNetwork 7506 Switch with 2x2.4Tbps Fabric and Main Processing Unit Bundle (JH332A) with (JH209A) [1], HPE FlexNetwork 7510 Switch Chassis (JD238C) with (JH207A) [1], HPE FlexNetwork 7510 Switch with 2x2.4Tbps Fabric and Main Processing Unit Bundle (JH333A) with (JH209A) [1], HPE FlexFabric 7904 Switch Chassis (JG682A) with (JG683B) [2], HPE FlexFabric 7910 Switch Chassis (JG841A) with (JH001A or JG842A) and (JG683B) [2], HPE FlexFabric 12904E Switch AC Chassis (JH262A) with (JH263A) [3];; Firmware Versions: HPE Comware 7.1.045, Release R7179 [1], HPE Comware 7.1.045, Release R2150 [2], HPE Comware 7.1.045, Release R1150 [3])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware07/11/20177/10/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4090, #4092, #4095 and #4097); CKG (vendor affirmed); CVL (Certs. #905, #906, #909 and #910); DRBG (Certs. #1228 and #1230); DSA (Certs. #1111 and #1113); ECDSA (Certs. #924 and #926); HMAC (Certs. #2670, #2672, #2675 and #2677); RSA (Certs. #2214 and #2216); SHS (Certs. #3366, #3368, #3371 and #3373)

-Allowed algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #905 and #909, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG
Multi-Chip Stand Alone

"The HPE Networking devices are suitable for a range of uses: at the edge of a network, connecting server clusters in a data center, in an enterprise LAN core, and in large-scale industrial networks and campus networks. Each device is based on the HPE Comware Software, Version 7.1.045 platform."
2954Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Rick Stanley
TEL: 603-315-7746
FAX: 978-264-5522

CST Lab: NVLAP 200427-0
HPE FlexNetwork MSR1000, MSR2000, MSR3000 and MSR4000 Router Series
(Hardware Versions: {HPE FlexNetwork MSR1002-4 Router (JG875A) with (JD574B, JD573B, and JD559A) or with (JD573B and JD559A) and opacity shield JG598A, HPE FlexNetwork MSR1003-8S AC Router (JH060A) with (JD560A, JD559A, and JD576A) and opacity shield JG598A, HPE FlexNetwork MSR2003 AC Router (JG411A) with (JD558A and JD574B) or with (JD559A, JD576A, and JF821A) and opacity shield JG598A, HPE FlexNetwork MSR2003 TAA-compliant AC Router (JG866A) with (JD558A and JD574B) or with (JD559A, JD576A, and JF821A) and opacity shield JG598A, HPE FlexNetwork MSR2004-24 AC Router (JG734A) with (JD560A, JD559A, JF821A, and JD576A) and opacity shield JG598A, HPE FlexNetwork MSR2004-48 Router (JG735A) with (JD560A, JD559A, JF821A, and JD576A) and opacity shield JG598A, HPE FlexNetwork MSR3012 AC Router (JG409A) with (JG604A, JF281A, and JG430A) and opacity shield JG599A, HPE FlexNetwork MSR3044 Router (JG405A) with (JD559A, JD560A, JD561A, JG438A, JG442A, JG443A, and JG447A) and opacity shield JG600A, HPE FlexNetwork MSR3064 Router (JG404A) with (JG604A, JF281A, JG211A, JG737A, JG430A, JG447A, JD624A, JG415A, JD613A, JG457A, and JG435A) and opacity shield JG601A, HPE FlexNetwork MSR4060 Router Chassis (JG403A) with JG869A and (JG415A, JF254B, JG435A, and JG447A) and opacity shield JG602A, HPE FlexNetwork MSR4080 Router Chassis (JG402A) with JG869A and (JF841A, JG416A, JF841A, JG415A, JF254B, JC160A, JC159A, and JF837A) and opacity shield JG603A} with tamper evidence labels: JG585A or JG586A; Firmware Version: HPE Comware 7.1.045 Release R0305P08)
(When operated in FIPS mode with tamper labels installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware07/11/20177/10/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4091, #4094 and #4096); CKG (vendor affirmed); CVL (Certs. #907 and #908); DRBG (Cert. #1229); DSA (Cert. #1112); ECDSA (Cert. #925); HMAC (Certs. #2671, #2674 and #2676); RSA (Cert. #2215); SHS (Certs. #3367, #3370 and #3372)

-Allowed algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #907, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG
Multi-Chip Stand Alone

"The HPE Networking devices are suitable for a range of uses: at the edge of a network, connecting server clusters in a data center, in an enterprise LAN core, and in large-scale industrial networks and campus networks. Each device is based on the HPE Comware Software, Version 7.1.045 platform."
2953Attivo Networks Inc.
47697 Westinghouse Drive,
Suite 201
Fremont, CA
USA

Satya Das
TEL: 510-623-1000

CST Lab: NVLAP 200968-0
Attivo Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/07/20171/29/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Mac OS X El Capitan 10.11.3 running on an Intel Core i5 1.4GHz system with PAA
CentOS 6.5 on VMware ESXi 6.0.0 running on an Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA
CentOS 6.5 on CentOS 6.5 – KVM running on an Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA
Ubuntu 12.04 LTS on VMware ESXi 6.0.0 running on an Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA
Windows Server 2008 SP2 (32 bit) on CentOS 6.5 – KVM running on and Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA
Ubuntu 12.04 LTS on CentOS 6.5 – KVM running on an Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA
Windows Server 2008 SP2 32-bit on VMware ESXi 6.0.0 running on an Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz system with PAA
Windows 7 Professional 64-bit on VMware ESXi 6.0.0 running on an Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA
Windows 7 Professional 64-bit on CentOS 6.5 – KVM running on an Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz system with PAA (single-user mode)

-FIPS Approved algorithms: AES (Cert. #3983); CVL (Cert. #812); DRBG (Cert. #1176); DSA (Cert. #1083); ECDSA (Cert. #881); HMAC (Cert. #2599); RSA (Cert. #2044); SHS (Cert. #3288); Triple-DES (Cert. #2186)

-Allowed algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Multi-Chip Stand Alone

"Attivo Cryptographic Module is a component of Attivo Networks’ products such as the Attivo Central Manager 200, BOTsink 3200, and BOTsink 5100. These products constitute the Attivo ThreatMatrix Deception and Response Platform which detects stolen credentials, ransomware, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving attackers into revealing themselves. The detections along with comprehensive attack analysis and actionable alerts empower accelerated incident response."
2952Singlewire Software
Singlewire Software
Madison, WI 53717
USA

Sales
TEL: N/A
FAX: N/A

N/A
TEL: N/A
FAX: N/A

CST Lab: NVLAP 201029-0
InformaCast Java Crypto Library
(Software Version: 3.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2804)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software07/07/201712/7/2021Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): Java SE Runtime Environment v8 (1.8.0) on Centos 6.4 on vSphere 6 running on a Cisco UCSB-B200-M4 Blade (single-user mode)

-FIPS Approved algorithms: AES (Cert. #3756); CVL (Certs. #704, #705 and #706); DRBG (Cert. #1031); DSA (Cert. #1043); ECDSA (Cert. #804); HMAC (Cert. #2458); KAS (Cert. #73); KAS (SP 800-56Arev2, vendor affirmed); KBKDF (Cert. #78); KTS (vendor affirmed); KTS (AES Cert. #3756; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #2090; key establishment methodology provides 112 bits of encryption strength); PBKDF (vendor affirmed); RSA (Cert. #1932); SHA-3 (Cert. #3); SHS (Cert. #3126); Triple-DES (Cert. #2090)

-Allowed algorithms: Diffie-Hellman (CVL Cert. #704, key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)
Multi-Chip Stand Alone

"InformaCast transforms devices on your network into a powerful system for IP paging and emergency alerting. InformaCast contains Java libraries that feature robust FIPS 140-2 validated algorithm support."
2951Singlewire Software
1002 Deming Way
Madison, WI 53717
USA

Sales
TEL: N/A
FAX: N/A

N/A
TEL: N/A
FAX: N/A

CST Lab: NVLAP 201029-0
InformaCast C Crypto Library
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software07/07/20172/4/2021Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with CentOS 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Allowed algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Multi-Chip Stand Alone

"InformaCast transforms devices on your network into a powerful system for IP paging and emergency alerting. InformaCast contains C libraries that feature robust FIPS 140-2 validated algorithm support."
2950Hypersecu Information Systems Inc.
#200-6191 Westminster Hwy
Richmond, BC V7C 4V4
Canada

James Li
TEL: +1 (604) 279-2000
FAX: +1 (604) 272-1233

Gregory Dunn
TEL: +1 (604) 279-2000
FAX: +1 (604) 272-1233

CST Lab: NVLAP 100432-0
HyperPKI™ HYP2003
(Hardware Version: 1.0.0)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware07/06/20177/6/2019Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #1473); DRBG (Cert. #58); RSA (Cert. #720); SHS (Cert. #1332); Triple-DES (Cert. #991)

-Allowed algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"HyperPKI™ HYP2003 token is a portable two-factor USB token advanced with smart card technology. HYP2003 utilizes digital certificate based technologies to generate and store credentials, such as private keys, passwords and digital certificates inside the secured smart card chip. It is designed to provide strong authentication and identification and to support network login, secure online transactions, digital signatures, and sensitive data protection."
2949Hewlett Packard Enterprise
8000 Foothills Blvd
Roseville, CA 95747
USA

Susan Scotten
TEL: 916-785-8742

CST Lab: NVLAP 200002-0
Aruba 5400R zl2 Switch Series
(Hardware Versions: 5406R zl2 J9821A [1] and 5412R zl2 J9822A [2]; Interface Modules: (J9537A [2], J9546A [2], J9986A [1,2], 9987A [1,2], J9988A [1,2], J9989A [2], J9990A [1,2], J9991A [2], J9992A [2], J9993A [1,2], J9995A [1,2], J9996A [2]); Management Module: J9827A [1,2]; Firmware Version: KB.16.02.0015)
(When operated in FIPS mode. When installed, initialized and configured as specified in the Security Policy Section 11)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware07/06/20177/5/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4304); CVL (Cert. #1018); DRBG (Cert. #1365); DSA (Cert. #1144); HMAC (Cert. #2840); RSA (Cert. #2325); SHS (Cert. #3543); Triple-DES (Cert. #2325)

-Allowed algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"The HP 5400 Switch series consists of Layer 2/3/4 switches which support integrated advanced capabilities in chassis (6-slot and 12-slot) form factor and offer maximum flexibility, life time warranty and lowered TCO."
2948Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Jaz Lin
TEL: 408-745-2000

Vann (Vanna) Nguyen
TEL: 408-745-2000

CST Lab: NVLAP 100432-0
Juniper Networks SRX5400, SRX5600, and SRX5800 Services Gateways with Junos 15.1X49-D75
(Hardware Versions: SRX5400, SRX5600, SRX5800 with components identified in Security Policy Table 1 and JNPR-FIPS-TAMPER-LBLS; Firmware Version: JUNOS-FIPS-MODE 15.1X49-D75)
(When operated in FIPS mode and with tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware07/06/20177/5/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4393, #4394 and #4395); CKG (vendor affirmed); CVL (Certs. #1095 and #1096); DRBG (Certs. #1415 and #1423); DSA (Certs. #1172 and #1173); ECDSA (Certs. #1053 and #1054); HMAC (Certs. #2919, #2920 and #2921); KTS (AES Cert. #4393 and HMAC Cert. #2919; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (AES Cert. #4394 and HMAC Cert. #2920; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #2368 and HMAC Cert. #2919; key establishment methodology provides 112 bits of encryption strength); KTS (Triple-DES Cert. #2369 and HMAC Cert. #2920; key establishment methodology provides 112 bits of encryption strength); RSA (Certs. #2377 and #2383); SHS (Certs. #3621, #3622, #3623 and #3624); Triple-DES (Certs. #2368, #2369 and #2370)

-Allowed algorithms: Diffie-Hellman (CVL Certs. #1095 and #1096, key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #1095 and #1096, key agreement; key establishment methodology provides 128 or 192 bit of encryption strength); NDRNG
Multi-Chip Stand Alone

"Juniper Networks® SRX5400, SRX5600, and SRX5800 Services Gateways are next-gen intelligent security platforms ideally suited for service provider, large enterprise, and public sector networks. Based on a revolutionary architecture offering superior protection, performance, scalability, services integration, and six nines of carrier-grade reliability the SRX5000 series are custom designed to deliver the highest level of protection incorporating advanced services such as application security, Unified Threat Management (UTM), Intrusion Prevention (IPS), and integrated threat intelligence."
2947NCoded Communications LLC
17633 Gunn Hwy
#188
Odessa, FL 33556
USA

Peter Rung
TEL: N/A
FAX: N/A

Shad Epolito
TEL: N/A
FAX: N/A

CST Lab: NVLAP 201029-0
NCoded Cryptographic Mobile Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #1938.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software07/05/20172/9/2021Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Android 4.0 running on a Galaxy Nexus
iOS 5.1 running on a iPad 3
iOS 6 running on a iPad 3
iOS 7 running on a iPad 3 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #2125 and #2126); CVL (Certs. #28 and #29); DRBG (Certs. #233 and #234); DSA (Certs. #666 and #667); ECDSA (Certs. #319 and #320); HMAC (Certs. #1296 and #1297); RSA (Certs. #1094 and #1095); SHS (Certs. #1849 and #1850); Triple-DES (Certs. #1351 and #1352)

-Allowed algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength);
Multi-Chip Stand Alone

"NCoded Cryptographic Mobile (NCM) Module is a standards-based "Drop-in Compliance" cryptographic engine for mobile devices. The module delivers core cryptographic functions to the mobile devices and features robust algorithm support, including Suite B algorithms. NCM offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation."
2946Bull Atos Technologies
Rue Jean JaurFs
B.P.68
Les Clayes sous Bois 78340
France

Jean-Luc CHARDON
TEL: +33 1 30 80 79 14
FAX: +33 1 30 80 78 87

Pierre-Jean AUBOURG
TEL: +33 1 30 80 77 02
FAX: +33 1 30 80 78 87

CST Lab: NVLAP 200928-0
CHR Cryptographic Module
(Hardware Version: 006/A; Firmware Version: V1.06-00L)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/29/20176/28/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: RSA (Cert. #1884); SHS (Cert. #3067)

-Other algorithms: N/A
Multi-Chip Stand Alone

"The BULL CHR is a multi-chip standalone security module providing functionality for the secure loading of applications. The CHR is the corner stone of a range of security products developed and signed by BULL as Application Provider and known as "CRYPT2Protect HR" and "CRYPT2Pay HR" product range available for different domain of applications including Banks and Financial Institutions. Additional products may be developed by Application Providers, based on the CHR."
2945TCL Communication Ltd.
25 Edelman Suite 200
Irvine, CA 92618
USA

Alain Perrier
TEL: 214-316-2312

Nikhil Mhatre
TEL: 954-914-9952

CST Lab: NVLAP 200658-0
TCT Crypto Engine
(Hardware Version: 2.1.0)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware06/23/20173/21/2021Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4513 and #4514)

-Other algorithms: N/A
Single Chip

"TCT Crypto Engine high throughput storage data encryption and decryption."
2944TCL Communication Ltd.
25 Edelman Suite 200
Irvine, CA 92618
USA

Alain Perrier
TEL: 214-316-2312

Nikhil Mhatre
TEL: 954-914-9952

CST Lab: NVLAP 200658-0
TCT Random Number Generator
(Hardware Version: 2.1.0)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware06/23/20174/7/2021Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: DRBG (Cert. #1475); SHS (Certs. #3700 and #3702)

-Other algorithms: NDRNG
Single Chip

"TCT Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG"
2943TCL Communication Ltd.
25 Edelman Suite 200
Irvine, CA 92618
USA

Alain Perrier
TEL: 214-316-2312

Nikhil Mhatre
TEL: 954-914-9952

CST Lab: NVLAP 200658-0
TCT Crypto Engine Core
(Hardware Version: 5.3.3)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware06/23/20174/10/2021Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4512); HMAC (Cert. #2981); SHS (Cert. #3701); Triple-DES (Cert. #2409)

-Other algorithms: AEAD; DES
Single Chip

"TCT Crypto Engine Core is a general purpose cryptographic hardware engine capable of securely processing various confidentiality and integrity algorithms across multiple execution environments"
2942Samsung Electronics Co., Ltd.
R5 416, Maetan 3-dong Yeongton-gu
Suwon-si, Gyeonggi 443-742
Korea

Brian Wood
TEL: +1-973-440-9125

Jung Ha Paik
TEL: +82-10-8861-0858

CST Lab: NVLAP 200002-0
Samsung Flash Memory Protector V1.2
(Hardware Version: 3.0.2; Software Version: 1.3)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software-Hybrid06/23/20176/22/2022Overall Level: 1

-EMI/EMC: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Android 7.0 (Kernel 4.4) running on Samsung Galaxy S8 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4423)

-Other algorithms: N/A
Multi-Chip Stand Alone

"The driver for the on-the-fly Hardware encryption module to flash memory for Disk/File Encryption solution. The hardware module supports AES with CBC mode and XTS-AES cryptographic services."
2941Thales e-Security Inc.
900 South Pine Island Road
Suite 710
Plantation, FL 33324
USA

sales@thalesesec.com
TEL: 888-744-4976

CST Lab: NVLAP 200996-0
nShield Solo XC F3 [1] and nShield Solo XC F3 for nShield Connect XC [2]
(Hardware Versions: NC4035E-000 [1] and NC4335N-000 [2], Build Standard A; Firmware Version: 3.3.21)
(When installed, initialized and configured as specified in Section 5.2.3 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/23/20176/22/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3664, #3697 and #3711); CVL (Certs. #669, #682, #696 and #1111); DRBG (Cert. #985); DSA (Certs. #1034 and #1039); ECDSA (Certs. #771, #776, #790 and #805); HMAC (Cert. #2414); KBKDF (Certs. #73 and #75); KTS (AES Cert. #3664 and #3711; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #1897, #1903 and #1917); SHS (Certs. #3082 and #3130); Triple-DES (Certs. #2046 and #2073)

-Other algorithms: NDRNG
Multi-Chip Embedded

"The nShield XC F3 PCIe card, sold as nShield XC F3 PCIe server-embedded hardware security modules (HSMs) and also used in the nShield Connect XC network appliance HSMs, are multi-tasking HSMs optimized for symmetric and asymmetric operations on protected keys. The nShield modules are FIPS 140-2 Level 3 embedded devices for applications including but not limited to PKI, SSL/TLS, Secure Manufacturing, Data Protection, Key Management and Provisioning."
2940Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Rick Stanley
TEL: 603-315-7746
FAX: 978-264-5522

CST Lab: NVLAP 200427-0
HPE FlexNetwork 10500 and HPE FlexFabric 12500 and 12900 Switch Series
(Hardware Versions: {HPE FlexNetwork 10504 Switch Chassis JC613A with (JG496A or JH198A) and opacity shield JG710A [1], HPE FlexNetwork 10504 Switch TAA-Compliant Chassis JG820A with JH206A and opacity shield JG710A [1], HPE FlexNetwork 10508 Switch Chassis JC612A with (JG496A or JH198A) and opacity shield JG711A [1], HPE FlexNetwork 10508 Switch TAA-Compliant Chassis JG821A with JH206A and opacity shield JG711A [1], HPE FlexNetwork 10508-V Switch Chassis JC611A with (JG496A or JH198A) and opacity shield JG712A [1], HPE FlexNetwork 10508-V Switch TAA-Compliant Chassis JG822A with JH206A and opacity shield JG712A [1], HPE FlexNetwork 10512 Switch Chassis JC748A with (JG496A or JH198A) and opacity shield JG713A [1], HPE FlexNetwork 10512 Switch TAA-Compliant Chassis JG823A with JH206A and opacity shield JG713A [1], HPE FlexFabric 12504 AC Switch Chassis JC654A with (JC072B or JG497A), JG794A and opacity sheild JG721A [2], HPE FlexFabric 12508E AC Switch Chassis JG782A with JG802A and JG794A [2], HPE FlexFabric 12518E AC Switch Chassis JG784A with JG802A and JG794A [2], HPE FlexFabric 12908E Switch Chassis JH255A with JH104A [3], HPE FlexFabric 12910 Switch AC Chassis JG619A with JG621A [3], HPE FlexFabric 12910 TAA Compliant Switch AC Chassis JH113A with JH114A [3], HPE FlexFabric 12916E Switch Chassis JH103A with JH104A [3]} with tamper evidence labels: JG585A or JG586A; Firmware Versions: HPE Comware 7.1.045, Release R7179[1], HPE Comware 7.1.045, Release R7377[2], HPE Comware 7.1.045, Release R1150[3])
(When operated in FIPS mode with tamper evident labels and opacity kits installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/28/20176/27/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4090, #4092, #4093, #4095, #4097 and #4098); CKG (vendor affirmed); CVL (Certs. #905, #906, #909, #910, #911 and #912); DRBG (Certs. #1228, #1230 and #1231); DSA (Certs. #1111, #1113 and #1114); ECDSA (Certs. #924, #926 and #927); HMAC (Certs. #2670, #2672, #2673, #2675, #2677 and #2678); RSA (Certs. #2214, #2216 and #2217); SHS (Certs. #3366, #3368, #3369, #3371, #3373 and #3374)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #905, #909 and #911, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; AES (non-compliant); Camellia; DES; HMAC-MD5; MD5; PRNG; RC2; RC4; RSA (non-compliant)
Multi-Chip Stand Alone

"The HPE Networking devices are suitable for a range of uses: at the edge of a network, connecting server clusters in a data center, in an enterprise LAN core, and in large-scale industrial networks and campus networks. Each device is based on the HPE Comware Software, Version 7.1.045 platform."
2939NCoded Communications LLC
17633 Gunn Hwy
#188
Odessa, FL 33556
USA

Peter Rung
TEL: N/A
FAX: N/A

Shad Epolito
TEL: N/A
FAX: N/A

CST Lab: NVLAP 201029-0
NCoded Cryptographic Server Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software06/22/20172/4/2021Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Windows Server 2008 R2 on a Dell OptiPlex 755
SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755
CentOS 6.3 on a Dell OptiPlex 755
Mac OS X 10.8 on a MacBook Air
Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Dual EC DRBG; PRNG
Multi-Chip Stand Alone

"NCoded Cryptographic Server Module is a standards-based "Drop-in Compliance" cryptographic engine for servers and appliances. The module delivers core cryptographic functions to mobile platforms and features robust algorithm support, including Suite B algorithms. NCoded Cryptographic Server Module offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation."
2938Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
Secure Kernel Code Integrity (skci.dll) in Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with the module Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 under Cert. #2935 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA (single-user mode)

-FIPS Approved algorithms: RSA (Certs. #2193); SHS (Certs. #3347)

-Other algorithms: MD5
Multi-Chip Stand Alone

"Secure Kernel Code Integrity (SKCI) running in the Virtual Secure Mode (VSM) of the Hyper-V hypervisor will only grant execute access to physical pages in the kernel that have been successfully verified. Executable pages will not have write permission outside of Hyper-V. Therefore, only verified code can be executed."
2937Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with the modules Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 under Cert. #2935 operating in FIPS mode and Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2936 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA
Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA
Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4064); CVL (Certs. #886 and #887); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)

-Other algorithms: HMAC-MD5; MD5; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)
Multi-Chip Stand Alone

"The Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) provides cryptographic services to Windows components and applications. It includes cryptographic algorithms in an easy-to-use cryptographic module via the Cryptography Next Generation (CNG) API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography."
2936Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
Kernel Mode Cryptographic Primitives Library (cng.sys) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with modules BitLocker(R) Windows OS Loader (winload) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2932 operating in FIPS mode or BitLocker(R) Windows Resume (winresume) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2933 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA
Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA
Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4064); CVL (Certs. #886 and #887); DRBG (Cert. #1217); DSA (Cert. #1098); ECDSA (Cert. #911); HMAC (Cert. #2651); KAS (Cert. #92); KBKDF (Cert. #101); KTS (AES Cert. #4062; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2192, #2193 and #2195); SHS (Cert. #3347); Triple-DES (Cert. #2227)

-Other algorithms: HMAC-MD5; MD5; NDRNG; DES; Legacy CAPI KDF; MD2; MD4; RC2; RC4; RSA (encrypt/decrypt)
Multi-Chip Stand Alone

"Kernel Mode Cryptographic Primitives Library (cng.sys) runs as a kernel mode export driver, and provides cryptographic services, through their documented interfaces, to Windows kernel components. It supports several cryptographic algorithms accessible via a FIPS function table request IRP (I/O request packet)."
2935Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with modules BitLocker(R) Windows OS Loader (winload) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2932 operating in FIPS mode or BitLocker(R) Windows Resume (winresume) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2933 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA
Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA
Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode)

-FIPS Approved algorithms: RSA (Cert. #2193); SHS (Cert. #3347)

-Other algorithms: AES (non-compliant); MD5
Multi-Chip Stand Alone

"Code Integrity (ci.dll) verifies the integrity of executable files, including kernel mode drivers, critical system components, and user mode cryptographic modules as they are loaded into memory from the disk."
2934Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
BitLocker® Dump Filter (dumpfve.sys) in Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with the module Code Integrity (ci.dll) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 under Cert. #2935 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA
Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4061 and #4064)

Multi-Chip Stand Alone

"The BitLocker® Dump Filter (dumpfve.sys) is the full volume encryption filter that resides in the system dump stack. Whenever the dump stack is called (in the event of a system crash or for hibernation), this filter ensures that all data is encrypted before it gets written to the disk as a dump file or hibernation file."
2933Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
BitLocker® Windows Resume (winresume) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with module Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2931 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA
Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)

-Other algorithms: MD5
Multi-Chip Stand Alone

"BitLocker® Windows Resume is an operating system loader which loads the Windows OS kernel (ntoskrnl.exe) and other boot stage binary image files, as well as previous operating system state information, when Windows has been previously put into a sleep or hibernate power state."
2932Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
BitLocker® Windows OS Loader (winload) in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode with module Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016 validated to FIPS 140-2 under Cert. #2931 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA
Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA
Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4061 and #4064); RSA (Cert. #2193); SHS (Cert. #3347)

-Other algorithms: NDRNG; MD5
Multi-Chip Stand Alone

"The BitLocker® Windows OS Loader loads the boot-critical driver and OS kernel image files."
2931Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Tim Myers
TEL: 800-642-7676

CST Lab: NVLAP 200427-0
Boot Manager in Microsoft Windows 10, Windows 10 Pro, Windows 10 Enterprise, Windows 10 Enterprise LTSB, Windows 10 Mobile, Windows Server 2016 Standard, Windows Server 2016 Datacenter, Windows Storage Server 2016
(Software Version: 10.0.14393)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Windows 10 Enterprise Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise Anniversary Update (x64) running on a HP Compaq Pro 6305 with PAA
Windows 10 Pro Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 3 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Pro 4 with PAA
Windows 10 Pro Anniversary Update (x64) running on a Microsoft Surface Book with PAA
Windows 10 Pro Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Anniversary Update (x64) running on a Microsoft Surface 3 with PAA
Windows 10 Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows 10 Enterprise LTSB Anniversary Update (x86) running on a Dell Inspiron 660s without PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell Precision Tower 5810MT with PAA
Windows 10 Enterprise LTSB Anniversary Update (x64) running on a Dell XPS 8700 with PAA
Windows Server 2016 Standard Edition (x64) running on a HP Compaq Pro 6305 with PAA
Windows Server 2016 Standard Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Server 2016 Datacenter Edition (x64) running on a Dell PowerEdge R630 Server with PAA
Windows Storage Server 2016 (x64) running on a Dell PowerEdge R630 Server with PAA
Windows 10 Mobile Anniversary Update (ARMv7) running on a Microsoft Lumia 950 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4061 and #4064); HMAC (Cert. #2651); PBKDF (vendor affirmed); RSA (Cert. #2193); SHS (Cert. #3347)

-Other algorithms: MD5; PBKDF (non-compliant); VMK KDF
Multi-Chip Stand Alone

"The Windows system boot manager is called by the bootstrapping code that resides in the boot sector. It checks its own integrity, checks the integrity of the Windows OS Loader, and then launches it."
2930Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Rick Stanley
TEL: 603-315-7746
FAX: 978-264-5522

CST Lab: NVLAP 200427-0
HPE FlexNetwork 5130EI, 5130HI, 5510HI and FlexFabric 5930 Switch Series
(Hardware Versions: HPE FlexNetwork 5130 24G 4SFP+ EI Switch (JG932A) [1], HPE FlexNetwork 5130 24G SFP 4SFP+ EI Switch (JG933A) [1], HPE FlexNetwork 5130 48G 4SFP+ EI Switch (JG934A) [1], HPE FlexNetwork 5130 24G PoE+ 4SFP+ (370W) EI Switch (JG936A) [1], HPE FlexNetwork 5130 48G PoE+ 4SFP+ (370W) EI Switch (JG937A) [1], HPE FlexNetwork 5130 24G 2SFP+ 2XGT EI Switch (JG938A) [1], HPE FlexNetwork 5130 48G 2SFP+ 2XGT EI Switch (JG939A) [1], HPE FlexNetwork 5130 24G POE+ 2SFP+ 2XGT (370W) EI Switch (JG940A) [1], HPE FlexNetwork 5130 48G POE+ 2SFP+ 2XGT (370W) EI Switch (JG941A) [1], HPE 5130 24G 4SFP+ 1-slot HI Switch (JH323A) [2], HPE 5130 48G 4SFP+ 1-slot HI Switch (JH324A) [2], HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch (JH325A) [2], HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch (JH326A) [2], HPE 5510 24G 4SFP+ HI 1-slot Switch (JH145A) [3], HPE 5510 48G 4SFP+ HI 1-slot Switch (JH146A) [3], HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch (JH147A) [3], HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch (JH148A) [3], HPE 5510 24G SFP 4SFP+ HI 1-slot Switch (JH149A) [3], HPE FlexFabric 5930 32QSFP+ Switch (JG726A) [4], HPE FlexFabric 5930 32QSFP+ Switch TAA version (JG727A) [4], HPE FlexFabric 5930 4-slot Switch (JH179A) [4], HPE FlexFabric 5930 4-slot Switch TAA1 version (JH188A) [4], HPE FlexFabric 5930 2QSFP+ 2-slot Switch (JH178A) [4], HPE FlexFabric 5930 2QSFP+ 2-slot Switch TAA1 version (JH187A) [4]; Firmware Versions: HPE Comware 7.1.045, Release R3113 [1], HPE Comware 7.1.045, Release R1120P05 [2], HPE Comware 7.1.045, Release R1120 [3], HPE Comware 7.1.045, Release R2423 [4])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/21/20176/20/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3854, #3855, #4092, #4093, #4097 and #4098); CKG (vendor affirmed); CVL (Certs. #738, #739, #909, #910, #911 and #912); DRBG (Certs. #1094, #1230 and #1231); DSA (Certs. #1055, #1113 and #1114); ECDSA (Certs. #834, #926 and #927);HMAC (Certs. #2499, #2503, #2672, #2673, #2677 and #2678); RSA (Certs. #1969, #2216 and #2217); SHS (Certs. #3173, #3177, #3368, #3369, #3373 and #3374)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #738, #909 and #911, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; AES (non-compliant); Camellia; DES; HMAC-MD5; MD5; PRNG; RC2; RC4; RSA (non-compliant)
Multi-Chip Stand Alone

"The HPE Networking devices are suitable for a range of uses: at the edge of a network, connecting server clusters in a data center, in an enterprise LAN core, and in large-scale industrial networks and campus networks. Each device is based on the HPE Comware Software, Version 7.1.045 platform."
2929DataLocker Inc.
7007 College Blvd., Suite 240
Overland Park, KS 66211
USA

Jay Kim
TEL: 913-310-9088

CST Lab: NVLAP 100432-0
Sentry - Encrypted USB Flash Drive
(Hardware Versions: SEMS04, SEMS08, SEMS16, SEMS32, SEMS64, SSC004M, SSC008M, SSC016M, SSC032M, SSC064M, SONE004, SONE008, SONE016, SONE032, SONE064, SONE004M, SONE008M, SONE016M, SONE032M and SONE064M; Firmware Version: 3.05)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/21/201711/30/2021Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #2838); DRBG (Cert. #494); HMAC (Cert. #1779); PBKDF (vendor affirmed); RSA (Cert. #1480); SHS (Cert. #2379)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"The Sentry - Encrypted USB Flash Drive is a Secure USB 3.0 flash drive with 256-bit AES hardware encryption and PKI operations combined with strong, built-in password protection capabilities to help control user access to sensitive data and critical applications. The Sentry - Encrypted USB Flash Drive allows enterprise class device management features like policy updates, password recovery and remote kill features."
2928Kingston Technology Company, Inc.
17600 Newhope Street
Fountain Valley, CA 92708
USA

Jason J. Chen
TEL: 714-445-3449
FAX: 714-438-2765

Joel Tang
TEL: 714-435-2604
FAX: 714-438-2765

CST Lab: NVLAP 200983-0
Kingston DataTraveler 2000
(Hardware Version: DT2000/4GB; DT2000/8GB; DT2000/16GB; DT2000/32GB; DT2000/64GB; Firmware Version: Encryption Controller: V1.01.10; Security Controller: v1.11)
(This validation entry is rebranding from Cert. #2688)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware06/20/2017
07/14/2017
7/25/2021Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3749 and #3757); DRBG (Cert. #1032); HMAC (Cert. #2459); PBKDF (vendor affirmed); SHS (Cert. #3127)

-Other algorithms: NDRNG
Multi-Chip Stand Alone

"Kingston DataTraveler 2000 Secure USB Flash Drive ("Kingston DT2000" or "DT2000") is an encrypted storage device that provides a secure way to store and transfer data. User authentication is self-contained via an on-board keypad. User data is protected by hardware-based 256-bit AES encryption to secure sensitive information in the event that the drive is lost or stolen."
2927Hewlett Packard Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Rick Stanley
TEL: 603-315-7746
FAX: 978-264-5522

CST Lab: NVLAP 200427-0
HPE FlexNetwork MSR3024 Router Series
(Hardware Versions: HPE FlexNetwork MSR3024 AC Router (JG406A), HPE FlexNetwork MSR3024 PoE Router (JG408A); Firmware Versions: HPE Comware 7.1.045, Release R0305P08)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/20/20176/19/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4091, #4094 and #4096); CKG(vendor affirmed); CVL (Certs. #907 and #908); DRBG (Cert. #1229); DSA (Cert. #1112); ECDSA (Cert. #925); HMAC (Certs. #2671, #2674 and #2676); RSA (Cert. #2215); SHS (Certs. #3367, #3370 and #3372)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #907, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); HMAC-SHA-1-96 (HMAC Certs. #2671, #2674 and #2676); NDRNG; AES (non-compliant); Camellia; DES; HMAC-MD5; MD5; PRNG; RC2; RC4; RSA (non-compliant)
Multi-Chip Stand Alone

"The HPE Networking devices are suitable for a range of uses: at the edge of a network, connecting server clusters in a data center, in an enterprise LAN core, and in large-scale industrial networks and campus networks. Each device is based on the HPE Comware Software, Version 7.1.045 platform."
2926Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Jaz Lin
TEL: 408-745-2000

Vann (Vanna) Nguyen
TEL: 408-745-2000

CST Lab: NVLAP 100432-0
Juniper Networks SRX5400, SRX5600, and SRX5800 Services Gateways
(Hardware Versions: SRX5400, SRX5600, and SRX5800 with components identified in Security Policy Table 1; Firmware Version: JUNOS-FIPS 12.3X48-D30)
(When operated in FIPS mode and with the tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/19/20176/18/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4054, #4055, #4056, #4070 and #4329); CVL (Certs. #880 and #926); DRBG (Certs. #1216, #1399 and #1401); DSA (Certs. #1096, #1103 and #1104); ECDSA (Certs. #909, #916 and #917); HMAC (Certs. #2646, #2647, #2648, #2657 and #2867); KTS (AES Cert. #4054 and HMAC Cert. #2646); KTS (AES Cert. #4055 and HMAC Cert. #2647); KTS (AES Cert. #4056 and HMAC Cert. #2648); KTS (Triple-DES Cert. #2223 and HMAC Cert. #2648); KTS (Triple-DES Cert. #2224 and HMAC Cert. #2646); KTS (Triple-DES Cert. #2224 and HMAC Cert. #2647); RSA (Certs. #2087, #2201 and #2202); SHS (Certs. #3341, #3342, #3343, #3353 and #3571); Triple-DES (Certs. #2221, #2222, #2223 and #2224)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; ARCFOUR; Blowfish; CAST; HMAC-MD5; HMAC-RIPEMD160; UMAC
Multi-Chip Stand Alone

"Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers."
2925Huawei Technologies Co., Ltd.
No.328, Xinghu Street
SuZhou, JIANGSU 215000
CHINA

Yan Ze (Allen)
TEL: +86 15919432118

Ji Xiang
TEL: +8615261806635

CST Lab: NVLAP 100432-0
Huawei AC6605 Wireless Access Controller
(Hardware Versions: P/Ns AC6605-26, 99089JEB [Baffles] and 4057-113016 [Tamper-Evident Seals]; Firmware Version: V200R007C10SPC100)
(When operated in FIPS mode and with the tamper-evident seals and external baffles installed as indicated in the Security Policy. The protocols IKEv1, SNMP and TLS shall not be used when operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/19/20176/18/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4408); CKG (vendor affirmed); CVL (Cert. #1114); DRBG (Cert. #1421); ECDSA (Cert. #1060); HMAC (Cert. #2930); SHS (Cert. #3634); Triple-DES (Cert. #2375)

-Other algorithms: Diffe-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2930); NDRNG; AES (non-compliant); Blowfish; DES; HMAC-MD5; IKEv1 KDF (non-compliant); MD5; PBKDF2 (non-compliant); RC4; RSA (non-compliant); SM1; SM3; SM4; SNMP KDF (non-compliant); TLS KDF (non-compliant)
Multi-Chip Stand Alone

"The Huawei Access Controller (AC) are multi-chip standalone cryptographic modules enclosed in hard, commercial grade metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to handle the configuration of wireless access-points. The modules provide network interfaces for data input and output."
2924Huawei Technologies Co., Ltd.
No.328, Xinghu Street
Yuhuatai District
SuZhou, JIANGSU 215000
CHINA

Yan Ze (Allen)
TEL: +86 15919432118

Ji Xiang
TEL: +86 15261806635

CST Lab: NVLAP 100432-0
Huawei AC6005 Wireless Access Controller
(Hardware Versions: P/Ns AC6005-8, 99089JEB [Baffles] and 4057-113016 [Tamper-Evident Seals]; Firmware Version: V200R007C10SPC100)
(When operated in FIPS mode and with the tamper evident seals and external baffles installed as indicated in the Security Policy. The protocols IKE, SNMP and TLS shall not be used when operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/19/20176/18/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4408); CKG (vendor affirmed); CVL (Cert. #1114); DRBG (Cert. #1421); ECDSA (Cert. #1060); HMAC (Cert. #2930); SHS (Cert. #3634); Triple-DES (Cert. #2375)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2930); NDRNG; AES (non-compliant); Blowfish; DES; KDF (non-compliant); HMAC-MD5; IKEv1 KDF (non-compliant); MD5; PBKDF2 (non-compliant); RC4; RSA (non-compliant); SM1; SM3; SM4; SNMP KDF (non-compliant); TLS KDF (non-compliant)
Multi-Chip Stand Alone

"The Huawei Access Controller (AC) are multi-chip standalone cryptographic modules enclosed in hard, commercial grade metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to handle the configuration of wireless access-points. The modules provide network interfaces for data input and output."
2923Symantec Corporation
350 Ellis St.
Mountain View, CA 94043
USA

Diana Robinson
TEL: 845.454.6397
FAX: N/A

CST Lab: NVLAP 201029-0
Security Analytics Appliance (Models: SA-S500-10-CM, SA-S500-20-FA, SA-S500-30-FA, and SA-S500-40-FA)
(Hardware Versions: P/N 090-03645, P/N 080-03938, P/N 090-03646, P/N 080-03939, P/N 090-03648, P/N 080-03940, P/N 090-03649, and P/N 080-03941 with FIPS Kit: HW-KIT-FIPS-500; Firmware Version: 7.2.3)
(When configured as specified in Section 3.1 and tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/19/2017
06/22/2017
6/18/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4390); CVL (Certs. #1108 and #1109); DRBG (Cert. #1413); HMAC (Cert. #2917); RSA (Cert. #2373); SHS (Cert. #3619)

-Other algorithms: Diffie-Hellman (CVL Cert. #1108 with CVL Cert #1109, key agreement, key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1108 with CVL Cert #1109, key agreement, key establishment methodology provides between 128 and 256 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength)
Multi-Chip Stand Alone

"The Security Analytics Appliances (SA-S500-10-CM, SA-S500-20-FA, SA-S500-30-FA, and SA-S500-40-FA) are part of Symantec’s Incident Response and Forensics solutions. The appliances harness the Security Analytics software to capture, enrich and reconstruct all network traffic (including full packets) in real time. The appliances can be deployed anywhere in the network to deliver clear, actionable intelligence for swift incident response and resolution and real-time network forensics."
2922STMicroelectronics
Green Square Building B
Lambroekstraat 5
Diegem/Machelen B-1831
Belgium

Olivier COLLART
TEL: +32 272 450 77
FAX: +32 272 451 43

Fabien ARRIVE
TEL: +33 223 470 633
FAX: +33 223 470 400

CST Lab: NVLAP 200002-0
Trusted Platform Module ST33TPHF2ESPI
(Hardware Versions: ST33HTPH2E28AAF0, ST33HTPH2E32AAF0, ST33HTPH2E28AAF1 and ST33HTPH2E32AAF1; Firmware Version: 49.00)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/16/20176/15/2022Overall Level: 1

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4338); CKG (vendor affirmed); CVL (Certs. #1044 and #1045); DRBG (Cert. #1361); ECDSA (Cert. #1025); HMAC (Certs. #2870 and #2878); KAS (Cert. #110); KBKDF (Cert. #123); KTS (AES Cert. #4338 and HMAC Cert. #2870; key establishment methodology provides 128 bits or 256 bits of encryption strength); RSA (Cert. #2342); SHS (Cert. #3539); Triple-DES (Cert. #2345)

-Other algorithms: NDRNG; RSA (CVL Cert. #1045, key wrapping; key establishment methodology provides 112 bits of encryption strength); ECDAA; ECSchnorr; MGF1
Single Chip

"ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specification."
2921Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Jaz Lin
TEL: 408-745-2000

Vann (Vanna) Nguyen
TEL: 408-745-2000

CST Lab: NVLAP 100432-0
Juniper Networks SRX1400, SRX3400, and SRX3600 Services Gateways
(Hardware Versions: P/Ns SRX1400BASE-GE-AC with [1] or [2], SRX1400BASE-GE-DC with [1] or [2], SRX3400BASE-AC with [2], SRX3400BASE-DC with [2], SRX3400BASE-DC2 with [2], SRX3600BASE-AC with [2], SRX3600BASE-DC with [2], and SRX3600BASE-DC2 with [2]; Service Processing Cards SRX1K-NPC-SPC-1-10-40 [1] or SRX3K-SPC-1-10-40 [2]; with Tamper Seals JNPR-FIPS-TAMPER-LBLS; Firmware Version: JUNOS-FIPS 12.3X48-D30)
(When operated in FIPS mode and with the tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/14/20176/13/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4054, #4056 and #4329); CVL (Certs. #880 and #926); DRBG (Certs. #1216 and #1399); DSA (Certs. #1096 and #1104); ECDSA (Certs. #909 and #917); HMAC (Certs. #2646, #2648 and #2867); KTS (AES Cert. #4054 and HMAC Cert. #2646); KTS (AES Cert. #4056 and HMAC Cert. #2648); KTS (Triple-DES Cert. #2223 and HMAC Cert. #2648); KTS (Triple-DES Cert. #2224 and HMAC Cert. #2646); RSA (Certs. #2087 and #2202); SHS (Certs. #3341, #3343 and #3571); Triple-DES (Certs. #2222, #2223 and #2224)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; ARCFOUR; Blowfish; CAST; HMAC-MD5; HMAC-RIPEMD160; UMAC
Multi-Chip Stand Alone

"Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers."
2920NXP Semiconductors
411 E. Plumeria Dr.
San Jose, CA 95134
USA

Sylvain Bonfardin
TEL: 408-518-5500

CST Lab: NVLAP 100432-0
NXP JCOP 3 SecID P60 OSA
(Hardware Version: P6022y VB; Firmware Version: 0503.8211)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/14/20176/13/2022Overall Level: 3

-Physical Security: Level 4
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3997); CVL (Cert. #824); DRBG (Cert. #1187); ECDSA (Cert. #890); KBKDF (Cert. #91); KTS (AES Cert. #3997); RSA (Certs. #2053 and #2086); SHS (Cert. #3299); Triple-DES (Cert. #2195); Triple-DES MAC (Triple-DES Cert. #2195, vendor affirmed)

-Other algorithms: NDRNG
Single Chip

"NXP Semiconductors offers JCOP, a secure Java Card Operating System based on several independent 3rd party specifications, such as Java Card 3.0.4 specifications, the GlobalPlatform card specifications 2.2.1 and few International Organization for Standards (like ISO7816), EMV (Europay, MasterCard and VISA) and others. By adhering to these standards JCOP 3 SECID P60 ensures large interoperability with third-party applets providers, card issuers as well as all existing Smart Card infrastructures."
2919Cisco Systems, Inc.
170 W Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco Firepower 4100 and Cisco Firepower 9300 Series
(Hardware Versions: FPR4110[1], FPR4120[1], FRP4140[1], FRP4150[1], FPR9300-SM24[2] and FPR9300-SM36[2] with FIPS Kit (Cisco_TEL.FIPS_Kit), and opacity shield 69-100250-01[1] or 800-102843-01[2]; Firmware Version: 2.0)
(When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy. This module contains the embedded module Cisco ASA Cryptographic Module validated to FIPS 140-2 under Cert. #2898 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware06/01/20175/31/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2034, #2035, #4249 and #4307); CVL (Certs. #1002 and #1023); DRBG (Certs. #197, #1328 and #1368); ECDSA (Cert. #989); HMAC (Certs. #1233, #2787 and #2843); RSA (Certs. #2298 and #2328); SHS (Certs. #1780, #3486 and #3546); Triple-DES (Certs. #1311, #2304 and #2328)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Stand Alone

"Next generation security services platforms capable of running multiple security services simultaneously. Providing firewall (NGFW), traffic management Cisco Firepower 4100 Series is a family of four threat threat-focused NGFW security platforms. While the Cisco Firepower 9300 is a scalable carrier-grade, modular platform designed for service providers, high-performance computing centers. These are all next generation security services platforms capable of running multiple (firewall (NGFW), traffic management) security services simultaneously."
2918Viptela
1730 North First St
Suite 500
San Jose, CA 95112
USA

Venu Hemige

Chandrodaya Prasad

CST Lab: NVLAP 201029-0
Viptela Cryptographic Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/30/2017
06/02/2017
2/4/2021Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with CentOS 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Dual EC DRBG; PRNG
Multi-Chip Stand Alone

"The Viptela Cryptographic Module is a fundamental component of Viptela's security functionality. It is used for authentication of users and devices as well as to provide high scalability data protection for Software Defined Wide Area Networks (SD-WANs)."
2917Futurex
864 Old Boerne Road
Bulverde, TX 78163
USA

Futurex Security Certifications
TEL: +1 830-980-9782

CST Lab: NVLAP 100432-0
GSP3000 Hardware Security Module
(Hardware Version: P/N 9800-2079 Rev7; Firmware Version: 6.2.0.0)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware05/30/20175/29/2022Overall Level: 3

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4117 and #4118); CVL (Cert. #925); DRBG (Cert. #1240); ECDSA (Cert. #935); HMAC (Cert. #2689); KBKDF (Cert. #104); KTS (AES Cert. #4118); KTS (AES Cert. #4117 and HMAC Cert. #2689); KTS (Triple-Des Cert. #2248 and HMAC Cert. #2689; key establishment methodology provides 112 bits of encryption strength); RSA (Cert. #2226); SHS (Cert. #3387); Triple-DES (Certs. #2248 and #2254)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 256 bits of encryption strength); NDRNG; RSA (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Cert. #2248, key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AKB/TR-31; DES; DUKPT; HMAC MD5; HMAC RIPEMD-160; MD5; RIPEMD-160
Multi-Chip Embedded

"The GSP3000 is a general purpose cryptographic module incorporated into multiple Futurex products to ensure data confidentiality, integrity, and authenticity. It is designed to meet and exceed compliance mandates and security best practices in environments requiring enterprise-class protection for sensitive information."
2916Kaspersky Lab UK Ltd.
1st Floor, 2 Kingdom Street
Paddington, London, W2 6BD
United Kingdom

Oleg Andrianov
TEL: +7 495 797 8700

CST Lab: NVLAP 200968-0
Kaspersky Cryptographic Module (Pre-Boot)
(Software Version: 3.0.1.25)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/30/20175/29/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Kaspersky Preboot OS with BIOS running on an Intel® Core™2 Duo P9600 @ 2.53GHz system without PAA
Kaspersky Preboot OS with BIOS running on an Intel® Core™ i5-2400 CPU @ 3.10GHz system with PAA
Kaspersky Preboot OS with UEFI running on an Intel® Core™2 Duo P9600 @ 2.53GHz system without PAA
Kaspersky Preboot OS with UEFI running on an Intel® Core™ i7-3770S CPU@ 3.10GHz system with PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #2849, #2959, #2960 and #2980); DRBG (Certs. #502, #561, #890, #891, #896 and #897); HMAC (Certs. #1789 and #1879); PBKDF (vendor affirmed); RSA (Certs. #1490 and #1558); SHA-3 (vendor affirmed); SHS (Certs. #2391 and #2492)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides 112 or 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength), RSA (key wrapping; key establishment methodology provides between 112 and 270 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Multi-Chip Stand Alone

"Kaspersky Cryptographic Module (Pre-Boot) is a set of software libraries that provide cryptographic services for Kaspersky Lab FDE solution in pre-boot environment."
2915Hewlett Packard Enterprise
3000 Hanover St
Palo Alto, CA 94304
USA

Fernie Fuentes

CST Lab: NVLAP 201029-0
Hewlett Packard Enterprise libgcrypt Crypto Module
(Software Version: 4.0)
(When operated in FIPS mode. This validation entry is a non-security relevant modification to Cert. #2657.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/30/20176/12/2021Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Red Hat Enterprise Linux 7.1 running on ProLiant DL380p Gen8 with PAARed Hat Enterprise Linux 7.1 running on ProLiant DL380p Gen8 without PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3643, #3644, #3645 and #3646); DRBG (Certs. #972, #973, #974, #975, #979 and #980); DSA (Certs. #1020 and #1021); HMAC (Certs. #2398 and #2399); RSA (Certs. #1882 and #1883); SHS (Certs. #3065 and #3066); Triple-DES (Certs. #2033 and #2034)

-Other algorithms: RSA (key wrapping; key establishment methodology provides between 128 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARC4; Blowfish; Camellia; CAST5; CRC32; CSPRNG; DES; El Gamal; Gost; IDEA; MD4; MD5; OpenPGP S2K Salted and Iterated/salted; RC2; RIPEMD160; SEED; Serpent; Tiger; Twofish; Whirlpool
Multi-Chip Stand Alone

"The Hewlett Packard Enterprise libgcrypt Crypto Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for Hewlett Packard Enterprise components."
2914Huawei Technologies Co., Ltd.
101 Software Avenue
Yuhuatai District
NANJING, JIANGSU 210000
CHINA

Yang Ze (Allen)
TEL: +86 15919432118

Liu Pinping
TEL: +86 15850529039

CST Lab: NVLAP 100432-0
Huawei S6720EI Series Switches
(Hardware Versions: P/Ns 02350DMN Version H.3 (S6720-30C-EI-24S-AC) and 02350DMP Version H.3 (S6720-54C-EI-48S-AC) both with P/Ns 4057-113016 (Tamper Evident Seals) and 99089JEB (External Baffle); Firmware Version: V200R010C00SPC900B900)
(When operated in FIPS mode and with the tamper evident seals and external baffles installed as indicated in the Security Policy. The protocol SNMP shall not be used when operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware05/26/20175/25/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4400); CKG (vendor affirmed); CVL (Cert. #1107); DRBG (Cert. #1418); DSA (Cert. #1175); ECDSA (Cert. #1057); HMAC (Cert. #2924); KTS (AES Cert. #4400 and HMAC Cert. #2924; key establishment methodology provides 128 or 256 bits of encryption strength); KTS (Triple-DES Cert. #2372 and HMAC Cert. #2924; key establishment methodology provides 112 bits of encryption strength); RSA (Cert. #2380); SHS (Cert. #3627); Triple-DES (Cert. #2372)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2924); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); AES-XCBC-MAC (non-compliant); DES; HMAC-MD5; RC4; SNMP KDF (non-compliant)
Multi-Chip Stand Alone

"The S6720 has industry-leading performance and provides up to 24 or 48 line-speed 10GE ports. It can be used in a data center to provide 10 Gbit/s access to servers or function as a core switch on a campus network to provide 10 Gbit/s traffic aggregation. In addition, the S6720 provides a wide variety of services, comprehensive security policies, and various QoS features to help customers build scalable, manageable, reliable, and secure data centers."
2913Mocana Corporation
20 California Street
San Francisco, CA 94111
USA

Srinivas Kumar
TEL: 415-617-0055
FAX: 415-617-0056

CST Lab: NVLAP 100432-0
Mocana Cryptographic Loadable Kernel Module
(Software Version: 6.4.1f)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/24/20175/23/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Wind River Linux 6.0 running on Intel Atom E3800 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4265); DRBG (Cert. #1336); HMAC (Cert. #2810); SHS (Cert. #3511); Triple-DES (Cert. #2306)

-Other algorithms: DES; HMAC-MD5; MD2; MD4; MD5; PRNG
Multi-Chip Stand Alone

"The Mocana Cryptographic Loadable Kernel Module (Software Version 6.4.1f) is a software only, multi-chip standalone cryptographic module that runs on a general purpose computer. The primary purpose of this module is to provide FIPS Approved cryptographic routines to consuming applications via an Application Programming Interface."
2912EMC Corporation
176 South Street
Hopkinton, MA 01748
USA

Compliance Certification
TEL: 508-249-6911

CST Lab: NVLAP 200996-0
Unity 12 Gb/s SAS I/O Module with Encryption
(Hardware Versions: Storage Processor SAS Module with P/N 362-000-332, P/N 363-000-071, P/N 363-000-084 and P/N 364-000-096 and Pluggable I/O SAS Module with P/N 362-000-333, P/N 363-000-071, P/N 363-000-084 and P/N 364-000-063; Firmware Version: 03.90)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware05/16/20175/15/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3586 and #3598); KTS (AES Cert. #3598)

-Other algorithms: N/A
Multi-Chip Embedded

"The EMC Unity 12 Gb/s SAS I/O Module with Encryption is a high-density SAS controller chipset executing specialized firmware that provides Data At Rest Encryption (D@RE) for EMC Unity storage arrays. It implements 256-bit AES-XTS encryption/decryption to encrypt and decrypt data as it is being written to or read from a SAS drive. The two variants are the Storage Processor SAS Module variant which is embedded on the printed circuit board (PCB) of the Storage Processor and the Pluggable I/O SAS Module variant which is embedded on the PCB of a pluggable I/O Module."
2911F5 Networks
401 Elliott Avenue West
Seattle, WA 98119
USA

Maryrita Steinhour
TEL: 206-272-7351
FAX: n/a

John Hughes
TEL: 206-272-6038
FAX: n/a

CST Lab: NVLAP 200658-0
Cryptographic Module for BIG-IP®
(Software Version: 12.1.2 HF1)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/15/20175/14/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with BIG-IP 12.1.2 HF1 on VMware ESXi™ 5.5 hypervisor running on HP ProLiant BL490c with PAA
BIG-IP 12.1.2 HF1 on VMware ESXi™ 5.5 hypervisor running on HP ProLiant BL490c without PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4436 and #4437); CVL (Cert. #1144); DRBG (Certs. #1435 and #1436); ECDSA (Cert. #1076); HMAC (Certs. #2948 and #2949); RSA (Cert. #2418); SHS (Certs. #3655 and #3656)

-Other algorithms: EC Diffie-Hellman (CVL Cert. #1144, shared secret computation provides 128 or 192 bits of encryption strength); NDRNG; Blowfish; Camellia; CAST; DES; Diffie-Hellman (non-compliant); DSA (non-compliant); Hash_DRBG (non-compliant); HMAC_DRBG (non-compliant); IDEA; JPAKE; MD4; MD5; MDC2; PRNG; RC2; RC4; RIPEMD; RSA (encrypt/decrypt); SEED; SRP; Triple-DES (non-compliant); Whirlpool
Multi-Chip Stand Alone

"Cryptographic library offering various cryptographic mechanisms to BIG-IP® Virtual Edition."
2910Huawei Technologies Co., Ltd.
101 Software Avenue
Yuhuatai District
NANJING, JIANGSU 210000
CHINA

Yang Ze (Allen)
TEL: +86 15919432118

Liu Pinping
TEL: +86 15850529039

CST Lab: NVLAP 100432-0
Huawei S12700 Series Switches
(Hardware Versions: S12704 P/N 02114480 Version E.3, S12708 P/N 02114178 Version Q.3 and S12712 P/N 02114180 Version P.3 all with MPU P/N 03030RPE, SFU P/N 03030RPF, LPU P/N 03030SGN and Tamper Seals P/N 4057-113016; Firmware Version: V200R010C00SPC900B900)
(When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy. The protocol SNMP shall not be used when operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware05/15/20175/14/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4400); CKG (vendor affirmed); CVL (Cert. #1107); DRBG (Cert. #1418); DSA (Cert. #1175); ECDSA (Cert. #1057); HMAC (Cert. #2924); KTS (AES Cert. #4400 and HMAC Cert. #2924; key establishment methodology provides 128 or 256 bits of encryption strength); KTS (Triple-DES Cert. #2372 and HMAC Cert. #2924; key establishment methodology provides 112 bits of encryption strength); RSA (Cert. #2380); SHS (Cert. #3627); Triple-DES (Cert. #2372)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2924); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); AES-XCBC-MAC (non-compliant); DES; HMAC-MD5; RC4; SNMP KDF (non-compliant)
Multi-Chip Stand Alone

"Huawei S12700 series agile switches are core switches designed for next-generation campus networks. Using a fully programmable switching architecture, the S12700 series allows fast, flexible function customization and supports a smooth evolution to software-defined networking (SDN) The S12700 series uses Huawei Ethernet Network Processor (ENP) and provides native wireless access controller (AC) to help build a wired and wireless converged network. Its uniform user management capabilities deliver refined user and service management."
2909Arista Networks, Inc.
5453 Great America Parkway
Santa Clara, CA 95054

Richard Whitney
TEL: 703-627-6092
FAX: 408-538-8920

Ethan Rahn

CST Lab: NVLAP 100432-0
Arista Networks OpenSSL Module
(Software Version: openssl-1.0.2h-fips)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/15/20175/14/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): EOSv4 running on an Arista 7150S with AMD Athlon NEO X2
EOSv4 running on an Arista 7508 with Intel Sandy Bridge EN
EOSv4 running on an Arista 7308 with Intel Broadwell-DE
EOSv4 running on an Arista 7010T with AMD G Series: eKabini
EOSv4 running on an Arista 7060CX with AMD G Series: Steppe Eagle (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4280); CVL (Cert. #1012); DRBG (Cert. #1340); DSA (Cert. #1141); ECDSA (Cert. #998); HMAC (Cert. #2816); RSA (Cert. #2301); SHS (Cert. #3516); Triple-DES (Cert. #2309)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); MD5; RSA (key transport; key establishment methodology provides 112 or 128 bits of encryption strength); AES KW (non-compliant); AES-XTS (non-compliant); Blowfish; Camellia; CAST5; DES; DES-X; HMAC-MD5; IDEA; MD4; RC2; RC4; RC5; RIPEMD-160; SEED; Triple-DES KW (non-compliant); Whirlpool
Multi-Chip Stand Alone

"Arista’s crypto library is a comprehensive suite of FIPS Approved algorithms. Many key sizes and modes have been implemented to allow flexibility and efficiency."
2908Hewlett Packard Enterprise
3000 Hanover St
Palo Alto, CA 94304
USA

Fernie Fuentes

CST Lab: NVLAP 201029-0
Hewlett Packard Enterprise NSS Crypto Module
(Software Version: 4.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2711.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/13/201712/18/2021Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Physical Security: N/A
-Design Assurance: Level 2
-Tested Configuration(s): Tested as meeting Level 1 with Red Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 with PAARed Hat Enterprise Linux 7.1 running on HP ProLiant DL380p Gen8 without PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3605, #3606, #3607 and #3609); CVL (Certs. #626 and #627); DRBG (Certs. #936 and #937); DSA (Certs. #1002 and #1003); ECDSA (Certs. #739 and #740); HMAC (Certs. #2300 and #2301); RSA (Certs. #1854, #1855, #2034 and #2035); SHS (Certs. #2966 and #2967); Triple-DES (Certs. #2007 and #2008)

-Other algorithms: AES (Certs. #3605, #3606, #3607 and #3609, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Triple-DES (Certs.#2007 and #2008, key wrapping; key establishment methodology provides 112 bits of encryption strength); Camellia; DES; JPAKE; MD2; MD5; RC2; RC4; RC5; SEED;
Multi-Chip Stand Alone

"The Hewlett Packard Enterprise NSS Crypto Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for Hewlett Packard Enterprise components."
2907Canonical Ltd.
5th floor, Blue Fin Building
110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten

Andrew Cloke

CST Lab: NVLAP 200658-0
Ubuntu OpenSSH Client Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode with module Ubuntu OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #2888 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/10/20175/9/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB without PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR with PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR without PAA
Ubuntu 16.04 LTS 64-bit running on IBM z13 with PAI
Ubuntu 16.04 LTS 64-bit running on IBM z13 without PAI (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4354, #4355, #4356, #4357, #4358, #4359, #4360 and #4361); CVL (Certs. #1053, #1054, #1056, #1057, #1059, #1060, #1062, #1063, #1065, #1067, #1068, #1069, #1085, #1086, #1087, #1088, #1089, #1090 and #1091); DRBG (Certs. #1390, #1391, #1392, #1393, #1394, #1395, #1396 and #1397); DSA (Certs. #1156, #1157, #1158, #1159, #1160, #1161 and #1162); ECDSA (Certs. #1031, #1032, #1033, #1034, #1035, #1036 and #1037); HMAC (Certs. #2895, #2896, #2897, #2898, #2899, #2900 and #2901); RSA (Certs. #2351, #2352, #2353, #2354, #2355, #2356 and #2357); SHS (Certs. #3593, #3594, #3595, #3596, #3597, #3598 and #3599); Triple-DES (Certs. #2355, #2356 and #2357)

-Other algorithms: Diffie-Hellman (CVL Certs. #1053, #1056, #1059, #1062, #1065, #1067 and #1069; key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #1053, #1054, #1056, #1057, #1059, #1060, #1063, #1065, #1067, #1068 and #1069; key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); NDRNG; Ed25519
Multi-Chip Stand Alone

"Ubuntu OpenSSH Client cryptographic module provides the client-side component for an SSH protocol version 2 protected communication channel. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode."
2906Canonical Ltd.
5th floor, Blue Fin Building
110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten

Andrew Cloke

CST Lab: NVLAP 200658-0
Ubuntu OpenSSH Server Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode with module Ubuntu OpenSSL Cryptographic Module validated to FIPS 140-2 under Cert. #2888 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/10/20175/9/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB without PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR with PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR without PAA
Ubuntu 16.04 LTS 64-bit running on IBM z13 with PAI
Ubuntu 16.04 LTS 64-bit running on IBM z13 without PAI (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4354, #4355, #4356, #4357, #4358, #4359, #4360 and #4361); CVL (Certs. #1053, #1054, #1056, #1057, #1059, #1060, #1062, #1063, #1065, #1067, #1068, #1069, #1085, #1086, #1087, #1088, #1089, #1090 and #1091); DRBG (Certs. #1390, #1391, #1392, #1393, #1394, #1395, #1396 and #1397); DSA (Certs. #1156, #1157, #1158, #1159, #1160, #1161 and #1162); ECDSA (Certs. #1031, #1032, #1033, #1034, #1035, #1036 and #1037); HMAC (Certs. #2895, #2896, #2897, #2898, #2899, #2900 and #2901); RSA (Certs. #2351, #2352, #2353, #2354, #2355, #2356 and #2357); SHS (Certs. #3593, #3594, #3595, #3596, #3597, #3598 and #3599); Triple-DES (Certs. #2355, #2356 and #2357)

-Other algorithms: Diffie-Hellman (CVL Certs. #1053, #1056, #1059, #1062, #1065, #1067 and #1069; key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #1053, #1054, #1056, #1057, #1059, #1060, #1063, #1065, #1067, #1068 and #1069; key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); NDRNG; Ed25519
Multi-Chip Stand Alone

"Ubuntu OpenSSH Server cryptographic module provides the server-side component for an SSH protocol version 2 protected communication channel. Its cryptographic mechanisms use the OpenSSL library in FIPS 140-2 mode."
2905Becrypt Limited
Artillery House
11-19 Artillery Row
London, England SW1P 1RT
United Kingdom

Mark Wilce
TEL: +44 207 557 6515
FAX: +44 845 838 2060

CST Lab: NVLAP 200416-0
Becrypt Cryptographic Library
(Hardware Version: Intel Core i5-4300Y; Software Version: 3.0)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software-Hybrid05/10/20175/9/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): MS-DOS 6.22 (16-bit) running on a Fujitsu LifeBook S7020 laptop
Microsoft Windows 7 Ultimate Edition (32-bit) running on a Dell D630
Microsoft Windows 7 Enterprise Edition (64-bit) running on a Dell Vostro 1500
Microsoft Windows 8.1 Professional (64-bit) running on a Dell Venue 11 Pro (7130) with PAA
Ubuntu Linux 12.04 LTS (32-bit) running on a Dell D630
Ubuntu Linux 12.04 LTS (64-bit) running on a Dell Vostro 1500
Android v4.2.2 running on a Google Nexus 7 (2012) (single-user mode)

-FIPS Approved algorithms: AES (Certs. #2883 and #2885); DRBG (Cert. #520); HMAC (Certs. #1817 and #1819); RSA (Cert. #1516); SHS (Certs. #2423 and #2426)

-Other algorithms: AES (Certs. #2883 and #2885, key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength); AES (non-compliant); PRNG
Multi-Chip Stand Alone

"The Becrypt Cryptographic Library provides core cryptographic functionality for Becrypt's security products providing a capability to develop complex and flexible security applications that require cryptographic functionality for pre-OS (16-bit), 32-bit and 64-bit operating environments."
2904Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Hamid Sobouti
TEL: 408-333-4150
FAX: 408-333-8101

CST Lab: NVLAP 200802-0
Brocade® NetIron® CER 2000 Series Ethernet Routers and Brocade NetIron® CES 2000 Series Ethernet Switches
(Hardware Versions: {[BR-CER-2024C-4X-RT-AC (80-1006530-01) with RPS9 (80-1003868-01) and SW-CER-2024-RTUPG (80-1004848-01), BR-CER-2024C-4X-RT-DC (80-1007213-01) with RPS9DC (80-1003869-02) and SW-CER-2024-RTUPG (80-1004848-01), BR-CER-2024F-4X-RT-AC (80-1006529-01) with RPS9 (80-1003868-01) and SW-CER-2024-RTUPG (80-1004848-01), BR-CER-2024F-4X-RT-DC (80-1007212-01) with RPS9DC (80-1003869-02) and SW-CER-2024-RTUPG (80-1004848-01)], [BR-CES-2024C-4X-AC (80-1000077-01) with RPS9 (80-1003868-01), BR-CES-2024C-4X-DC (80-1007215-01) with RPS9DC (80-1003869-02), BR-CES-2024F-4X-AC (80-1000037-01) with RPS9 (80-1003868-01), BR-CES-2024F-4X-DC (80-1007214-01) with RPS9DC (80-1003869-02)]} with FIPS Kit XBR-000195; Firmware Version: Multi-Service IronWare R06.0.00aa)
(When operated in FIPS mode with the tamper evident labels installed and configured as specified in Section 12 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware05/10/20175/9/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2715 and #3143); CVL (Certs. #173, #394 and #403); DRBG (Cert. #452); HMAC (Cert. #1694); RSA (Cert. #1411); SHS (Cert. #2280)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; HMAC-SHA-1-96 (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The Brocade NetIron CER 2000 Series is a family of compact routers that are purpose-built for high-performance Ethernet edge routing and MPLS applications. The Brocade NetIron CES2000 Series of switches provides IP routing and advanced Carrier Ethernet capabilities in a compact form factor."
2903Toshiba Memory Corporation
1-1, Shibaura 1-chome
Minato-ku
Tokyo 105-8001
Japan

Akihiro Kimura
TEL: +81-45-890-2856
FAX: +81-45-890-2593

CST Lab: NVLAP 200822-0
Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive (PX05S model) Type B1
(Hardware Versions: A2 with PX05SVQ040B, A2 with PX05SRQ192B, A2 with PX05SRQ384B; Firmware Version: PX05PD43)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware05/10/20175/9/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3485, #3486 and #3487); DRBG (Cert. #867); HMAC (Cert. #2231); RSA (Cert. #1795); SHS (Cert. #2879)

-Other algorithms: NDRNG
Multi-Chip Embedded

"The Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive is used for solid state drive data security. This Cryptographic Module (CM) provides various cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption, cryptographic erase, independently protected user data LBA bands, and FW download."
2902Cisco Systems, Inc.
170 W Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco Firepower Next-Generation IPS Virtual (NGIPSv) Cryptographic Module
(Software Version: 6.1)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/09/20175/8/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Physical Security: N/A
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): NGIPSv 6.1 on Vmware ESXi 5.5 running on Cisco C220 M3 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4411); CVL (Cert. #1117); DRBG (Cert. #1425); ECDSA (Cert. #1063); HMAC (Cert. #2932); RSA (Cert. #2397); SHS (Cert. #3637); Triple-DES (Cert. #2377)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Stand Alone

"The virtualized offering of the Cisco FirePOWER next-generation IPS (NGIPS) solution providing the Industry-leading threat protection. Real-time contextual awareness. Full-stack visibility. Intelligent security automation. This virtualized highly effective intrusion prevention system provides reliable performance and a low total cost of ownership. Threat protection can be expanded with optional subscription licenses to provide Advanced Malware Protection (AMP), application visibility and control, and URL filtering capabilities."
2901Huawei Technologies Co., Ltd.
101 Software Avenue
Yuhuatai District
NANJING, JIANGSU 210000
CHINA

Yang Ze (Allen)
TEL: +86 15919432118

Shi Lisha
TEL: +86 13451902202

CST Lab: NVLAP 100432-0
Huawei AR1200 and AR2200 Series Routers
(Hardware Versions: AR1220E P/N 02350DQJ Version E.5 with [1], AR1220EVW P/N 02350DQL Version F.5 with [1] and AR2220E P/N 02350DQM Version E.6 with [1]; Tamper Evident Seals P/N 4057-113016 [1]; Firmware Version: V200R008C10SPC110)
(When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy. The protocols IKEv1 and SNMP shall not be used when operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware05/08/20175/7/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4323, #4324 and #4325); CKG (vendor affirmed); CVL (Cert. #1036); DRBG (Cert. #1379); ECDSA (Cert. #1023); HMAC (Certs. #2861, #2862 and #2863); KTS (AES Cert. #4323 and HMAC Cert. #2861; key establishment methodology provides 128 bits of encryption strength); KTS (Triple-DES Cert. #2335 and HMAC Cert. #2861; key establishment methodology provides 112 bits of encryption strength); SHS (Certs. #3565, #3566 and #3567); Triple-DES (Certs. #2335, #2336 and #2337)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2861); NDRNG; Blowfish; DES; HMAC-MD5; IKEv1 KDF (non-compliant); MD5; SM1; SM3; SM4; SNMP KDF (non-compliant)
Multi-Chip Stand Alone

"ARs are located between an enterprise network and a public network, functioning as the only ingress and egress for data transmitted between the two networks. The deployment of various network services over the ARs reduces operation & maintenance (O&M) costs as well as those associated with establishing an enterprise network."
2900SAP SE
Dietmar-Hopp-Allee 16
Walldorf 69190
Germany

Stephan André
TEL: +49-6227-7-47474
FAX: +49-6227-78-55975

Thomas Rothe
TEL: +49-6227-7-47474
FAX: +49-6227-78-55989

CST Lab: NVLAP 200636-0
SAP CommonCryptoLib Crypto Kernel
(Software Versions: 8.4.47.0 32-bit [1] and 64-bit [2])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/05/20175/4/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): AIX 5.2 64-bit running on a IBM eServer p5 505 without PAA [2]
AIX 6.1 64-bit on IBM PowerVM 2.2 running on a IBM Power 750 Express without PAA [1][2]
HP-UX 11.11 64-bit running on a HP Server rp3440 [2]
HP-UX 11.23 64-bit running on a HP Server rx5670 [2]
HP-UX 11.31 64-bit running on a HP Integrity rx6600 [1][2]
Linux 2.6.5 64-bit running on a HP ProLiant DL585 without PAA [1][2]
Linux 2.6.32 32-bit running on a HP ProLiant DL385-G2 DC [1]
Linux 2.6.32 64-bit running on a HP Integrity rx2660 [2]
Linux 2.6.32 64-bit on IBM PowerVM 2.2 running on a IBM Power 750 Express without PAA [1][2]
Linux 3.0.101 64-bit on IBM PowerVM 2.2 running on a IBM Power System S824 with PAA [2]
Linux 3.0.101 64-bit on Vmware ESXi 5.1.0 running on a HP ProLiant DL580 G7 with PAA [1][2]
Linux 3.0.101 64-bit on IBM z/VM 6.2.0 running on a IBM zEnterprise 196 (2817 series) [2]
SunOS 5.9 64-bit running on a Sun Fire V440 [2]
SunOS 5.10 64-bit running on a Fujitsu PrimePower 650 [1][2]
SunOS 5.10 64-bit running on a Sun Fire X4150 without PAA [1][2]
Windows Server 2008 SP2 64-bit running on a HP ProLiant DL380 G6 without PAA [1][2]
Windows Server 2008 R2 SP1 64-bit on Vmware ESXi 5.1.0 running on a HP ProLiant DL580 G7 with PAA [1][2] (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3665 and #3666); CVL (Certs. # 670, #671, #672, #673, #674, and #675); DRBG (Certs. #986 and #987); DSA (Certs. #1035 and #1036); ECDSA (Certs. #772 and #773); HMAC (Certs. #2415 and #2416); RSA (Certs. #1898 and #1899); SHS (Certs. #3083 and #3084); Triple-DES (Certs. #2047 and #2048)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; ElGamal; IDEA; MD2; MD4; MD5; RC2; RC4; RC5-32; RIPEMD-128; RIPEMD-160
Multi-Chip Stand Alone

"SAP CommonCryptoLib Crypto Kernel v8.4.47.0 is a shared library, i.e. it consists of software only. SAP CommonCryptoLib Crypto Kernel provides an API in terms of C++ methods for key management and operation of cryptographic functions."
2899Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco Firepower Management Center Virtual (FMCv) Cryptographic Module
(Software Version: 6.1)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/04/20175/3/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Physical Security: N/A
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): FMC Virtual 6.1 on Vmware ESXi 5.5 running on Cisco C220 M3 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4411); CVL (Cert. #1117); DRBG (Cert. #1425); ECDSA (Cert. #1063); HMAC (Cert. #2932); RSA (Cert. #2397); SHS (Cert. #3637); Triple-DES (Cert. #2377)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Stand Alone

"The Firepower Management Center Virtual working like the Firepower Management Center appliance aggregates and correlates network traffic information and performance data, assessing the impact of events on particular hosts. You can monitor the information that your device reports, and assess and control the overall activity that occurs on your network. The FMCv also controls the network management features on your devices: switching, routing, NAT and VPN."
2898Cisco Systems, Inc.
170 W Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco ASA Cryptographic Module
(Hardware Versions: FPR4110-ASA-K9, FPR4120-ASA-K9, FPR4140-ASA-K9, FPR4150-ASA-K9, FPR9K-SM-24 (SM-24) and FPR9K-SM-36 (SM-36); Firmware Version: 9.6)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware05/04/2017
05/12/2017
5/3/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2034, #2035 and #4249); CVL (Cert. #1002); DRBG (Certs. #197 and #1328); ECDSA (Cert. #989); HMAC (Certs. #1233 and #2787); RSA (Cert. #2298); SHS (Certs. #1780 and #3486); Triple-DES (Certs. #1311 and #2304)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Embedded

"The market-leading Cisco ASA delivering robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA provides comprehensive security, performance, and reliability for network environments."
2897Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco Firepower Management Center Cryptographic Modules
(Hardware Versions: FS750-K9, FS1500-K9, FS2000-K9, FS3500-K9 and FS4000-K9; Firmware Version: 6.1)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware05/04/20175/3/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4266); CVL (Cert. #1008); DRBG (Cert. #1337); ECDSA (Cert. #995); HMAC (Cert. #2811); RSA (Cert. #2297); SHS (Cert. #3512); Triple-DES (Cert. #2307)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Stand Alone

"Firepower Management Center provides complete and unified management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection, easily go from managing a firewall to controlling applications to investigating and remediating malware outbreaks. You can monitor the information that your device reports, and assess and control the overall activity that occurs on your network. The FMC also controls the network management features on your devices: switching, routing, NAT and VPN."
2896Pulse Secure, LLC
2700 Zanker Road, Suite 200
San Jose, CA 95134
USA

Yin Wei
TEL: 408-676-8868

Yvonne Sang
TEL: 844-807-8573

CST Lab: NVLAP 100432-0
Pulse Secure Cryptographic Module
(Software Version: 2.0)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software05/03/20175/2/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): IVE OS 2.0 32-bit with Intel Atom Processor N270 (x86) on Pulse Secure MAG 2600
IVE OS 2.0 64-bit with Intel Pentium Processor E2160 (x86) on Pulse Secure MAG 4610
IVE OS 2.0 64-bit with Intel Pentium Processor E2160 (x86) on Pulse Secure MAG SM160
IVE OS 2.0 64-bit with Intel Core2 Quad Q9400 (x86) on Pulse Secure MAG SM360
IVE OS 2.0 64-bit with Intel Celeron Processor J1900 (x86) on Pulse Secure PSA300
IVE OS 2.0 64-bit with Intel Celeron Processor J1900 (x86) on Pulse Secure PSA3000
IVE OS 2.0 64-bit with Intel Pentium Processor G3420 (x86) on Pulse Secure PSA5000
IVE OS 2.0 64-bit with Intel Xeon E3-1275v3 (x86) on Pulse Secure PSA 7000f
IVE OS 2.0 64-bit with Intel Xeon E3-1275v3 (x86) on Pulse Secure PSA 7000c
Pulse One version 2.0 with Intel Xeon E3-1275v3 (x86) on Pulse Secure PSA 7000f
Pulse One version 2.0 with Intel Xeon E3-1275v3 (x86) on Pulse Secure PSA 7000c
IVE OS 2.0 64-bit on Vmware ESXi with Intel Xeon E5-2620 v4 on Dell Power Edge R430/R530, Intel Xeon E5-2620 v4 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4334 and #4341); CVL (Cert. #1046); DRBG (Cert. #1384); DSA (Cert. #1152); ECDSA (Cert. #1026); HMAC (Cert. #2880); RSA (Cert. #2345); SHS (Cert. #3577); Triple-DES (Certs. #2346 and #2347)

-Other algorithms: EC Diffie-Hellman (CVL Cert. #1046, key agreement, key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); PRNG
Multi-Chip Stand Alone

"Pulse Secure's portfolio delivers Secure Access solutions for people, devices, things and services. It includes Pulse Connect Secure - the most reliable and feature rich VPN, Pulse Policy Secure - powerful Network Access Control (NAC) with granular network visibility and access control, Pulse Workspace - simplified enterprise mobility management (EMM), Pulse One - centralized management, and the Pulse Unified Client - a single client to connest them all. Together they provide users with secure remote, campus, mobile, and cloud access based on their role, identity, device and location."
2895Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200928-0
Cisco Aironet 1532e/i, 1552e/i, 1572 EAC, 1602e/i, 1702i, 2602e/i, 2702e/i, 3502e/i, 3602e/i/p, 3702e/i/p and IW3702-2E/4E Wireless LAN Access Points
(Hardware Versions: 1532e[5], 1532i[5], 1552e[2], 1552i[2], 1572 EAC[4], 1602e[3], 1602i[3], 1702i[4], 2602e[4], 2602i[4], 2702e[4], 2702i[4], 3502e[2], 3502i[2], 3602e[4], 3602i[4], 3602p[4], 3702e[4], 3702i[4], 3702p[4], 3602e[1,4], 3602i[1,4], 3602p[1,4], 3702e[1,4], 3702i[1,4], 3702p[1,4], IW3702-2E[4] and IW3702-4E[4] with AIR-RM3000M[1], Marvell 88W8364[2], Marvell 88W8763C[3], Marvell 88W8764C[4] and Qualcomm Atheros AES-128w10i[5]} with FIPS Kit: AIRLAP-FIPSKIT=, VERSION B0; Firmware Version: 8.3)
(When operated in FIPS mode with tamper evident seals installed as indicated in the Security Policy.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware05/02/20175/1/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2334, #2335, #2450, #2817, #2846 and #2901); CVL (Certs. #253 and #536); DRBG (Certs. #481 and #534); HMAC (Certs. #1764 and #1836); RSA (Certs. #1471 and #1529); SHS (Certs. #2361 and #2441)

-Other algorithms: AES (Certs. #2817 and #2901, key wrapping; key establishment methodology provides 128 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); MD5; NDRNG; SHA-512 (non-compliant)
Multi-Chip Stand Alone

"Cisco Aironet Series Wireless Access Points provide highly secure and reliable wireless connections for both indoor and outdoor environments."
2894General Dynamics Mission Systems
150 Rustcraft Road
Dedham, MA 02026
USA

Ramin Taraz
TEL: 978-923-6400

CST Lab: NVLAP 200427-0
Fortress Mesh Points
(Hardware Versions: ES210, ES2440, ES520v1, ES520v2 and ES820; Firmware Version: 5.4.5)
(When operated in FIPS mode. The protocols SNMP and TLS shall not be used when operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/28/20174/27/2022Overall Level: 2

-Design Assurance: Level 3
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #1519, #1520 and #3506); CVL (Certs. #573, #937 and #938); DRBG (Certs. #66 and #874); DSA (Cert. #1053); ECDSA (Certs. #716 and #833); HMAC (Certs. #889, #890 and #2238); KAS (Cert. #95); KBKDF (Cert. #112); RSA (Certs. #1800 and #1967); SHS (Certs. #1357, #1358 and #2891)

-Other algorithms: MD5; NDRNG; PRNG; SNMP KDF (non-compliant); TLS KDF (non-compliant)
Multi-Chip Stand Alone

"The Fortress Mesh Point is an all-in-one network access device housed in a rugged compact chassis, with the most stringent security available today built in. It can serve as a wireless bridge, a WLAN access point, and an eight-port LAN switch, while performing all the functions of a Fortress controller device: encrypting wireless traffic and providing Multi-factor Authentication for devices on the network it protects."
2893Panasonic Corporation
4-1-62, Minoshima, Hakata-ku
Fukuoka, Fukuoka 812-8531
Japan

Masakatsu Matsuo
TEL: +81-50-3380-5930

CST Lab: NVLAP 200822-0
Panasonic Cryptographic Module
(Software Version: 1.04)
(When operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software04/27/20174/26/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Linux kernel 3.13 32 bit on running on HP Elite Desk (Intel Core i7) (gcc Compiler Version 4.8.2) (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4366); DRBG (Cert. #1404); HMAC (Cert. #2905); RSA (Cert. #2364); SHS (Cert. #3603); Triple-DES (Cert. #2361)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); DES; RSA (encrypt/decrypt)
Multi-Chip Stand Alone

"Panasonic Cryptographic Module provides high performance cryptographic processing for embedded devices."
2892Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
312 Kings Way
South Melbourne, Victoria 3205
Australia

John Weston
TEL: +61 3 9868 4555
FAX: +61 3 9821 4899

Laurie Mack
TEL: 613-221-5065
FAX: 613-723-5079

CST Lab: NVLAP 200996-0
CN9000 Series Encryptors
(Hardware Version: Senetas Corp. Ltd. CN9000 Series: A9100B (AC); Senetas Corp. Ltd. & SafeNet Inc. CN9000 Series: A9100B (AC); Firmware Version: 3.0.0)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware04/26/20174/25/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4113 and #4122); CVL (Cert. #928); DRBG (Cert. #1242); ECDSA (Cert. #937); HMAC (Cert. #2693); KAS (Cert. #94); RSA (Cert. #2228); SHS (Cert. #3391); Triple-DES (Cert. #2252)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 150 bits of encryption strength)
Multi-Chip Stand Alone

"The CN9000 Series Encryptors are high-speed hardware encryption platforms that secure data over optical Ethernet networks. The model included is the CN9100 100G Ethernet Encryptor, operating at a line rate of 100Gb/s. Data privacy is provided by FIPS approved AES CTR algorithms."
2891Vormetric, Inc.
2860 Junction Ave
San Jose, CA 95134
USA

Peter Tsai
TEL: 669-770-6927

Janice Cheng
TEL: 669-770-6823

CST Lab: NVLAP 200002-0
Vormetric Application Encryption Module
(Software Version: 5.2.5)
(When installed, initialized and configured as specified in Section 10 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software04/25/20174/24/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Red Hat Enterprise Linux 7.1 running on an ASUS Desktop PC M51AC-US002S
Windows Server 2012 R2 running on an ASUS Desktop PC M51AC-US002S (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4088); HMAC (Cert. #2668); SHS (Cert. #3364)

-Other algorithms: N/A
Multi-Chip Stand Alone

"Vormetric Application Encryption is a library to simplify integrating application-level encryption into existing corporate applications. The application encryption library provides a set of documented standard-based APIs used to perform cryptographic and encryption key management operations. The innovative product design enables developers to choose to standard AES encryption or schema maintaining Format Preserving Encryption (FPE). Vormetric Application Encryption removes the complexity and risk of implementing an in-house encryption and key management solution."
2890

CST Lab: NVLAP 200802-0


Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/25/20174/24/2022Overall Level: 1

Multi-Chip Embedded
2889Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200928-0
Cisco Aironet 1562 e/i/d/ps, 2802 e/i and 3802 e/i/p Wireless LAN Access Points
(Hardware Versions: 1562e, 1562i, 1562d, 1562ps, 2802e, 2802i, 3802e, 3802i, 3802p with FIPS Kit: AIRLAP-FIPSKIT=, VERSION B0; Firmware Version: 8.3)
(When operated in FIPS mode with tamper evident seals installed as indicated in the Security Policy.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/25/20174/24/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4114, #4340, #4367 and #4409); CVL (Certs. #1115 and #1116); DRBG (Cert. #1422); ECDSA (Cert. #1061); HMAC (Certs. #2906 and #2931); KBKDF (Cert. #126); KTS (AES Cert. #4409; key wrapping; key establishment methodology provides 128 and 256 bits of encryption strength); RSA (Certs. #2344 and #2396); SHS (Certs. #3576, #3604, and #3635)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1116, key agreement; key establishment methodology provides 128 and 192 bits of encryption strength); MD5; NDRNG
Multi-Chip Stand Alone

"Cisco Aironet Series Wireless Access Points provide highly secure and reliable wireless connections for both indoor and outdoor environments."
2888Canonical Ltd.
5th floor, Blue Fin Building
110 Southwark Street
London SE1 0SU
United Kingdom

Joy Latten

Andrew Cloke

CST Lab: NVLAP 200658-0
Ubuntu OpenSSL Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software04/24/2017
06/06/2017
4/23/2022Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8247-22L without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8001-22C without PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB with PAA
Ubuntu 16.04 LTS 64-bit Little Endian running on IBM Power System 8335-GTB without PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR with PAA
Ubuntu 16.04 LTS 64-bit running on Supermicro SYS-5018R-WR without PAA
Ubuntu 16.04 LTS 64-bit running on IBM z13 with PAI
Ubuntu 16.04 LTS 64-bit running on IBM z13 without PAI (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4354, #4355, #4356, #4357, #4358, #4359, #4360, #4361, #4370, #4371, #4372, #4373, #4374 and #4375); CVL (Certs. #1055, #1058, #1061, #1064, #1066, #1068 and #1070); DRBG (Certs. #1390, #1391, #1392, #1393, #1394, #1395, #1396 and #1397); DSA (Certs. #1156, #1157, #1158, #1159, #1160, #1161 and #1162); ECDSA (Certs. #1031, #1032, #1033, #1034, #1035, #1036 and #1037); HMAC (Certs. #2895, #2896, #2897, #2898, #2899, #2900 and #2901); KTS (AES Certs. #4354, #4357, #4358 and #4360; key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (Certs. #2351, #2352, #2353, #2354, #2355, #2356 and #2357); SHS (Certs. #3593, #3594, #3595, #3596, #3597, #3598 and #3599); Triple-DES (Certs. #2355, #2356 and #2357)

-Other algorithms: Diffie-Hellman (CVL Certs. #1053, #1056, #1059, #1062, #1065, #1067 and #1069; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #1053, #1054, #1056, #1057, #1059, #1060, #1063, #1065, #1067, #1068 and #1069; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES (non-compliant); MD5; PRNG; RSA (non-compliant); SHA (non-compliant)
Multi-Chip Stand Alone

"OpenSSL is an open-source library of various cryptographic algorithms written mainly in C."
2887Fortinet, Inc.
326 Moodie Drive
Ottawa, ON K2H 8G3
Canada

Alan Kaye
TEL: 613-225-9381 x7416
FAX: 613-225-2951

CST Lab: NVLAP 200928-0
FortiGate-VM Virtual Appliance
(Software Versions: FortiGate-VM64 v5.2.7,build0718,160328)
(When operated in FIPS mode. There is no assurance of the minimum strength of generated keys)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software04/21/20174/20/2022Overall Level: 1

-Cryptographic Module Ports and Interfaces: Level 3
-Roles, Services, and Authentication: Level 3
-Physical Security: N/A
-Design Assurance: Level 3
-Tested Configuration(s): FortiGate-VM on VMware ESXi 5.5 (single-user mode) running on Dell PowerEdge R720 with Intel Xeon E5-2620 processor with the Fortinet entropy token (part number FTR-ENT-1)

-FIPS Approved algorithms: AES (Certs. #4021 and #4022); CVL (Certs. #850 and #851); DRBG (Cert. #1199); HMAC (Certs. #2623 and #2624); RSA (Cert. #2191); SHS (Certs. #3317 and #3318); Triple-DES (Certs. #2201 and #2202)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 201 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; HMAC-MD5; MD5
Multi-Chip Stand Alone

"The FortiGate-VM appliances are software modules designed to execute on a General Purpose Computer (GPC) hardware platform running the VMware hypervisor and FortiOS 5.2. The FortiOS provides integrated firewall, VPN, antivirus, antispam, intrusion prevention, content filtering and traffic shaping and HA capabilities."
2886Seagate Technology LLC
1280 Disc Drive
Shakopee, MN 55379
USA

David R Kaiser, PMP
TEL: 952-402-2356
FAX: 952-402-1273

CST Lab: NVLAP 200427-0
Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive
(Hardware Versions: ST10000NM0176 [1] and ST10000NM0186 [2]; Firmware Versions: SF02 [1] and NF02 [2])
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/20/20174/19/2022Overall Level: 2

-Cryptographic Module Specification: Level 3
-Roles, Services, and Authentication: Level 3
-EMI/EMC: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #1343, #2841, #2947, #3759, #3760 and #4279); CKG (vendor affirmed); CVL (Certs. #828 and #852); DRBG (Cert. #1146); HMAC (Certs. #2613 and #2815); PBKDF (vendor affirmed); RSA (Certs. #2056 and #2300); SHS (Certs. #3304 and #3515)

-Other algorithms: Diffie-Hellman (CVL Cert. #852, key agreement; key establishment methodology provides 112 bits of encryption strength); NDRNG
Multi-Chip Embedded

"The Seagate Secure® TCG Enterprise SSC Self-Encrypting Drive FIPS 140-2 Module is embodied in Seagate Enterprise Performance SED model disk drives. These products meet the performance requirements of the most demanding Enterprise applications. The cryptographic module (CM) provides a wide range of cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption (AES-XTS), instantaneous user data disposal with cryptographic erase, independently controlled and protected user data LBA bands and authenticated FW download."
2885SonicWall, Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

Lawrence Wagner
TEL: 408-752-7886

Usha Sanagala

CST Lab: NVLAP 100432-0
SonicWall v11.4 EX6000, EX7000, EX9000, SMA 6200, SMA 7200
(Hardware Versions: P/Ns 101-500210-78 Rev A, 101-500188-79 Rev A, 101-500352-62 Rev A, 101-500399-61 Rev B, 101-500398-61 Rev B; Firmware Version: 11.4.0-512)
(When configured as specified in Section 8 and tamper-evident seals installed as indicated in the Security Policy and operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware04/19/2017
06/12/2017
4/18/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4044, #4045 and #4046); CVL (Certs. #869, #870, #871 and #872); DRBG (Cert. #1211); ECDSA (Certs. #906 and #907); HMAC (Certs. #2639, #2640 and #2641); RSA (Certs. #2076 and #2077); SHS (Certs. #3333, #3334 and #3335); Triple-DES (Certs. #2211, #2212 and #2213)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 or 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. 2641); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); RC4
Multi-Chip Stand Alone

"SonicWall Software SRA EX6000, SMA 6200, SRA EX7000, SMA 7200 and SRA EX9000 are part of the SonicWall Security Solution Enterprise product family. They provide hardware appliance based VPN Virtual Private Network mobile access solutions to a wide variety of end user devices including Microsoft Windows, Apple OSX, Linux, Apple iOS, Google Android and Google Chromebook among others."
2884Mercury Systems, Inc.
3601 East University Drive
Phoenix, AZ 85034
USA

Bob Lazaravich
TEL: 602-437-1520

Iain Mackie
TEL: 602-458-3450

CST Lab: NVLAP 100432-0
Mercury Systems ASURRE-Stor™ SSD
(Hardware Versions: P/Ns ASD256AM2R-0yzIF, 3.0; ASD512AM2R-0yzIF, 3.0; ADR256AM2R-0yzIF, 3.0; ADR512AM2R-0yzIF, 3.0 (as described in Security Policy, Table 4); Firmware Version: 1.5.0)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/19/20174/18/2022Overall Level: 2

-Cryptographic Module Specification: Level 3
-EMI/EMC: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2802, #3986 and #3987); DRBG (Cert. #1179); ECDSA (Cert. #883); HMAC (Cert. #2602); KTS (AES Cert. #3987); PBKDF (vendor affirmed); SHS (Cert. #3291)

-Other algorithms: NDRNG
Multi-Chip Embedded

"The Mercury Systems ASURRE-Stor™ SSD implements an industry standard 2.5" secure solid state hard drive. Unlike many secure SSDs, the ASURRE-Stor™ SSD does not depend on a TPM device, TCG, or OPAL to implement security. Instead the ASURRE-Stor™ SSD implements security using AES-256 XTS encryption and several key management techniques that are compatible with the ATA specification. These techniques provide superior and flexible solutions for mission critical defense applications and have no requirements for unencrypted shadow MBR sectors or 3rd party OPAL software."
2883HGST, a Western Digital company
5601 Great Oaks Parkway
San Jose, CA 95119
USA

Michael Williamson
TEL: 408-717-8458
FAX: 408-717-9494

Jithendra Bethur
TEL: 408-717-5951
FAX: 408-717-9494

CST Lab: NVLAP 100432-0
HGST Ultrastar C15K600 TCG Enterprise HDDs
(Hardware Versions: HUC156060CS4205 (2), HUC156045CS4205 (2), HUC156030CS4205 (2), HUC156060CSS205 (2), HUC156045CSS205 (2), HUC156030CSS205 (2); Firmware Version: RAA2 or RD02)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware04/18/2017
05/23/2017
4/17/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2067 and #2365); DRBG (Cert. #302); HMAC (Cert. #1468); PBKDF (vendor affirmed); RSA (Cert. #1220); SHS (Cert. #2037)

-Other algorithms: NDRNG
Multi-Chip Embedded

"HGST Self-Encrypting Drives implement TCG Storage specifications, and meet or exceed the most demanding performance and security requirements. The Ultrastar C15K600 series are 12Gbs SAS, TCG Enterprise HDDs."
2882

CST Lab: NVLAP 200427-0


Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/25/20174/24/2022Overall Level: 2

Multi-Chip Stand Alone
2881SPYRUS, Inc.
1860 Hartog Drive
San Jose, CA 95131
USA

William Sandberg-Maitland
TEL: 613-298-3416
FAX: 408-392-0319

CST Lab: NVLAP 200802-0
SPYCOS 3.0 microSDHC™ TrustedFlash Module
(Hardware Versions: 851-315013F (16GB) and 851-315014F (32GB); Firmware Version: 1.0)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware04/13/20174/12/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3028, #3115 and #4241); CKG (vendor affirmed); CVL (Cert. #419); DRBG (Cert. #658); ECDSA (Cert. #578); HMAC (Cert. #1913); KAS (Cert. #52); KBKDF (Cert. #111); KTS (AES Cert. #3115; key establishment methodology provides between 128 and 256 bits of encryption strength); RSA (Cert. #1611); SHS (Cert. #2529); Triple-DES (Cert. #1772)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Embedded

"The SPYCOS 3.0 microSDHC™ TrustedFlash Module integrates a FIPS 140-2 Level 3 PKI hardware security module employing efficient elliptic curve cryptography with a hardware-based AES 256-bit encrypted flash for secure user data storage. It provides high assurance hardware encryption services to protect data at rest and the authentication services for strong two-factor authentication for any network or cloud service."
2880HGST, a Western Digital company
5601 Great Oaks Parkway
San Jose, CA 95119
USA

Michael Williamson
TEL: 408-717-8458
FAX: 408-717-9494

Jithendra Bethur
TEL: 408-717-5951
FAX: 408-717-9494

CST Lab: NVLAP 100432-0
HGST Ultrastar C10K1800 TCG Enterprise HDDs
(Hardware Versions: HUC101818CS4205 (2) [1, 2, 3, 4, 5, 6], HUC101818CS4205 (3) [1, 2, 3, 4, 5, 6], HUC101812CS4205 (2) [1, 4], HUC101812CS4205 (3) [1, 4], HUC101890CS4205 (2) [1, 2, 4, 6], HUC101890CS4205 (3) [1, 2, 4, 6], HUC101860CS4205 (2) [1, 4], HUC101860CS4205 (3) [1, 4], HUC101845CS4205 (2) [1, 4], HUC101845CS4205 (3) [1, 4], HUC101812CSS205 (2) [1, 4], HUC101812CSS205 (3) [1, 4], HUC101890CSS205 (2) [1, 4], HUC101890CSS205 (3) [1, 4], HUC101860CSS205 (2) [1, 4], HUC101860CSS205 (3) [1, 4], HUC101830CSS205 (2) [1, 4], HUC101830CSS205 (3) [1, 4]; Firmware Versions: RAA2 [1], RAG0 [2], RAH0 [3], RD02 [4], FM30 [5] or NA01[6])
(When installed, initialized and configured as specified in Section 7.2 of the Security Policy and operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/11/2017
05/23/2017
06/01/2017
4/10/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2067 and #2365); DRBG (Cert. #302); HMAC (Cert. #1468); KTS (AES Cert. #2365); PBKDF (vendor affirmed); RSA (Cert. #1220); SHS (Cert. #2037)

-Other algorithms: NDRNG
Multi-Chip Embedded

"HGST Self-Encrypting Drives implement TCG Storage specifications, and meet or exceed the most demanding performance and security requirements. The Ultrastar C10K1800 series are 12Gbs SAS, TCG Enterprise HDDs."
2879Barco n.v.
Beneluxpark 21
Kortrijk 8500
Belgium

Tom Bert
TEL: 32 (0) 56 36 89 67

CST Lab: NVLAP 200802-0
Barco ICMP
(Hardware Version: R7681272-02; Firmware Version: 1.3.0.15735B)
(When operated in FIPS mode. The protocol TLS shall not be used when operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/11/20174/10/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Physical Security: Level 3
-EMI/EMC: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: RSA (Cert. #2295); SHS (Cert. #3491)

-Other algorithms: AES (non-compliant); DRBG (non-compliant); EC Diffie-Hellman (non-compliant); HMAC (non-compliant); HMAC-MD5; MD5; NDRNG; PRNG; SHS (non-compliant); TLS KDF (non-compliant)
Multi-Chip Embedded

"DCI compliant Barco integrated Image Media Block."
2878Axon Enterprise, Inc
17800 N 85th St.
Suite 350
Scottsdale, AZ 85255
USA

Gregory Hewes

Jenner Holden

CST Lab: NVLAP 201029-0
Axon Cryptographic Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software04/06/20172/4/2021Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with CentOS 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Dual EC DRBG; PRNG
Multi-Chip Stand Alone

"The Axon Cryptographic Module is a software cryptographic module that provides core cryptographic functions for secure key management, data integrity, and secure communications to Axon cloud based services."
2877WatchGuard Technologies, Inc.
505 Fifth Avenue South, Suite 500
Seattle, WA 98104
USA

Peter Eng
TEL: 206-613-6600

CST Lab: NVLAP 200556-0
WatchGuard Firebox T10[1], T10-W[2], T30[3], T30-W[4], T50[5], T50-W[6]
(Hardware Version: DS1AE3 [1]; DS3AE3 [2]; BS3AE5 [3]; BS3AE5W [4]; BS5AE7 [5]; BS5AE7W [6]; FIPS Kit P/N: WG8566; Firmware Version: Fireware OS v11.11.2)
(When operated in FIPS mode and with the tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/06/20174/5/2022Overall Level: 2

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3673, #3674, #3675, and #3960); CVL (Cert. #793); DRBG (Cert. #1160); HMAC (Certs. #2420, #2421, #2422, and #2580); RSA (Cert. #2023); SHS (Certs. #3088, #3089, #3090, and #3266); Triple-DES (Certs. #2052, #2053, #2054, and #2171)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); AES (non-compliant); DES; MD5; PBKDF (non-compliant); TKIP
Multi-Chip Stand Alone

"WatchGuard® Firebox appliances are built for enterprise-grade performance with blazing throughput and numerous connectivity options. Advanced networking features include clustering, high availability (active/active), VLAN support, multi-WAN load balancing and enhanced VoIP security, plus inbound and outbound HTTPS inspection, to give the strong security enterprises need. And the FIREBOX appliances are completely configurable - turn on or off components and services to fit different network security deployment requirements."
2876Motorola Solutions, Inc.
1301 East Algonquin Road
Schaumburg, IL 60196
USA

Tom Nguyen
TEL: 847-576-2352

CST Lab: NVLAP 100432-0
KMF/Wave/Traffic CryptR
(Hardware Version: P/N CLN8566A; Firmware Version: R02.01.05)
(When operated in FIPS mode and initialized to Overall Level 2 per Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/06/20174/5/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #1901); ECDSA (Cert. #268); SHS (Cert. #1670)

-Other algorithms: AES (Cert. #1901, key wrapping; key establishment methodology provides 256 bits of encryption strength); AES MAC (AES Cert. #1901, vendor affirmed; P25 AES OTAR); NDRNG; DES; DVI-XL; DVP-XL; KAS (non-compliant)
Multi-Chip Stand Alone

"The KMF/Wave/Traffic CryptR provides encryption and decryption services for secure key management, Over-the-Air-Rekeying (OTAR), secure data traffics, and secure voice traffics for the Motorola’s Key Management Facility (KMF) and the Motorola's Wave Systems. The KMF and KMF CryptR combine to provide cryptographic services for Motorola’s APCO-25 compliant Astro™ radio systems."
2875Forcepoint
10900-A Stonelake Blvd.
Quarry Oaks 1
Ste. 350
Austin, TX 78759
USA

Matt Sturm
TEL: 858-320-9444

Matthew Noland
TEL: 512-644-1214

CST Lab: NVLAP 201029-0
Forcepoint C Cryptographic Module
(Software Versions: 2.0.2, 2.0.5 or 2.0.10)
(When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy and operated in FIPS in mode. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. This validation entry is a non-security relevant modification to Cert. #1747)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software04/05/20171/29/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Physical Security: N/A
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Microsoft Windows 7 running on Intel Core i5- 2430M (64-bit) with PAA (Microsoft ® C/C++ Optimizing Compiler Version 16.00 for x64) CentOS 7.2 on a Forcepoint V10000 G4 Appliance (gcc 4.4.7)iOS 8.1 64-bit running on Apple A7 (ARMv8) without NEON and Crypto Extensions (clang Compilerv Version 600.0.56)iOS 8.1 64-bit running on Apple A7 (ARMv8) with NEON and Crypto Extensions (clang Compiler Version 600.0.56)(single-user mode)

-FIPS Approved algorithms: AES (Certs. #2234, #3264 and #4401); CVL (Certs. #36, #472 and #1110); DRBG (Certs. #264, #723 and #1419); DSA (Certs. #693, #933 and #1176); ECDSA (Certs. #347, #620 and #1058); HMAC (Certs. #1363, #2063 and #2925); RSA (Certs. #1145, #1664 and #2381); SHS (Certs. #1923, #2702 and #3628); Triple-DES (Certs. #1398, #1853 and #2373)

-Other algorithms: EC Diffie-Hellman; RSA (encrypt/decrypt); PRNG
Multi-Chip Stand Alone

"Forcepoint produces a family of web, e-mail and data security solutions that can be deployed on pre-configured, security hardened hardware or as customer installable software. The Forcepoint C Crypto Module provides support for cryptographic and secure communications services for these solutions."
2874Barracuda Networks
3175 Winchester Boulevard
Campbell, CA 95008
USA

Gerhard Schaber
TEL: +43-508-100

CST Lab: NVLAP 200423-0
Barracuda KTINA FIPS Crypto Module
(Software Version: 7.1)
(When operated with the module "Barracuda Cryptographic Software Module" validated to FIPS 140-2 under Cert. #2458)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software04/05/20174/4/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Physical Security: N/A
-Design Assurance: Level 3
-Tested Configuration(s): Tested as meeting Level 1 with Barracuda NextGen Firewall and Control Center OS 7 on Microsoft Windows 2012 (64-bit) Hyper-V running on a Dell PowerEdge R320 with PAA
Barracuda NextGen Firewall and Control Center OS 7 on Microsoft Windows 2012 (64-bit) Hyper-V running on a Dell PowerEdge R320 without PAA (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4150); HMAC (Cert. #2720); SHS (Cert. #3416); Triple-DES (Cert. #2267)

-Other algorithms: N/A
Multi-Chip Stand Alone

"The Barracuda KTINA FIPS Crypto Module is a Linux kernel module library that provides fundamental cryptographic functions for applications in Barracuda security products that require FIPS 140-2 approved cryptographic functions."
2873Dell EMC
176 South Street
Hopkinton, MA 01748
USA

Kerry Bellefontaine

CST Lab: NVLAP 200556-0
VMAX 6 Gb/s SAS I/O Module with Encryption
(Hardware Version: 303-161-101B-05; Firmware Version: 2.13.46.00)
(When installed, initialized and configured as specified in the Security Policy Section 3)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware04/04/20174/3/2022Overall Level: 1

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3255); HMAC (Cert. #2053); KTS (AES Cert. #3255); SHS (Cert. #2692)

-Other algorithms: N/A
Multi-Chip Embedded

"Dell EMC Data at Rest Encryption provides hardware-based, on-array, back-end encryption for Dell EMC storage systems, including the Symmetrix VMAX. Data at Rest Encryption protects information from unauthorized access when drives are physically removed from the system and also offers a convenient means of decommissioning all drives in the system at once.Dell EMC 6Gb/s SAS I/O modules implement AES-XTS 256-bit encryption on all drives in the system. These modules encrypt and decrypt data as it is being written to or read from a drive."
2872Veeam Software Corporation
8800 Lyra Drive
Suite 350
Columbus, OH 43240
USA

Michael Miller

Scott Lillis

CST Lab: NVLAP 201029-0
Veeam Cryptographic Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software03/30/20172/4/2021Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Windows Server 2008 R2 on a Dell OptiPlex 755, CentOS 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Dual EC DRBG; PRNG
Multi-Chip Stand Alone

"The Veeam Cryptographic Module provides cryptographic functions for the Veeam Availability Suite. These functions are used for protecting data in transit and at rest using standards based and trusted algorithms."
2871Dell EMC
176 South Street
Hopkinton, MA 01748
USA

Kerry Bellefontaine

CST Lab: NVLAP 200556-0
VMAX 12 Gb/s SAS I/O Module with Encryption
(Hardware Version: 303-305-100A-06; Firmware Version: v3.08.41.00)
(When installed, initialized and configured as specified in the Security Policy Section 3)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/28/20173/27/2022Overall Level: 1

-Physical Security: Level 2
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3586 and #3598); HMAC (Cert. #2296); KTS (AES Cert. #3598); SHS (Cert. #2961)

-Other algorithms: N/A
Multi-Chip Embedded

"Dell EMC Data at Rest Encryption provides hardware-based, on-array, back-end encryption for Dell EMC storage systems, including VMAX. Data at Rest Encryption protects information from unauthorized access when drives are physically removed from the system and also offers a convenient means of decommissioning all drives in the system at once.Dell EMC 12Gb/s SAS I/O modules implement AES-XTS 256-bit encryption on all drives in the system. These modules encrypt and decrypt data as it is being written to or read from a drive."
2870INTEGRITY Security Services
7585 Irvine Center Drive
Suite 250
Irvine, CA 92618
USA

Douglas Kovach
TEL: 727-781-4909
FAX: 727-781-2915

David Sequino
TEL: 206-310-6795
FAX: 978-383-0560

CST Lab: NVLAP 201029-0
INTEGRITY Security Services High Assurance Embedded Cryptographic Toolkit
(Firmware Version: 3.0.3)
(When installed, initialized and configured as specified in Section 2.4.1 of the Security Policy. No assurance of the minimum strength of generated keys.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Firmware03/28/20173/27/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Silicon Labs EM3581 with ARM Cortex-M3

-FIPS Approved algorithms: AES (Cert. #4239); DRBG (Cert. #1319); ECDSA (Cert. #981); HMAC (Cert. #2778); SHS (Cert. #3477)

-Other algorithms: EC Diffie-Hellman (shared secret computation provides 128 bits of encryption strength)
Multi-Chip Embedded

"Green Hills Software/INTEGRITY Security Services (ISS) ECT is a standards-based crypto toolkit providing a flexible framework to integrate encryption, digital signatures and other security mechanisms into a wide range of applications. ISS ECT is designed to support multiple cryptographic providers with a single common API, easily targeted to a variety of Operating Systems."
2869Aviat Networks, Inc.
860 N. McCarthy Blvd., Suite 200
Milpitas, CA 95035
USA

Ruth French
TEL: +44 7771 978599
FAX: +44 1698 717204

Martin Howard
TEL: +64 4 577 8735
FAX: +64 4 577 8822

CST Lab: NVLAP 100432-0
Aviat Networks Eclipse Cryptographic Module
(Hardware Versions: INUe 2RU Chassis (P/N EXE-002), Fan Card (P/N EXF-101), Node Controller Card (P/N EXN-004 with FPGA_NCCV2_E1_DS1_004.bit and FPGA_NCCV2_STM1_006.bit), FIPS Installation Kit (P/N 179-530153-001 or 179-530153-002), Replacement Labels (P/N 007-600331-001), at least one of: [RAC 6X (P/N EXR-600-001 with FPGA_RAC6X_PDH_ACM-14.19.52.bit and FPGA_RAC6X_SDH-2.3.1.bit), RAC 6XE (P/N EXR-600-002 with FPGA_RAC6X_PDH_ACM-14.19.52.bit and FPGA_RAC6X_SDH-2.3.1.bit), RAC 60 (P/N EXR-660-001 with FPGA_RAC6X_PDH_ACM-14.19.52.bit and FPGA_RAC6X_SDH-2.3.1.bit), or RAC 60E (P/N EXR-660-002 with FPGA_RAC6X_PDH_ACM-14.19.52.bit and FPGA_RAC6X_SDH-2.3.1.bit)] and all remaining slots filled by excluded components as specified in the Security Policy.; Firmware Version: 08.02.91 with Bootloader version 1.0.36)
(When operated in FIPS mode. Installation of components shall be configured per Section 2.2.1 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/27/20173/26/2022Overall Level: 2

-Cryptographic Module Specification: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2260 and #2418); CVL (Certs. #73, #860 and #970); DRBG (Cert. #323); ECDSA (Cert. #902); HMAC (Cert. #2634); RSA (Certs. #2071 and #2239); SHS (Certs. #3328 and #3397)

-Other algorithms: EC Diffie-Hellman (CVL Cert. #860, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG; DES; Diffie-Hellman (non-compliant)
Multi-Chip Stand Alone

"This cryptographic module performs encryption of data carried over a microwave radio link."
2868Tavve Software Company
1 Copley Pkwy
Ste 480
Morrisville, NC 27560
USA

Louie Yilling
TEL: 919-654-1250

Jeff Olson
TEL: 919-654-1226

CST Lab: NVLAP 100432-0
Tavve Cryptographic Module
(Software Version: 6.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #2804.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/24/2017
03/30/2017
12/7/2021Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): Java SE Runtime Environment v8 (1.8.0) on CentOS 6.4 on vSphere 6 running on a Cisco UCSB-B200-M4 Blade (single-user mode)

-FIPS Approved algorithms: AES (Cert. #3756); CVL (Certs. #704, #705 and #706); DRBG (Cert. #1031); DSA (Cert. #1043); ECDSA (Cert. #804); HMAC (Cert. #2458); KAS (Cert. #73); KAS (SP 800-56Arev2, vendor affirmed); KBKDF (Cert. #78); KTS (vendor affirmed); KTS (AES Cert. #3756; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #2090; key establishment methodology provides 112 bits of encryption strength); PBKDF (vendor affirmed); RSA (Cert. #1932); SHA-3 (Cert. #3); SHS (Cert. #3126); Triple-DES (Cert. #2090)

-Other algorithms: Diffie-Hellman (CVL Cert. #704, key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARC4 (RC4); Blowfish; Camellia; CAST5; DES; DSTU4145; ElGamal; GOST28147; GOST3410-1994; GOST3410-2001; GOST3411; HMAC-GOST3411; HMAC-MD5; HMAC-RIPEMD; HMAC-TIGER; HMAC-WHIRLPOOL; IDEA; KBKDF (non-compliant); PBKDF (non-compliant); RC2; RIPEMD; PRNG; Scrypt; SEED; Serpent; SipHash; SHACAL-2; TIGER; Twofish; WHIRLPOOL
Multi-Chip Stand Alone

"The Tavve Cryptographic Module provides cryptographic functions for Tavve's ZoneRanger and Ranger Gateway applications."
2867Hewlett Packard®, Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Laura Loredo
TEL: 44 117 3162462

Dave Tuckett
TEL: 44 117 316 2692

CST Lab: NVLAP 100432-0
HPE LTO-6 Tape Drive
(Hardware Versions: P/Ns AQ278A #912 [1], AQ288D #103 [2] and AQ298C #103 [3]; Firmware Versions: J5SW [1], 35PW [2] and 25MW [3])
(When operated in FIPS mode and initialized to Overall Level 1 per Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/23/20173/22/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #1442, #2189, #3534 and #3535); CVL (Cert. #588); DRBG (Cert. #889); HMAC (Cert. #2258); KTS (AES Cert. #3535); RSA (Certs. #1128 and #1821); SHS (Certs. #1897 and #2913)

-Other algorithms: MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"HP LTO-6 tape drives help to keep pace with data growth with up to 6.25TB compressed data storage per cartridge and capable of compressed data transfer rates of up to 400MB/sec. Ground breaking LTFS technology makes LTO-6 tapes as easy to use as disk and enables easy file access, reliable long term archive retrieval and simpler transportability between systems. LTO-6 tape drives also provide easy-to-enable security to protect the most sensitive data and prevent unauthorized access of tape cartridges with AES 256-bit hardware data encryption."
2866VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94304
USA

Eric Betts
TEL: 1-650-427-1902

CST Lab: NVLAP 200928-0
VMware Java JCE (Java Cryptographic Extension) Module
(Software Version: 2.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/22/20173/21/2022Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): Java SE Runtime Environment 1.7.0 on NSX Controller 6.3.0 OS on Vmware vSphere Hypervisor (ESXi) 6.0 running on HPE ProLiant DL380 Gen8
Java SE Runtime Environment 1.7.0 on NSX Edge 6.3.0 OS on Vmware vSphere Hypervisor (ESXi) 6.0 running on HPE ProLiant DL380 Gen8
Java SE Runtime Environment 1.7.0 on NSX Manager 6.3.0 OS on Vmware vSphere Hypervisor (ESXi) 6.0 running on HPE ProLiant DL380 Gen8 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4153); CVL (Certs. #955, #956 and #957); DRBG (Cert. #1261); DSA (Cert. #1127); ECDSA (Cert. #955); HMAC (Cert. #2721); KAS (Cert. #96); KAS (SP 800-56Arev2, vendor affirmed); KBKDF (Cert. #107); KTS (vendor affirmed); KTS (AES Cert. #4153; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #2269; key establishment methodology provides 112 bits of encryption strength); PBKDF (vendor affirmed); RSA (Cert. #2261); SHA-3 (Cert. #10); SHS (Cert. #3417); Triple-DES (Cert. #2269)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARC4 (RC4); Blowfish; Camellia; CAST5; DES; DSTU4145; ElGamal; GOST28147; GOST3410-1994; GOST3410-2001; GOST3411; HMAC-GOST3411; HMAC-MD5; HMAC-RIPEMD; HMAC-TIGER; HMAC-WHIRLPOOL; IDEA; KBKDF (non-compliant); PBKDF (non-compliant); RC2; RIPEMD; PRNG; RSA (non-compliant); SCrypt; SEED; Serpent; SipHash; SHACAL-2; TIGER; Twofish; WHIRLPOOL
Multi-Chip Stand Alone

"The VMware Java JCE (Java Cryptographic Extension) Module is a software cryptographic module based on the Legion of the Bouncy Castle Inc. FIPS Java API (BC-FJA) Module (SW Version 1.0.0). The module is a software library that provides cryptographic functions to various VMware applications via a well-defined Java-language application program interface (API)."
2865Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Christopher Marks
TEL: 408-333-0480
FAX: 408-333-8101

CST Lab: NVLAP 200802-0
Brocade® DCX, DCX 8510-8, DCX-4S and DCX 8510-4 Backbones, 6510 and 6520 FC Switches, and 7800 Extension Switch
(Hardware Versions: {6510 FC Switch (P/N 80-1005272-03) with FRU (P/N 80-1001304-02) with Software License (P/N 80-1005356-02), 6520 FC Switch (P/N 80-1007257-03) with FRUs (P/Ns 80-1007263-01 and 80-1004580-02) with Software License (P/N 80-1007272-01), 7800 Extension Switch (P/N 80-1006977-02) with Software License (P/N 80-1002820-02); [DCX Backbone (P/N 80-1006752-01), DCX-4S Backbone (P/N 80-1006772-01), DCX 8510-4 Backbone (P/N 80-1006964-01), DCX 8510-8 Backbone (P/N 80-1007025-01)] with Blades (P/Ns 80-1006794-01, 80-1004897-01, 80-1004898-01, 80-1006771-01, 80-1006750-01, 80-1005166-02, 80-1005187-02, 80-1006936-01, 80-1006779-01, 80-1006823-01, 80-1007000-01, 80-1007017-01, 49-1000016-04, 49-1000064-02 and 49-1000294-05)} with FIPS Kit P/N Brocade XBR-000195; Firmware Version: Fabric OS v7.4.0 (P/N 51-1001672-01))
(When operated in FIPS mode and when tamper evident labels are installed as indicated in the Security Policy. The protocol SNMP shall not be used when operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware03/21/20173/20/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2876 and #2893); CVL (Certs. #311, #312, #320 and #321); DRBG (Certs. #670 and #671); ECDSA (Certs. #942 and #943); HMAC (Certs. #1814 and #1829); RSA (Certs. #2234 and #2235); SHS (Certs. #2417 and #2436); Triple-DES (Certs. #1719 and #1724)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #311 and #320, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); HMAC-MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARCFOUR; BLOWFISH; CAST; DES; DES3; DESX; HMAC-MD5-96; HMAC-SHA1-96 (non-compliant); HMAC-RIPEMD160; MD2; MD4; RC2; RC4; RIPEMD160; SNMPv3 KDF (non-compliant); UMAC-64
Multi-Chip Stand Alone

"The Brocade DCX, DCX 8510-8, DCX-4S and DCX 8510-4 Backbones and the 6510 and 6520 Switch provide a reliable, scalable Fibre Channel switching infrastructure with market-leading 16 Gbps technology and capabilities that support demanding, enterprise-class private cloud storage and highly virtualized environments. The Brocade 7800 Extension Switch provides fast, reliable WN/MAN connectivity for remote data replication, backup, and migration with Fibre Channel and advanced Fibre Channel over IP (FCIP) technology."
2864Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
USA

Hamid Sobouti
TEL: 408-333-4150
FAX: 408-333-8101

CST Lab: NVLAP 200802-0
Brocade® MLXe® Series Ethernet Routers, Brocade® NetIron® CER 2000 Series Ethernet Routers and Brocade NetIron® CES 2000 Series Ethernet Switches
(Hardware Versions: {[BR-MLXE-8-MR2-M-AC (80-1007225-01), BR-MLXE-16-MR2-M-AC (80-1006827-02), BR-MLXE-32-MR2-M-AC (80-1007253-04), BR-MLXE-4-MR2-X-AC (80-1006874-03), BR-MLXE-32-MR2-X-AC (80-1007255-04), with Components (80-1005643-01, 80-1005644-03, 80-1005641-02, 80-1005642-03, 80-1007878-02, 80-1007911-02, 80-1008426-01, 80-1008427-02, 80-1007879-02, 80-1003891-02, 80-1002983-01, 80-1008686-01, 80-1003971-01, 80-1003969-02, 80-1004114-01, 80-1004113-01, 80-1004112-01, 80-1004469-01, 80-1004760-02, 80-1006511-02, 80-1004757-02, 80-1003009-01, 80-1003052-01, 80-1003053-01)], [BR-CER-2024C-4X-RT-AC (80-1006530-01), BR-CER-2024F-4X-RT-AC (80-1006529-01), with Components (80-1003868-01, 80-1004848-01)], [BR-CES-2024C-4X-AC (80-1000077-01), BR-CES-2024F-4X-AC (80-1000037-01), with Component (80-1003868-01)]} with FIPS Kit XBR-000195; Firmware Version: Multi-Service IronWare R05.9.00aa)
(When operated in FIPS mode with the tamper evident labels installed and configured as specified in Section 14 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware03/21/20173/20/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #1648, #2154, #2715, #2717, #2946, #3143, #3144 and #3478); CVL (Certs. #173, #175, #393, #394, #403, #404, #712, #713 and #1029); DRBG (Certs. #452, #454 and #684); ECDSA (Certs. #761 and #809); HMAC (Certs. #1694, #1696 and #2848); KBKDF (Cert. #35); KTS (AES Cert. #2946); KTS (AES Cert. #2717 and HMAC Cert. #1696; key establishment methodology provides 112 bits of encryption strength); RSA (Certs. #1411 and #1413); SHS (Certs. #934, #2280 and #2282)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (CVL Cert. #712; key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #713, key agreement; key establishment methodology provides between 128 and 192 bits of encryption strength); HMAC-MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; HMAC-SHA-1-96 (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The Brocade NetIron CER 2000 Series is a family of compact routers that are purpose-built for high performance Ethernet edge routing and MPLS applications.The Brocade NetIron CES 2000 Series of switches provides IP routing and advanced Carrier Ethernet capabilities in a compact form factor. Brocade MLXe Series routers feature industry-leading Gigabit Ethernet ports with wire-speed density; advanced Layer 2 switching; rich IPv4, IPv6, Multi-VRF, MPLS, L2/L3 Virtual Private Networks (VPN),IKEv2/IPsec and PHY based MACsec capabilities without compromising performance."
2863WatchGuard Technologies, Inc.
505 Fifth Avenue South, Suite 500
Seattle, WA 98104
USA

Peter Eng
TEL: 206-613-6600

CST Lab: NVLAP 200556-0
WatchGuard Firebox M200[1], M300[2], M400[3], M500[4], M440[5], M4600[6], M5600[7]
(Hardware Versions: ML3AE8 [1,2]; SL1AE24 [5]; KL5AE8 [3,4]; CL4AE24 [6] with WG8583, WG8584 and WG8597; CL5AE32 [7] with WG8583, WG8584, WG8585, WG8022, and WG8598; FIPS Kit P/N: WG8566; Firmware Version: Fireware OS v11.11.2)
(When operated in FIPS mode and with the tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/16/20173/15/2022Overall Level: 2

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3670, #3671, #3672, #3676, #3677, and #3960); CVL (Cert. #793); DRBG (Cert. #1160); HMAC (Certs. #2417, #2418, #2419, #2423, #2424, and #2580); RSA (Cert. #2023); SHS (Certs. #3085, #3086, #3087, #3091, #3092, and #3266); Triple-DES (Certs. #2049, #2050, #2051, #2055, #2056, and #2171)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); AES (non-compliant); DES; MD5; PBKDF (non-compliant); TKIP
Multi-Chip Stand Alone

"WatchGuard® Firebox appliances are built for enterprise-grade performance with blazing throughput and numerous connectivity options. Advanced networking features include clustering, high availability (active/active), VLAN support, multi-WAN load balancing and enhanced VoIP security, plus inbound and outbound HTTPS inspection, to give the strong security enterprises need. And the FIREBOX appliances are completely configurable - turn on or off components and services to fit different network security deployment requirements."
2862Hewlett Packard®, Enterprise
153 Taylor Street
Littleton, MA 01460
USA

Harjit Dhillon
TEL: 916-501-1426

CST Lab: NVLAP 200427-0
HPE Enterprise Secure Key Manager
(Hardware Versions: P/N M6H81AA , Version 5.0; Firmware Version: 7.0.1; Software Version: N/A)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/10/20173/9/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3995); CVL (Certs. #820, #821, #822, #823 and #842); DRBG (Certs. #1185 and #1186); ECDSA (Cert. #889); HMAC (Cert. #2609); KTS (AES Cert #3995; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (AES Cert #3995 and HMAC Cert. #2609; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert #2194 and HMAC Cert. #2609; key establishment methodology provides 112 bits of encryption strength); RSA (Cert. #2051); SHS (Cert. #3297); Triple-DES (Cert. #2194)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #842; key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; MD5; RC4; RSA (encrypt/decrypt)
Multi-Chip Stand Alone

"HP Enterprise Secure Key Manager (ESKM) provides key generation, retrieval, and management for encryption devices and solutions. ESKM is a hardened security appliance with secure access control, administration, and logging. ESKM supports high availability with automatic multi-site clustering, replication, and failover."
2861Dell, Inc.
One Dell Way
Round Rock, Texas 78682
USA

Kylie Gallagher
TEL: +1 512 723 7550

Gang Liu
TEL: +1 512 728 5545

CST Lab: NVLAP 200002-0
Dell Crypto Library for Dell iDRAC and Dell CMC
(Software Version: 2.4)
(When operated in FIPS mode. This validation entry is rebranding from Cert. #2496)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/15/20173/14/2022Overall Level: 1

-Physical Security: N/A
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Linux 3.2.18 running on a PowerEdge M1000e Blade Server w/ Dell CMC
Linux 3.4.11 running on a PowerEdge R730 Rack Server w/ Dell iDRAC8 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4248); DRBG (Cert. #1327); DSA (Cert. #1138); HMAC (Cert. #2786); RSA (Cert. #2293); SHS (Cert. #3485); Triple-DES (Cert. #2303)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 270 bits of encryption strength); AES CMAC (non-compliant); AES GCM (non-compliant); AES XTS (non-compliant); ANSI X9.31 RNG (non-compliant); ECDSA (non-compliant); Hash_DRBG (non-compliant); HMAC_DRBG (non-compliant); Triple-DES CMAC (non-compliant)
Multi-Chip Stand Alone

"Dell Cryptographic Module v2.4 is used within various Dell products including the Dell iDRAC8 and Dell CMC. The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a systems management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers."
2860DocuSign, Inc.
221 Main St.
Suite 1000
San Francisco, CA 94105
USA

Ezer Farhi
TEL: 972-39279529
FAX: 972-39230864

Moshe Harel
TEL: 972-3-9279578
FAX: 972-3-9230864

CST Lab: NVLAP 200002-0
DocuSign HSM Appliance
(Hardware Version: 5.0; Firmware Version: 5.0.0)
(When operated in FIPS mode. This module contains the embedded module eToken 5105 validated to FIPS 140-2 under Cert. #1883 operating in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/08/20173/7/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4029 and #4031); CVL (Certs. #857 and #1039); DRBG (Certs. #98 and #1205); ECDSA (Cert. #900); HMAC (Certs. #2630 and #2632); KTS (AES Cert. #4029 and HMAC Cert. #2630); RSA (Cert. #2069); SHS (Certs. #1465, #3325 and #3326); Triple-DES (Cert. #2207); Triple-DES MAC (Triple-DES Cert. #2207, vendor affirmed)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); AES GCM (AES Cert. #4031; non-compliant); ARDFP; DES; DES MAC; DES Stream; FF3 (non-compliant); MD5
Multi-Chip Stand Alone

"DocuSign HSM Appliance is a high-performance cryptographic service provider. It performs high-speed cryptographic operations while protecting sensitive data. Its features include Triple-DES, AES, Triple-DES MAC, CCM, HMAC, RSA, ECDSA, SHA-1, SHA-256, SHA-384, SHA-512, public key database and certificate support, authenticated and encrypted communication with the module, secure storage of secret/private keys, software key medium and smartcard support, tamper-responsive enclosure, high level API requiring no cryptographic expertise, in-depth logging and auditing, and secure backup capabilities."
2859Mocana Corporation
20 California Street
San Francisco, CA 94111
USA

Srinivas Kumar
TEL: 415-617-0055
FAX: 415-617-0056

CST Lab: NVLAP 100432-0
Mocana Cryptographic Suite B Module
(Software Version: 6.4.1f)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/08/2017
06/14/2017
3/7/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Mentor Graphics Linux 4.0 running on Avaya VSP4450GSX
Wind River Linux 6.0 running on Intel Atom E3800 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4100 and #4265); CVL (Certs. #971 and #1007); DRBG (Certs. #1232 and #1336); DSA (Certs. #1115 and 1140); ECDSA (Certs. #928 and #994); HMAC (Certs. #2679 and #2810); RSA (Certs. #2219 and #2296); SHS (Certs. #3375 and #3511); Triple-DES (Certs. #2243 and #2306)

-Other algorithms: Diffie-Hellman (CVL Cert. #971 with CVL Cert. #1007, key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #971 with CVL Cert. #1007, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES GCM (AES Certs. #4100 and #4265; non-compliant); AES XTS (AES Certs. #4100 and #4265; non-compliant); DES; HMAC-MD5; MD2; MD4; MD5; PRNG; RSA (encrypt/decrypt)
Multi-Chip Stand Alone

"The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com."
2858Motorola Solutions, Inc.
1303 East Algonquin Road
Schaumburg, IL 60196
USA

Dariusz Wolny

CST Lab: NVLAP 100432-0
Motorola GGM 8000 Gateway
(Hardware Versions: Base Unit P/N CLN1841F Rev AB with FIPS Kit P/N CLN8787A Rev B and Power Supply P/N CLN1850A Rev G (AC) or P/N CLN1849C Rev AA (DC); Firmware Version: KS 16.9.0.48)
(When operated in FIPS mode with tamper labels installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/08/20173/7/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #962 and #3993); CVL (Certs. #816, #817, #818, and #819); DRBG (Cert. #1184); ECDSA (Cert. #887); HMAC (Certs. #1487, #2606, and #2607); KAS (SP 800-56Arev2 with CVL Certs. #816 and #817; vendor affirmed); KAS (SP 800-56Arev2 with CVL Certs. #816 and #819; vendor affirmed); KTS (AES Cert. #3993 and HMAC Certs. #2606 and #2607); RSA (Cert. #2049); SHS (Certs. #933 and #3295); Triple-DES (Certs. #757 and #2192)

-Other algorithms: AES (Cert. #3993, key wrapping; key establishment methodology provides 128 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; DES; DSA (non-compliant); HMAC-MD5; HMAC-SHA-1-96 (non-compliant); MD5; PRNG
Multi-Chip Stand Alone

"GGM 8000 devices are versatile, secure-capable devices that can ensure timely delivery of delay-sensitive traffic. Supporting secure integrated voice and data applications as well as high-speed site-to-site WAN connections, GGM 8000 perform simultaneous functions - including compression and data prioritization - without compromising their ability to accomplish additional packet-handling functions as needed. In addition to the normal packet forwarding functions, the GGM 8000 supports data encryption and authentication over Ethernet and Frame Relay links using the IPSec and FRF.17 protocols."
2857Motorola Solutions, Inc.
1303 East Algonquin Road
Schaumburg, IL 60196
USA

Dariusz Wolny

CST Lab: NVLAP 100432-0
Motorola Network Router (MNR) S6000
(Hardware Version: Base Unit P/N CLN1780L Rev FB with Encryption Module P/N CLN8261D Rev NA; Firmware Version: GS-16.9.0.48)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/08/20173/7/2022Overall Level: 1

-EMI/EMC: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #173 and #3993); CVL (Certs. #816, #817, #818, and #819); DRBG (Cert. #1184); ECDSA (Cert. #887); HMAC (Certs. #39, #2606, and #2607); KAS (SP 800-56Arev2 with CVL Certs. #816 and #817; vendor affirmed); KAS (SP 800-56Arev2 with CVL Certs. #816 and #819; vendor affirmed); KTS (AES Cert. #3993 and HMAC Certs. #2606 and #2607); RSA (Cert. #2049); SHS (Certs. #258 and #3295); Triple-DES (Certs. #275 and #2192)

-Other algorithms: AES (Cert. #3993, key wrapping; key establishment methodology provides 128 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; DES; DSA (non-compliant); HMAC-MD5; HMAC-SHA-1-96 (non-compliant); MD5; PRNG
Multi-Chip Stand Alone

"MNR S6000 routers are versatile, secure-capable devices that can ensure timely delivery of delay-sensitive traffic. Supporting secure integrated voice and data applications as well as high-speed site-to-site WAN connections, S6000 routers perform simultaneous functions - including compression and data prioritization - without compromising their ability to accomplish additional packet-handling functions as needed. In addition to the normal routing functions, the MNR S6000 supports data encryption and authentication over Ethernet and Frame Relay links using the IPSec and FRF.17 protocols."
2856Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Jaz Lin
TEL: 408-745-2000

Van Nguyen
TEL: 408-745-2000

CST Lab: NVLAP 100432-0
Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways
(Hardware Versions: P/Ns {SRX100H2, SRX110H2-VA, SRX110H2-VB, SRX210HE2, SRX220H2, SRX240H2, SRX550, SRX650} with JNPR-FIPS-TAMPER-LBLS; Firmware Version: JUNOS-FIPS 12.3X48-D30)
(When operated in FIPS mode and with the tamper-evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware03/07/20173/6/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4055, #4056, #4066, #4067, #4068 and #4069); CVL (Certs. #880 and #926); DRBG (Cert. #1216); DSA (Certs. #1096, #1099, #1100, #1101 and #1102); ECDSA (Certs. #909, #912, #913, #914 and #915); HMAC (Certs. #2647, #2648, #2653, #2654, #2655 and #2656); RSA (Certs. #2087, #2197, #2198, #2199 and #2200); SHS (Certs. #3342, #3343, #3349, #3350, #3351 and #3352); Triple-DES (Certs. #2217, #2218, #2219, #2220, #2223 and #2224)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); HMAC-SHA-1-96 (HMAC Certs. #2647, #2648, #2653, #2654, #2655 and #2656); NDRNG; ARCFOUR; Blowfish; CAST; DSA (non-compliant); HMAC-MD5; HMAC-RIPEMD160; UMAC
Multi-Chip Stand Alone

"Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers."
2855Automation Solutions, Inc (AUTOSOL)
16055 Space Center Blvd.
Houston, TX 77062
USA

Ken Brucker
TEL: 281-286-6017
FAX: 281-286-6902

Edgar Cantu

CST Lab: NVLAP 201029-0
CryptoMod
(Hardware Version: CM5705-D9; Firmware Version: 1.0.51.FIPS)
(When operated in FIPS mode. When installed, initialized and configured as specified in Section 3 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware03/03/20173/2/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4140); CVL (Cert. #946); DRBG (Cert. #1255); HMAC (Cert. #2713); PBKDF (vendor affirmed); RSA (Cert. #2257); SHS (Cert. #3410)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); PBKDF (non-compliant)
Multi-Chip Stand Alone

"AutoSol’s CryptoMod is an end-point security device that protects data exchanged between remote industrial field devices and a centralized SCADA host. Installed in front of equipment, the CryptoMod encrypts traffic for the entire length of an industrial network. It provides authentication for controlling network access, integrity when data is in motion, and confidentiality. It is a CSA Class 1 Div. 2 Gr. ABCD device and a terminal server, so it can fit any existing industrial network. It has a hardware watchdog timer and the capability for remote configuration, management, and updates."
2854EFJohnson Technologies
1440 Corporate Drive
Irving, TX 75038-2401
USA

John Tooker
TEL: 402-479-8447
FAX: 402-479-8472

Marshall Schiring
TEL: 402-479-8375
FAX: 402-479-8472

CST Lab: NVLAP 100432-0
Communication Cryptographic Library (CCL)
(Software Version: Product Number 039-5804-200 Rev 3.0)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/02/20173/1/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Android 6.0 running on a Nexus 5X (single-user mode)

-FIPS Approved algorithms: AES (Cert. #3985); DRBG (Cert. #1178); ECDSA (Cert. #882); HMAC (Cert. #2601); KTS (AES Cert. #3985; key establishment methodology provides between 128 and 256 bits of encryption strength); SHS (Cert. #3290)

-Other algorithms: DES
Multi-Chip Stand Alone

"The CCL is a dynamically linked library implemented using the C programming language with an external Java interface. Application developers wishing to use the CCL can use the CCL's Application Programming Interface (API) to perform AES, ECDSA, HMAC, DRBG, SHA256 and SHA512 security related functions. It also includes non-validated legacy services to support DES encryption while operating in the Non-Approved mode of operation."
2853Kaspersky Lab UK Ltd.
1st Floor, 2 Kingdom Street
Paddington, London, W2 6BD
United Kingdom

Oleg Andrianov
TEL: +7 495 797 8700

CST Lab: NVLAP 200968-0
Kaspersky Cryptographic Module (User Mode)
(Software Version: 3.0.1.25)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/02/20173/1/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Windows 7 Professional 32-bit running on an Intel® Core™2 Duo P9600 @ 2.53GHz system without PAA
Windows 8.1 Enterprise 64-bit running on an Intel® Core™ i7-3770S CPU @ 3.10GHz system with PAA
Windows 7 Enterprise 64-bit running on an Intel® Core™ i5-2400 CPU @ 3.10GHz system with PAA
Windows 8.1 Enterprise 64-bit running on an Intel® Core™ i7-4770 CPU @ 3.40GHz system with PAA
Windows 10 Enterprise 64 bit running on an Intel(R) Core(TM) i7-4600U CPU @ 2.10GHz system with PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #2849, #2959, #2960 and #2980); DRBG (Certs. #502, #561, #890, #891, #896 and #897); HMAC (Certs. #1789 and #1879); PBKDF (vendor affirmed); RSA (Certs. #1490 and #1558); SHA-3 (vendor affirmed); SHS (Certs. #2391 and #2492)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides 112 or 192 bits of encryption strength; non-compliant less than 112 bits of encryption strength), RSA (key wrapping; key establishment methodology provides between 112 and 270 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Multi-Chip Stand Alone

"Kaspersky Cryptographic Module (User Mode) is a software library that provides cryptographic services for various Kaspersky Lab applications. The module is provided as a user-mode DLL."
2852CTERA Networks Ltd.
CTERA Networks NA HQ
205 E. 42nd Street
New York, NY 10017
USA

Aron Brand

Zohar Kaufman

CST Lab: NVLAP 100432-0
CTERA Crypto Module™ (Java)
(Software Version: 3.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. This validation entry is a non-security relevant modification to Cert. #2804.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software03/01/201712/7/2021Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): Java SE Runtime Environment v8 (1.8.0) on CentOS 6.4 on vSphere 6 running on a Cisco UCSB-B200-M4 Blade (single-user mode)

-FIPS Approved algorithms: AES (Cert. #3756); CVL (Certs. #704, #705 and #706); DRBG (Cert. #1031); DSA (Cert. #1043); ECDSA (Cert. #804); HMAC (Cert. #2458); KAS (Cert. #73); KAS (SP 800-56Arev2, vendor affirmed); KBKDF (Cert. #78); KTS (vendor affirmed); KTS (AES Cert. #3756; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #2090; key establishment methodology provides 112 bits of encryption strength); PBKDF (vendor affirmed); RSA (Cert. #1932); SHA-3 (Cert. #3); SHS (Cert. #3126); Triple-DES (Cert. #2090)

-Other algorithms: Diffie-Hellman (CVL Cert. #704, key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); MD5; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); ARC4 (RC4); Blowfish; Camellia; CAST5; DES; DSTU4145; ElGamal; GOST28147; GOST3410-1994; GOST3410-2001; GOST3411; HMAC-GOST3411; HMAC-MD5; HMAC-RIPEMD; HMAC-TIGER; HMAC-WHIRLPOOL; IDEA; KBKDF (non-compliant); PBKDF (non-compliant); RC2; RIPEMD; PRNG; Scrypt; SEED; Serpent; SipHash; SHACAL-2; TIGER; Twofish; WHIRLPOOL
Multi-Chip Stand Alone

"CTERA Crypto Module™ (Java) is a secure cryptographic engine used by CTERA Enterprise File Services Platform. The platform enables organizations to securely sync, serve and protect data on any private or public cloud infrastructure."
2851United States Special Operations Command (USSOCOM)
7701 Tampa Point Boulevard
MacDill Air Force Base, FL 33621-5323
USA

William W. Burnham
TEL: (813) 826-2282
FAX: N/A

CST Lab: NVLAP 200416-0
Suite B Cryptographic Module
(Software Version: v3.0.0.0)
(When operated in FIPS mode with module Cryptographic Primitives Library (bcryptprimitives.dll and ncryptsslp.dll) in Microsoft Windows 8.1 Enterprise, Windows Server 2012 R2, Windows Storage Server 2012 R2, Surface Pro 3, Surface Pro 2, Surface Pro, Surface 2, Surface, Windows RT 8.1, Windows Phone 8.1, Windows Embedded 8.1 Industry Enterprise, StorSimple 8000 Series validated to FIPS 140-2 under Cert. #2357 operating in FIPS mode or BlackBerry OS Cryptographic Library validated to FIPS 140-2 under Cert. #1578 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software02/27/20172/26/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): BlackBerry OS 10.3 running on Qualcomm Snapdragon 801
BlackBerry OS 10.3 running on Qualcomm Snapdragon S4
Microsoft Windows Server 2012 R2 (64-bit) running on Intel Xeon E5530 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3328 and #4312); CVL (Cert. #484); ECDSA (Cert. #657); HMAC (Cert. #2119); KAS (Cert. #55); KBKDF (Cert. #116); KTS (AES Cert. #3328); PBKDF (vendor affirmed); SHS (Cert. #2761)

-Other algorithms: N/A
Multi-Chip Stand Alone

"KEYW, in coordination with the United States Special Operations Command (USSOCOM), has developed a Suite B-compliant, standards based, AES/GCM-256 layer of encrypted communications between a BlackBerry Enterprise Server (BES) and a BlackBerry Mobile Set (MS) with Elliptic Curve (EC) key exchange used to negotiate symmetric keys."
2850Cavium Inc.
2315 N 1st Street
San Jose, CA 95131
USA

Phanikumar Kancharla
TEL: 408-943-7496

Tejinder Singh
TEL: 408-943-7403

CST Lab: NVLAP 100432-0
NITROXIII CNN35XX-NFBE HSM Family
(Hardware Versions: P/Ns CNL3560P-NFBE-G, CNL3560-NFBE-G, CNL3530-NFBE-G, CNL3510-NFBE-G, CNL3510P-NFBE-G, CNN3560P-NFBE-G, CNN3560-NFBE-G, CNN3530-NFBE-G and CNN3510-NFBE-G; Firmware Version: CNN35XX-NFBE-FW-2.0 build 74)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware02/27/2017
02/28/2017
04/04/2017
2/26/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2033, #2034, #2035, #3205, #3206 and #4104); CVL (Certs. #167 and #563); DRBG (Cert. #680); DSA (Cert. #916); ECDSA (Cert. #589); HMAC (Certs. #1233 and #2019); KAS (Cert. #53); KAS (SP 800-56B, vendor affirmed); KBKDF (Cert. #65); KTS (AES Certs. #3206 and #4104); KTS (Triple-DES Cert. #2242; key establishment methodology provides 112 bits of encryption strength); RSA (Certs. #1634 and #2218); SHS (Certs. #1780 and #2652); Triple-DES (Certs. #1311 and #2242)

-Other algorithms: MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength); PBE; RC4
Multi-Chip Embedded

"CNN35XX-NFBE HSM Family is a high performance purpose built solution for key management and crypto acceleration compliance to FIPS 140-2. The module supports flexible key store that can be partitioned up to 32 individually managed and isolated partitions. This is a SRIOV capable PCIe adapter and can be used in a virtualization environment to extend services like virtual key management, crypto and TLS offloads to VMs in dedicated I/O channels. This product is suitable for PKI vendors, SSL servers/load balancers."
2849Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
USA

CST Lab: NVLAP 200556-0
Symantec Messaging Gateway Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software02/27/20172/26/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): CentOS 6 running on a Dell PowerEdge R430 with Intel Xeon E5-2600

-FIPS Approved algorithms: AES (Cert. #4124); CVL (Cert. #931); DRBG (Cert. #1244); DSA (Cert. #1117); ECDSA (Cert. #939); HMAC (Cert. #2695); RSA (Cert. #2238); SHS (Cert. #3393); Triple-DES (Cert. #2255)

-Other algorithms: EC Diffie-Hellman (CVL Cert. #931, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES XTS (AES Cert. #4124; non-compliant); PRNG
Multi-Chip Stand Alone

"The Symantec Messaging Gateway Cryptographic Module provides cryptographic functions for the Messaging Gateway platforms software.The module's logical cryptographic boundary is the shared library files and their integrity check HMAC files. The module is a multi-chip standalone embodiment installed on a General Purpose Device.All operations of the module occur via calls from host applications and their respective internal daemons/processes. As such there are no untrusted services calling the services of the module."
2848Micron Technology, Inc.
570 Alder Drive
Milpitas, CA 95035
USA

Dale McNamara
TEL: 408-834-1729

Jimmy Ruane
TEL: 408-834-1894

CST Lab: NVLAP 100432-0
MICRON 1100 SSD
(Hardware Versions: MTFDDAK256TBN-1AR15FCHA [1], MTFDDAK512TBN-1AR15FCHA [1], MTFDDAK256TBN-1AR15FCYY [2], MTFDDAK512TBN-1AR15FCYY [2], MTFDDAV256TBN-1AR15FCHA [1], MTFDDAV512TBN-1AR15FCHA [1], MTFDDAV256TBN-1AR15FCYY [2] and MTFDDAV512TBN-1AR15FCYY [2]; Firmware Versions: HPC0F10 [1] and M0MF000 [2])

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware02/23/2017
03/07/2017
04/27/2017
2/22/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4111, #4051 and #4052); DRBG (Cert. #1236); HMAC (Cert. #2685); KTS (AES Cert. #4111); PBKDF (vendor affirmed); RSA (Cert. #2224); SHS (Cert. #3383)

-Other algorithms: NDRNG
Multi-Chip Embedded

"The MICRON 1100 SSD is a multi-chip embedded device which provides hardware AES 256 encryption/decryption of user data that is stored in the NAND flash. The cryptographic module (CM) supports the SATA interface and is compliant with the Trusted Computing Group (TCG) SSC specification Opal."
2847Digital Guardian, Inc.
860 Winter Street
Suite 3
Waltham, MA 02451
USA

Craig Hansen
TEL: 201-572-3784

CST Lab: NVLAP 200427-0
Verdasys Secure Cryptographic Module
(Software Version: 1.0)
(When operated in FIPS mode. This validation entry is a non-security-relevant modification to Cert. #1607)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software02/22/20172/22/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Windows XP 32-bit
Windows XP 64-bit (single-user mode)

-FIPS Approved algorithms: AES (Cert. #1384); DRBG (Cert. #50); HMAC (Cert. #814); RSA (Cert. #677); SHS (Cert. #1261)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Multi-Chip Stand Alone

"The Verdasys Secure Cryptographic Module, VSEC.SYS, is a software module that provides cryptographic services for Digital Guardian's DG Agent for Windows endpoint products. The Verdasys Secure Cryptographic Module is leveraged in a variety of functions including securing communication, protecting agent components, and file encryption."
2846Prometheus Security Group Global, Inc.
3019 Alvin Devane Blvd.
Building 4, Suite #450
Austin, TX 78741
USA

Jeremy Freeze-Skret
TEL: 512-247-3700
FAX: 512-519-4054

Mark Thomas
TEL: 503-647-7762
FAX: 512-519-4054

CST Lab: NVLAP 100432-0
Talon™ Multi-Function Security Appliance
(Hardware Versions: P/Ns: TAL-SD (FIPS) v1.0 and TAL-HD (FIPS) v1.0; Firmware Version: 1.0)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware02/22/20172/21/2022Overall Level: 2

-Cryptographic Module Specification: Level 3
-Roles, Services, and Authentication: Level 3
-EMI/EMC: Level 3
-Design Assurance: Level 3
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3924 and #3926); CVL (Cert. #780); DRBG (Certs. #1134 and #1135); HMAC (Certs. #2549 and #2550); KTS (AES Cert. #3924 and HMAC Cert. #2549); KTS (Triple-DES Cert. #2153 and HMAC Cert. #2549; key establishment methodology provides 112 bits of encryption strength); RSA (Cert. #2004); SHS (Certs. #3234 and #3235); Triple-DES (Cert. #2153)

-Other algorithms: AES (Cert. #3924, key wrapping; key establishment methodology provides 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 128 bits of encryption strength)
Multi-Chip Stand Alone

"The Talon provides ultra-high securtiy standards compliant approach to delivery of high definition real time video, control signaling and physical security data over an IP network. Meeting stringent government encryption and data validation standards, the end user can rest assured that their sensitive data is reliably transported and securely delivered. The device offers an unrivaled level of security and is not susceptible to spoofing or snooping. The product delivers all these features at a price point lower than existing solutions which would require multiple technology combinations."
2845LG Electronics, Inc.
20 Yoido-dong Youngdungpo-gu
Seoul 152-721
Republic of Korea

Jongseong Kim
TEL: 82-10-4535-0110
FAX: 82-2-6950-2080

CST Lab: NVLAP 200997-0
LG Kernel Loadable Cryptographic Module
(Hardware Version: Qualcomm Snapdragon 617; Qualcomm Snapdragon 808; Qualcomm Snapdragon 820; Software Version: 1.0)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software-Hybrid02/22/20172/21/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Android 6.0.1 (Linux kernel 3.18) running on an LG G5 (A64 with CE PAA)
Android 6.0.1 (Linux kernel 3.10) running on an LG Vista2 (A32 with CE PAA)
Android 6.0.1 (Linux kernel 3.10) running on an LG Vista2 (A32 with NEON PAA)
Android 6.0.1 (Linux kernel 3.10) running on an LG V10 (ARMv8 with CE PAA) (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3973, #3974 and #3975); DRBG (Certs. #1166, #1167 and #1168); HMAC (Certs. #2591, #2592 and #2593); SHA (Certs. #3278, #3279 and #3280); Triple-DES (Certs. #2178, #2179 and #2180)

-Other algorithms: NDRNG
Multi-Chip Stand Alone

"The LG Kernel Cryptographic Module is a software library located within the operating system kernel providing a C-language application program interface (API) for use by user and kernel applications that require cryptographic functionality."
2844Centrify Corporation
3300 Tannery Way
Santa Clara, CA 95054
USA

Kitty Shih

CST Lab: NVLAP 200556-0
Centrify Cryptographic Module
(Software Version: 2.0)
(When installed, initialized, and configured as specified in the Security Policy Section Secure Operation. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software02/21/20172/20/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Mac OS 10.11.5 running on a MacBook Pro Intel Core i7
Red Hat Enterprise Linux 7.2 running on a Intel Xeon E5620 x86_64
AIX 7.2 (32-bit) running on a PowerPC Power7 Processor
AIX 7.2 (64-bit) running on a PowerPC Power7 Processor

-FIPS Approved algorithms: AES (Cert. #4087); CVL (Cert. #903); DRBG (Cert. #1226); DSA (Cert. #1110); ECDSA (Cert. #923); HMAC (Cert. #2667); RSA (Cert. #2212); SHS (Cert. #3363); Triple-DES (Cert. #2232)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Multi-Chip Stand Alone

"Centrify Cryptographic Module is a general purpose cryptographic library. The Centrify Cryptographic Module provides the cryptographic services for all Centrify products."
2843Ciena® Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Patrick Scully
TEL: 613-670-3207

CST Lab: NVLAP 200928-0
Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module
(Hardware Version: 2.0 with PCB P/N NTK539QS-220; Firmware Version: 2.01)
(When installed, initialized and configured as specified in Section 3.1 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware02/20/20172/19/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4231 and #4232); CVL (Cert. #980); DRBG (Cert. #1315); ECDSA (Certs. #976 and #977); HMAC (Cert. #2770); SHS (Certs. #3468 and #3469); Triple-DES (Cert. #2291)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides 192 bits of encryption strength); NDRNG
Multi-Chip Embedded

"The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service."
2842McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
USA

James Reardon
TEL: 651-628-5346
FAX: n/a

CST Lab: NVLAP 100432-0
Network Security Platform Sensor NS-7100, NS-7200 and NS-7300
(Hardware Versions: P/Ns IPS-NS7100 Version 1.10, IPS-NS7200 Version 1.10 and IPS-NS7300 Version 1.10; FIPS Kit P/N IAC-FIPS-KT2; Firmware Version: 8.1.17.16)
(When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy. The protocol SNMP shall not be used when operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware02/17/20172/16/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3156); CVL (Certs. #409 and #599); DRBG (Cert. #649); HMAC (Cert. #1989); RSA (Certs. #1600 and #1825); SHS (Certs. #2612 and #2923)

-Other algorithms: AES (Cert. #3156, key wrapping; key establishment methodology provides 128 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #1989); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength); AES (non-compliant); DES; HMAC (non-compliant); MD5; RC4; RSA (non-compliant); SHS (non-compliant); SNMP KDF (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"Network Security Platform products (formerly known as IntruShield) are Intrusion Prevention Systems (IPS) that protect network infrastructures and endpoints from intrusions such as zero-day, DoS, spyware, VoIP, botnet, malware, phishing, and encrypted attacks with highly accurate, enterprise-class risk-aware intrusion prevention. The Network Security Management system manages the sensor deployments and permits the customer to receive real-time network status updates and alerts, implement customized security policies and incident response plans, and perform forensic analysis of attacks."
2841Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco Adaptive Security Appliance (ASA) Virtual
(Software Version: 9.6)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software02/15/20172/14/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): ASA Virtual 9.6 on Vmware ESXi 5.5 running on Cisco C220 M3 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4344); CVL (Cert. #1048); DRBG (Cert. #1386); ECDSA (Cert. #1027); HMAC (Cert. #2882); RSA (Cert. #2346); SHS (Cert. #3579); Triple-DES (Cert. #2348)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Stand Alone

"The market-leading Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA Virtual Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environments of all sizes."
2840Arxan Technologies
650 California St
San Francisco, CA 94108
USA

Sam Kerr
TEL: 301-968-4290
FAX: 415-247-0910

Andrei Alexandru
TEL: 301-968-4290
FAX: 415-247-0910

CST Lab: NVLAP 100432-0
Arxan Cryptographic Key & Data Protection
(Software Version: 1.0)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software02/14/20172/13/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Android KitKat 4.4.1 running on a Samsung Galaxy Tablet 4 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4123); CVL (Cert. #930); ECDSA (Cert. #938); HMAC (Cert. #2694); SHS (Cert. #3392); Triple-DES (Cert. #2253)

-Other algorithms: N/A
Multi-Chip Stand Alone

"Arxan Cryptographic Key & Data Protection solution implements state-of-the-art Whitebox Cryptography to protect Crypto Keys and Data (at-rest, in-transit & in-use). It transforms crypto keys and data so neither can be discovered statically in the application or in runtime memory. Arxan Cryptographic Key & Data Protection offers strongest security, broader platform support, with better performance, smaller footprint and easier integration. It provides all the major crypto algorithms and features required to protect sensitive keys and data in hostile or untrusted operational environments."
2839VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94304
USA

Eric Betts
TEL: 1-650-427-1902

CST Lab: NVLAP 200928-0
VMware OpenSSL FIPS Object Module
(Software Version: 2.0.9)
(When operated in FIPS mode. No assurance of the minimum strength of generated keys. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software02/14/2017
02/22/2017
1/29/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Physical Security: N/A
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Intel Core I without PAA w/ Windows 8.1 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Core I without PAA w/ Windows 7 SP1 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Core I with PAA w/ Windows 7 SP1 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Core I without PAA w/ Windows 10 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Core I with PAA w/ Windows 10 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Core I with PAA w/ Windows 8.1 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Xeon with PAA w/ Windows 2012 64 bit on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Xeon without PAA w/ Windows 2012 64 bit on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Xeon with PAA w/ Windows 2012 R2 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Xeon without PAA w/ Windows 2012 R2 on ESXi 6.0 (Microsoft C/C++ Optimizing Compiler Version 18.00.21005.1)
Intel Xeon without PAA w/ VMware NSX Controller OS 12.04 on ESXi 6.0 (gcc Compiler Version 4.6.3)
Intel Xeon with PAA w/ VMware NSX Controller OS 12.04 on ESXi 6.0 (gcc Compiler Version 4.6.3)
Intel Xeon without PAA w/ VMware NSX Edge OS 3.14 on ESXi 6.0 (gcc Compiler Version 4.6.3)
Intel Xeon with PAA w/ VMware NSX Edge OS 3.14 on ESXi 6.0 (gcc Compiler Version 4.6.3)
Intel Xeon with PAA w/ VMware NSX Manager OS 3.17 on ESXi 6.0 (gcc Compiler Version 4.6.3)
Intel Xeon without PAA w/ VMware NSX Manager OS 3.17 on ESXi 6.0 (gcc Compiler Version 4.6.3)
Intel Xeon with PAA w/ SLES 11 SP3 on ESXi 6.0 (gcc Compiler Version 5.3.0)
Intel Xeon without PAA w/ SLES 11 SP3 on ESXi 6.0 (gcc Compiler Version 5.3.0)
Intel Xeon without PAA w/ Photon OS 1.0 on ESXi 6 (gcc Compiler Version 5.3.0)
Intel Xeon with PAA w/ Photon OS 1.0 on ESXi 6 (gcc Compiler Version 5.3.0)

-FIPS Approved algorithms: AES (Cert. #4137); CVL (Cert. #943); DRBG (Cert. #1254); DSA (Cert. #1123); ECDSA (Cert. #949); HMAC (Cert. #2710); RSA (Cert. #2251); SHS (Cert. #3407); Triple-DES (Cert. #2261)

-Other algorithms: EC Diffie-Hellman (CVL Cert. #943, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of strength); Dual EC DRBG; PRNG
Multi-Chip Stand Alone

"The VMware OpenSSL FIPS Object Module provides cryptographic functions to various VMware applications."
2838Mitsubishi Space Software Co., Ltd.
Tsukuba Mitsui Bldg.,
1-6-1, Takezono
Tsukuba-shi, Ibaraki-ken 305-0032
Japan

Ikuo Shionoya
TEL: +81-29-856-0155
FAX: +81-29-858-0848

Ken Nakajima
TEL: +81-29-856-0155
FAX: +81-29-858-0848

CST Lab: NVLAP 200928-0
Command Encryption Module
(Firmware Version: 3.0)
(When installed, initialized and Windows Firewall Advanced Security Version 6.1 configured as specified in Section 11 of the Security Policy with tamper evident seals (part number: MSS-FIPS-16-500) installed as indicated in Section 5 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Firmware02/13/20172/12/2022Overall Level: 2

-Operational Environment: N/A
-EMI/EMC: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Windows 7 Professional SP1 running on a HP ProDesk 600 G2

-FIPS Approved algorithms: Triple-DES (Cert. #2191)

-Other algorithms: N/A
Multi-Chip Stand Alone

"Command Encryption Module is a firmware module designed to perform Triple DES CFB mode encryption functions."
2837IBM Corporation
11400 Burnet Road
Austin, TX 78758
USA

Tom Benjamin
TEL: 512-286-5319
FAX: 512-973-4763

Karthik Ramamoorthy
TEL: 512-286-8135
FAX: 512-973-4763

CST Lab: NVLAP 200658-0
IBM Java JCE FIPS 140-2 Cryptographic Module with CPACF
(Hardware Version: COP chips integrated within processor unit; Firmware Version: 3863 (aka FC3863) with System Driver Level 22H; Software Version: 1.8)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software-Hybrid02/13/20172/12/2022Overall Level: 1

-Tested Configuration(s): Tested as meeting Level 1 with z/OS version 2 release 2 running on IBM z13 model N63
Red Hat Enterprise Linux Server release 7.2 running on IBM z13 model N63 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3909 and #3910); CVL (Certs. #768, #769, #770 and #771); DRBG (Certs. #1124 and #1125); DSA (Certs. #1067 and #1068); ECDSA (Certs. #852 and #853); HMAC (Certs. #2538 and #2539); KTS (vendor affirmed); RSA (Certs. #1993 and #1994); SHS (Certs. #3221 and #3222); Triple-DES (Certs. #2145 and #2146)

-Other algorithms: Diffie-Hellman (CVL Certs. #769 and #771; key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #769 and #771; key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES (non-compliant); MD5; Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The IBM Java JCE (Java Cryptographic Extension) FIPS provider (IBMJCEFIPS) for multi-platforms is a scalable, multipurpose cryptographic module that supports many FIPS approved cryptographic operations. This gives Java applications access to the FIPS algorithms via the standard JCE framework."
2836Chunghwa Telecom Co., Ltd. and NXP Semiconductors
No. 99, Dianyan Road
Yangmei Dist.
Taoyuan City 32661
Taiwan (R.O.C.)

Char-Shin Miou
TEL: 03-4244381

Yeou-Fuh Kuan
TEL: 03-4244333

CST Lab: NVLAP 100432-0
HiCOS PKI Applet and Taiwan TWNID Applet on NXP JCOP 3 SecID P60 (OSA)
(Hardware Version: P6022y VB; Firmware Versions: JCOP 3 SECID P60 (OSA) version 0x0503.8211; Applets: HiCOS PKI Applet V1.0, TWNID Applet V1.1)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware02/13/20172/12/2022Overall Level: 2

-Physical Security: Level 3
-EMI/EMC: Level 3
-Design Assurance: Level 3
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3997); CVL (Cert. #824); DRBG (Cert. #1187); ECDSA (Cert. #890); KBKDF (Cert. #91); KTS (AES Cert. #3997; key establishment methodology provides 128 and 256 bits of encryption strength); RSA (Certs. #2053 and #2086); SHS (Cert. #3299); Triple-DES (Cert. #2195)

-Other algorithms: EC Diffie-Hellman (CVL Cert. #824, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG
Single Chip

"The Taiwan TID Applet is a Javacard applet that stores personal information related to the user. It allows governmental organizations to retrieve pieces of data. The HiCOS PKI Applet is a Javacard applet that provides security for stored user data and credentials and an easy to use interface to PKI services (i.e., for strong authentication, encryption and digital signatures)."
2835Apricorn, Inc.
12191 Kirkham Road
Poway, CA 92064
USA

Robert Davidson
TEL: 858-513-4430
FAX: 858-513-4404

CST Lab: NVLAP 200802-0
Apricorn FIPS Module 140-2
(Hardware Versions: REV. D with CAN 1A [A, B]; Firmware Versions: 7.0 [A], 7.6 [B])
(When installed, initialized and configured as specified in Section 11.1 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware02/08/2017
03/10/2017
2/7/2022Overall Level: 2

-EMI/EMC: Level 3
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2235 and #4032); DRBG (Cert. #260); ECDSA (Cert. #919); KAS (Cert. #86); SHS (Cert. #1911);

-Other algorithms: NDRNG
Multi-Chip Embedded

"The FIPS 140-2 Module is a complete encryption system that provides USB 3.1 interface to any SATA media. The boundary includes all CSPs including seed generation, RNG, code storage & all encryption functions. No CSPs leave the boundary for improved security. Its software free design allows interface to any host that supports USB & mass storage. The module supports 1 Admin & 4 users, brute force, recovery PINs, 7-16 digit PINs, auto lock, read only, etc. & is compatible with Apricorn’s Aegis Configurator. The FIPS 140-2 Module is used in Aegis Fortress, Padlock DT FIPS & Padlock SSD."
2834Apricorn, Inc.
12191 Kirkham Road
Poway, CA 92064
USA

Robert Davidson
TEL: 858-513-4430
FAX: 858-513-4404

CST Lab: NVLAP 200802-0
Aegis Secure Key 3.0 Cryptographic Module
(Hardware Versions: RevD {ASK3-8GB (8GB) [A, B, C], ASK3-16GB (16GB) [A, B, C], ASK3-30GB (30GB) [A, B, C], ASK3-60GB (60GB) [A, B, C], ASK3-120GB (120GB) [A, B, C], ASK3-240GB (240GB) [A, B, C], ASK3-480GB (480GB) [A, B, C]}; Firmware Versions: 7.1 [A], 7.7 [B], 7.8 [C])
(When installed, initialized and configured as specified in Section 11.1 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware02/07/2017
03/10/2017
03/27/2017
05/09/2017
2/6/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2235 and #4032); DRBG (Cert. #260); ECDSA (Cert. #919); KAS (Cert. #86); SHS (Cert. #1911)

-Other algorithms: NDRNG
Multi-Chip Stand Alone

"The Apricorn Aegis Secure Key 3.0 is a hardware encrypted USB 3.1 memory key. Its software free design allows interface to any host that supports USB and mass storage. Authentication is performed via the embedded keypad and all critical security parameters (PINs, encryption keys, etc) never leave the device boundary for improved security. The device supports 1 administrator and 1 user and offers a variety of features including programmable brute force, recovery PINs, 7-16 digit PINs, auto lock, read only modes, and is compatible with Apricorn’s Aegis Configurator"
2833Aruba a Hewlett Packard Enterprise Company
1344 Crossman Avenue
Sunnyvale, CA 94089
USA

Steve Weingart
TEL: 408-227-4500
FAX: 408-227-4550

CST Lab: NVLAP 200427-0
Aruba VMC-TACT Series Virtual Controllers with ArubaOS FIPS Firmware
(Firmware Version: ArubaOS VMC 6.4.2.0-1.3-FIPS)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Firmware02/03/20172/2/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): PacStar 451 SSV Small Server with Processor Intel i7 running on VMWare ESXI 5.5

-FIPS Approved algorithms: AES (Certs. #3778 and #3845); CVL (Certs. #718 and #734); DRBG (Cert. #1044); ECDSA (Certs. #813 and #830); HMAC (Certs. #2474 and #2494); KBKDF (Cert. #80); RSA (Certs. #1945, #1964 and #2082); SHS (Certs. #3145, #3167 and #3338); Triple-DES (Certs. #2099 and #2118)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"The Aruba Networks Virtual Mobility Controller (VMC) is a virtualized network device that serves as a gateway between wired and wireless networks and provides command-and-control over Access Points (APs) within an Aruba dependent wireless network."
2832Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
TEL: 669-227-3579
FAX: 866-315-1954

CST Lab: NVLAP 200658-0
Apple macOS CoreCrypto Module, v7.0
(Software Version: 7.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software02/02/20172/1/2022Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): macOS Sierra v10.12.2 running on Mac mini with i5 CPU with PAA
macOS Sierra v10.12.2 running on Mac mini with i5 CPU without PAA
macOS Sierra v10.12.2 running on MacBook Pro with i7 CPU with PAA
macOS Sierra v10.12.2 running on MacBook Pro with i7 CPU without PAA
macOS Sierra v10.12.2 running on MacPro with Xeon CPU with PAA
macOS Sierra v10.12.2 running on MacPro with Xeon CPU without PAA
macOS Sierra v10.12.2 running on MacBook with Core M CPU with PAA
macOS Sierra v10.12.2 running on MacBook with Core M CPU without PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4191, #4192, #4193, #4194, #4195, #4196, #4197, #4198, #4207, #4208, #4209, #4210, #4211, #4212, #4213, #4214, #4215, #4216, #4217, #4218, #4219, #4220, #4221, #4222, #4223, #4224, #4225, #4226, #4227, #4228, #4229, #4230, #4270, #4271, #4272, #4273, #4274, #4275, #4276 and #4277); CVL (Certs. #972, #973, #974, #975, #976, #977, #978 and #979); DRBG (Certs. #1291, #1292, #1293, #1294, #1295, #1296, #1297, #1298, #1299, #1300, #1301, #1302, #1303, #1304, #1305, #1306, #1307, #1308, #1309, #1310, #1311, #1312, #1313 and #1314); ECDSA (Certs. #968, #969, #970, #971, #972, #973, #974 and #975); HMAC (Certs. #2746, #2747, #2748, #2749, #2750, #2751, #2752, #2753, #2754, #2755, #2756, #2757, #2758, #2759, #2760, #2761, #2762, #2763, #2764, #2765, #2766, #2767, #2768, #2769, #2796, #2797, #2798, #2799, #2800, #2801 and #2809); KTS (AES Certs. #4215, #4216, #4217, #4218, #4219, #4220, #4221, #4222, #4223, #4224, #4225, #4226, #4227, #4228, #4229, #4230, #4270, #4271, #4272, #4273, #4274, #4275, #4276 and #4277; key establishment methodology provides between 128 and 160 bits of encryption strength); KTS (vendor affirmed); PBKDF (vendor affirmed); RSA (Certs. #2275, #2276, #2277, #2278, #2279, #2280, #2281 and #2282); SHS (Certs. #3444, #3445, #3446, #3447, #3448, #3449, #3450, #3451, #3452, #3453, #3454, #3455, #3456, #3457, #3458, #3459, #3460, #3461, #3462, #3463, #3464, #3465, #3466, #3467, #3497, #3498, #3499, #3500, #3501, #3502 and #3510); Triple-DES (Certs. #2283, #2284, #2285, #2286, #2287, #2288, #2289 and #2290)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 160 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES (non-compliant); ANSI X9.63 KDF; Blowfish; CAST5; DES; ECDSA (non-compliant); Ed25519; Hash_DRBG (non-compliant); Integrated Encryption Scheme on elliptic curves; KBKDF (non-compliant); MD2; MD4; MD5; OMAC (One-Key CBC MAC); RC2; RC4; RFC6637 KDF; RIPEMD; RSA (non-compliant); SP800-56C KDF (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The Apple macOS CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest."
2831Oracle Corporation
500 Eldorado Blvd., Bldg 5
Broomfield, CO 80021
USA

Security Evaluations Manager
TEL: 781-442-0451

CST Lab: NVLAP 200928-0
Oracle StorageTek T10000D Tape Drive
(Hardware Versions: P/N: 7042136 and P/N: 7314405; Firmware Version: RB411111)
(When operated in FIPS mode.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware02/02/20172/1/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2760, #4039, #4040 and #4047); CVL (Certs. #866 and #867); DRBG (Cert. #1209); ECDSA (Cert. #905); HMAC (Certs. #2636, #2637 and #2642); KTS (AES Cert. #4047); RSA (Cert. #2074); SHS (Certs. #3330 and #3331)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (key agreement, key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"The Oracle StorageTek T10000D Tape Drive blends the highest capacity, performance, reliability, and data security to support demanding, 24/7 data center operations. The StorageTek T10000D Tape Drive delivers the world's fastest write speeds up to 8.5 TB of magnetic tape storage; making it ideal for data center operations with growing volumes. Designed for maximum performance, the drive allows the use of multiple keys per tape with a cache memory to minimize the overhead of key transmission. Works seamlessly with the Oracle Key Manager to provide a secure end-to-end management solution."
2830Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
TEL: 669-227-3579
FAX: 866-315-1954

CST Lab: NVLAP 200658-0
Apple macOS CoreCrypto Kernel Module, v7.0
(Software Version: 7.0)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software02/01/20171/31/2022Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): macOS Sierra 10.12.2 running on Mac mini with i5 CPU with PAA
macOS Sierra 10.12.2 running on Mac mini with i5 CPU without PAA
macOS Sierra 10.12.2 running on MacBook Pro with i7 CPU with PAA
macOS Sierra 10.12.2 running on MacBook Pro with i7 CPU without PAA
macOS Sierra 10.12.2 running on MacPro with Xeon CPU with PAA
macOS Sierra 10.12.2 running on MacPro with Xeon CPU without PAA
macOS Sierra 10.12.2 running on MacBook with Core M CPU with PAA
macOS Sierra 10.12.2 running on MacBook with Core M CPU without PAA (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4199, #4200, #4201, #4202, #4203, #4204, #4205, #4206, #4261, #4262, #4263, #4264, #4289, #4290, #4291 and #4292); DRBG (Certs. #1287, #1288, #1289, #1290, #1332, #1333, #1334, #1335, #1349, #1350, #1351 and #1352); ECDSA (Certs. #999, #1000, #1001 and #1002); HMAC (Certs. #2792, #2793, #2794, #2795, #2802, #2803, #2804, #2805, #2806, #2807, #2808, #2825, #2826, #2827 and #2828); KTS (AES Certs. #4199, #4200, #4201, #4203, #4261, #4262, #4263, #4264, #4289, #4290, #4291 and #4292; key establishment methodology provides between 128 and 160 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2310, #2311, #2312 and #2313); SHS (Certs. #3493, #3494, #3495, #3496, #3503, #3504, #3505, #3506, #3507, #3508, #3509, #3527, #3528, #3529 and #3530); Triple-DES (Certs. #2310, #2311, #2312 and #2313)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES (non-compliant); ANSI X9.63 KDF; Blowfish; CAST5; DES; ECDSA (non-compliant); Ed25519; Hash_DRBG (non-compliant); Integrated Encryption Scheme on elliptic curves; KBKDF (non-compliant); MD2; MD4; MD5; OMAC (One-Key CBC MAC); RC2; RC4; RFC6637 KDF; RIPEMD; SP800-56C KDF (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The Apple macOS CoreCrypto Kernel Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest."
2829IBM Corporation
2455 South Road
Poughkeepsie, NY 12601-5400
USA

John Monti
TEL: 845-435-4164

Alyson Comer
TEL: 607-429-4309

CST Lab: NVLAP 200658-0
IBM® z/OS® Version 2 Release 1 System SSL Cryptographic Module
(Hardware Version: COP chips integrated within processor unit; Firmware Version: Feature 3863 (aka FC3863) with System Driver Level 22H; Software Version: HCPT410/JCPT411 with APAR OA50589)
(When operated in FIPS mode with modules IBM(R) z/OS(R) Version 2 Release 1 Security Server RACF(R) Signature Verification Module version 1.0 validated to FIPS 140-2 under Cert. #2691 operating in FIPS mode and IBM(R) z/OS(R) Version 2 Release 1 ICSF PKCS #11 Cryptographic Module validated to FIPS 140-2 under Cert. #2763 operating in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software-Hybrid02/01/20171/31/2022Overall Level: 1

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): IBM z/OS Version 2 Release 1 running on an IBM z13 (single-user mode)

-FIPS Approved algorithms: AES (Certs. #3958, #4083 and #4084); CVL (Certs. #901, #902, #934 and #935); DSA (Certs. #1108, #1109, #1119 and #1120); HMAC (Certs. #2665, #2666, #2697 and #2698); RSA (Certs. #2210, #2211, #2231, #2232, #2240, #2241, #2242, #2243, #2244, #2245, #2246 and #2247); SHS (Certs. #3196, #3361 and #3362); Triple-DES (Certs. #2214, #2230 and #2231)

-Other algorithms: HMAC-MD5; MD5; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength)
Multi-Chip Stand Alone

"z/OS® System SSL provides a rich set of C based application programming interfaces that allow applications to protect data using the SSL/TLS protocols and through PKCS#7 cryptographic messages. z/OS System SSL also enables applications to create and manage X.509 V3 certificates and keys within key database files and PKCS#11 tokens."
2828Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
TEL: 669-227-3579
FAX: 866-315-1954

CST Lab: NVLAP 200658-0
Apple iOS CoreCrypto Kernel Module v7.0
(Software Version: 7.0)
(When operated in FIPS Mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software02/01/20171/31/2022Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): iOS 10.2 running on iPhone5S with Apple A7 CPU
iOS 10.2 running on iPhone6 (iPhone6 and iPhone6 Plus) with Apple A8 CPU
iOS 10.2 running on iPhone6S (iPhone6S and iPhone6S Plus) with Apple A9 CPU
iOS 10.2 running on iPhone7 (iPhone7 and iPhone7 Plus) with Apple A10 CPU
iOS 10.2 running on iPad Air 2 with Apple A8X CPU
iOS 10.2 running on iPad Pro with Apple A9X CPU (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4255, #4256, #4257, #4258, #4259, #4260, #4293, #4294, #4295, #4296, #4297 and #4298); DRBG (Certs. #1353, #1354, #1355, #1356, #1357 and #1358); ECDSA (Certs. #1003, #1004, #1005, #1006, #1007 and #1008); HMAC (Certs. #2829, #2830, #2831, #2832, #2833, #2834, #2854, #2855, #2856, #2857, #2858 and #2859); KTS (AES Certs. #4255, #4256, #4257, #4258, #4259, #4260, #4293, #4294, #4295, #4296, #4297 and #4298; key establishment methodology provides between 128 and 160 bits of encryption strength); PBKDF (vendor affirmed); RSA (Certs. #2314, #2315, #2316, #2317, #2318 and #2319); SHS (Certs. #3531, #3532, #3533, #3534, #3535, #3536, #3557, #3558, #3559, #3560, #3561 and #3562); Triple-DES (Certs. #2314, #2315, #2316, #2317, #2318 and #2319)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES (non-compliant); ANSI X9.63 KDF; Blowfish; CAST5; DES; ECDSA (non-compliant); Ed25519; HASH_DRBG (non-compliant); Integrated Encryption Scheme on elliptic curves; KBKDF (non-compliant); MD2; MD4; MD5; OMAC (One-Key CBC MAC); RC2; RC4; RFC6637 KDF; RIPEMD; SP800-56C KDF (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The Apple iOS CoreCrypto Kernel Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest."
2827Apple Inc.
1 Infinite Loop
Cupertino, CA 95014
USA

Shawn Geddis
TEL: 669-227-3579
FAX: 866-315-1954

CST Lab: NVLAP 200658-0
Apple iOS CoreCrypto Module v7.0
(Software Version: 7.0)
(When operated in FIPS Mode. The module generates cryptographic keys whose strengths are modified by available entropy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Software02/01/20171/31/2022Overall Level: 1

-Physical Security: N/A
-Tested Configuration(s): iOS 10.2 running on iPhone5S with Apple A7 CPU
iOS 10.2 running on iPhone6 (iPhone6 and iPhone6 Plus) with Apple A8 CPU
iOS 10.2 running on iPhone6S (iPhone6S and iPhone6S Plus) with Apple A9 CPU
iOS 10.2 running on iPhone7 (iPhone7 and iPhone7 Plus) with Apple A10 CPU
iOS 10.2 running on iPad Air 2 with Apple A8X CPU
iOS 10.2 running on iPad Pro with Apple A9X CPU (single-user mode)

-FIPS Approved algorithms: AES (Certs. #4156, #4157, #4158, #4159, #4160, #4161, #4162, #4163, #4164, #4165, #4166, #4167, #4168, #4169, #4170, #4171, #4172, #4173, #4174, #4175, #4176, #4177, #4178, #4179, #4180, #4181, #4182, #4183, #4184, #4185, #4186, #4187, #4188, #4189, #4190 and #4269); CVL (Certs. #959, #960, #961, #962, #963, #964, #965, #966, #967, #968, #969 and #1010); DRBG (Certs. #1264, #1265, #1266, #1267, #1268, #1269, #1270, #1271, #1272, #1273, #1274, #1275, #1276, #1277, #1278, #1279, #1280, #1281, #1282, #1283, #1284, #1285, #1286 and #1339); ECDSA (Certs. #957, #958, #959, #960, #961, #962, #963, #964, #965, #966, #967 and #997); HMAC (Certs. #2723, #2724, #2725, #2726, #2727, #2728, #2729, #2730, #2731, #2732, #2733, #2734, #2735, #2736, #2737, #2738, #2739, #2740, #2741, #2742, #2743, #2744, #2745 and #2813); KTS (AES Certs. #4156, #4157, #4158, #4159, #4160, #4161, #4162, #4163, #4164, #4166, #4169, #4170, #4180, #4181, #4182, #4183, #4184, #4185, #4186, #4187, #4188, #4189, #4190 and #4269; key establishment methodology provides between 128 and 160 bits of encryption strength); KTS (vendor affirmed); PBKDF (vendor affirmed); RSA (Certs. #2264, #2265, #2266, #2267, #2268, #2269, #2270, #2271, #2272, #2273, #2274 and #2299); SHS (Certs. #3421, #3422, #3423, #3424, #3425, #3426, #3427, #3428, #3429, #3430, #3431, #3432, #3433, #3434, #3435, #3436, #3437, #3438, #3439, #3440, #3441, #3442, #3443 and #3514); Triple-DES (Certs. #2272, #2273, #2274, #2275, #2276, #2277, #2278, #2279, #2280, #2281, #2282 and #2308)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 160 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); AES-CMAC (non-compliant); ANSI X9.63 KDF; Blowfish; CAST5; DES; ECDSA (non-compliant); Ed25519; Hash_DRBG (non-compliant); Integrated Encryption Scheme on elliptic curves; KBKDF (non-compliant); MD2; MD4; MD5; OMAC (One-Key CBC MAC); RFC6637 KDF; RIPEMD; RC2; RC4; RSA (non-compliant); SP800-56C KDF (non-compliant); Triple-DES (non-compliant)
Multi-Chip Stand Alone

"The Apple iOS CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest."
2826DataLocker Inc.
7007 College Blvd
Suite 240
Overland Park, KS 66211
USA

Jay Kim
TEL: 913-310-9088

CST Lab: NVLAP 100432-0
DataLocker H350
(Hardware Versions: P/Ns MXKB1B500G5001FIPS, MXKB1B001T5001FIPS, MXKB1B002T5001FIPS, DL-H350-0250SSD, DL-H350-0500SSD, DL-H350-1000SSD; Firmware Version: 1.1.0)
(Files distributed with the module mounted within the Read-Only drive are excluded from validation)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/31/20171/30/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #1412 and #4139); DRBG (Cert. #1257); HMAC (Certs. #2712 and #2715); PBKDF (vendor affirmed); RSA (Certs. #2255 and #2256); SHS (Certs. #1282 and #3409)

-Other algorithms: NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Multi-Chip Stand Alone

"DataLocker H350 is a secure USB hard disk drive with 256-bit AES encryption and PKI operations combined with advanced authentication and policy management capabilities to help organizations control user access to sensitive data. DataLocker H350 allows enterprise management features like password recovery and remote kill."
2825Gemalto
Avenue du Jujubier, Z.I Athelia IV
La Ciotat 17305
France

Chanan Lavy
TEL: 972-3-9781254
FAX: 972-3-9781010

Frederic Garnier
TEL: +33 442364368
FAX: +33 442366953

CST Lab: NVLAP 100432-0
eToken 5110
(Hardware Versions: P/Ns STM32F042K6U6TR [1] and SLE78CFX3000PH [2]; Firmware Versions: 5110 FIPS FW ver-15.0 [1] and IDCore30-revB- Build 06, eToken Applet version 1.8, eTPnP Applet V1.0 [2])

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/30/20171/29/2022Overall Level: 3

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3779); CVL (Certs. #719, #803 and #804); DRBG (Cert. #1045); ECDSA (Cert. #814); KBKDF (Cert. #81); RSA (Certs. #1946, #1947 and #2037); SHS (Certs. #3146 and #3276); Triple-DES (Cert. #2100); Triple-DES MAC (Triple-DES Cert. #2100, vendor affirmed)

-Other algorithms: AES (Cert. #3779, key wrapping; key establishment methodology provides between 128 and 256 bits of strength); EC Diffie-Hellman (CVL Cert. #719, key agreement; key establishment methodology provides between 112 and 192 bits of encryption strength); NDRNG; Triple-DES (Cert. #2100, key wrapping; key establishment methodology provides 112 bits of strength)
Multi-Chip Stand Alone

"SafeNet eToken 5110 FIPS is a portable two-factor USB authenticator with advanced smart card technology. It utilizes certificate based technology to generate and store credentials, such as private keys, passwords and digital certificates inside the protected environment of the smart card chip. To authenticate, users must supply both their personal SafeNet authenticator and password, providing a critical second level of security beyond simple passwords to protect valuable digital business."
2824Apricorn, Inc.
12191 Kirkham Road
Poway, CA 92064
USA

Robert Davidson
TEL: 858-513-4430
FAX: 858-513-4404

CST Lab: NVLAP 200802-0
Aegis Secure Key 3Z Cryptographic Module
(Hardware Versions: RevA {P/Ns ASK3Z-8GB (8GB) [A, B, C, D], ASK3Z-16GB (16GB) [A, B, C, D], ASK3Z-32GB (32GB) [A, B, C, D], ASK3Z-64GB (64GB) [A, B, C, D] and ASK3Z-128GB (128GB) [A, B, C, D]}; Firmware Versions: 7.1 [A], 7.5 [B], 7.7 [C], 7.8 [D])
(When installed, initialized and configured as specified in Section 11.1 of the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware01/30/2017
03/10/2017
03/27/2017
05/02/2017
1/29/2022Overall Level: 3

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2235 and #4032); DRBG (Cert. #260); ECDSA (Cert. #919); KAS (Cert. #86); SHS (Cert. #1911)

-Other algorithms: NDRNG
Multi-Chip Stand Alone

"The Apricorn Aegis Secure Key 3z is a hardware encrypted USB 3.1 memory key. Its software free design allows interface to any host that supports USB and mass storage. Authentication is performed via the embedded keypad and all critical security parameters (PINs, encryption keys, etc) never leave the device boundary for improved security. The device supports 1 administrator and 1 user and offers a variety of features including programmable brute force, recovery PINs, 7-16 digit PINs, auto lock, read only modes, and is compatible with Apricorn’s Aegis Configurator"
2823UnaliWear, Inc.
3410 Cherry Lane
Austin, TX 78746
USA

Jean Anne Booth
TEL: 512-917-3088

Brian Kircher
TEL: 512-773-7854

CST Lab: NVLAP 100432-0
Kanega Watch
(Software Version: 3.9.2)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/26/20171/25/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): OpenRTOS v9.0.0 running on Atmel Sam4L8 Xplained Pro (single-user mode)

-FIPS Approved algorithms: AES (Cert. #4012); HMAC (Cert. #2617); SHS (Cert. #3310)

-Other algorithms: N/A
Multi-Chip Stand Alone

"The Kanega Watch is a cryptography software library."
2822Toshiba Memory Corporation
1-1, Shibaura 1-chome
Minato-ku
Tokyo 105-8001
Japan

Akihiro Kimura
TEL: +81-45-890-2856
FAX: +81-45-890-2593

CST Lab: NVLAP 200822-0
Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive (PX05S model) Type B
(Hardware Versions: A1 with PX05SVQ160B[1], A1 with PX05SVQ320B[2], A0 with PX05SRQ384B[3], A2 with PX05SVQ040B[4], A2 with PX05SRQ192B[5], A1 with PX05SVQ048B[6], A1 with PX05SVQ096B[7], A1 with PX05SVQ192B[8], A1 with PX05SVQ384B[9], A1 with PX05SRQ384B[10]; Firmware Versions: PX05MS00[1][2], PX056901[3], PX05MD42[4][5], PX050502[6][7][8][9][10])

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/25/2017
02/22/2017
05/02/2017
1/24/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3485, #3486 and #3487); DRBG (Cert. #867); HMAC (Cert. #2231); RSA (Cert. #1795); SHS (Cert. #2879)

-Other algorithms: NDRNG
Multi-Chip Embedded

"The Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive is used for solid state drive data security. This Cryptographic Module (CM) provides various cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption, cryptographic erase, independently protected user data LBA bands, and FW download."
2821Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
USA

Diana Robinson
TEL: 845-454-6397

Ian Hall
TEL: 703-598-6876

CST Lab: NVLAP 200928-0
SSL Visibility Appliance
(Hardware Versions: SV3800 [1], SV3800B [2] and SV3800B-20 [3]; 090-03064 [1], 080-03563 [1], 080-03679 [1], 090-03550 [2], 080-03782 [2], 080-03787 [2], 090-03551 [3], 080-03783 [3], and 080-03788 [3] with FIPS Kit: FIPS-LABELS-SV; Firmware Versions: 3.8.2F build 227, 3.8.4FC, 3.10 build 40)
(When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/25/20171/24/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3195, #3496 and #4106); CVL (Certs. #429, #562 and #919); DRBG (Certs. #669, #866 and #1233); ECDSA (Certs. #584, #711 and #931); HMAC (Certs. #2013, #2230 and #2682); PBKDF (vendor affirmed); RSA (Certs. #1238, #1625, #1794 and #2222); SHS (Certs. #2052, #2642, #2885 and #3378); Triple-DES (Certs. #1821, #1968 and #2244)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Camelia; ChaCha20-Poly1305; DES; HMAC-MD5; MD5; RC4
Multi-Chip Stand Alone

"The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to "inspect" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic."
2820Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco ASA 5506-X, ASA 5506H-X, ASA 5506W-X, ASA 5508-X, ASA 5512-X, ASA 5515-X, ASA 5516-X, ASA 5525-X, ASA 5545-X, ASA 5555-X, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Adaptive Security Appliances
(Hardware Versions: ASA 5506-X[1], ASA 5506H-X[1], ASA 5506W-X[1], ASA 5508-X[2][3], ASA 5512-X[2], ASA 5515-X[5], ASA 5516-X[2][4], ASA 5525-X[5], ASA 5545-X[5], ASA 5555-X[5], ASA 5585-X SSP-10[6], 5585-X SSP-20[6], 5585-X SSP-40[6], and 5585-X SSP-60[6] with [ASA5506-FIPS-KIT=][1], [ASA5500X-FIPS-KIT=][2], [ASA5508-FIPS-KIT=][3], [ASA5516-FIPS-KIT=][4], [CISCO-FIPS-KIT=][5] or [ASA5585-X-FIPS-KIT][6]; Firmware Version: 9.6)
(When operated in FIPS mode and with the tamper evident seals and security devices installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/23/20171/22/2022Overall Level: 2

-Roles, Services, and Authentication: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2050, #2444, #2472, #3301 and #4249); CVL (Cert. #1002); DRBG (Certs. #332, #336, #819 and #1328); ECDSA (Cert. #989); HMAC (Certs. #1247, #1514, #2095 and #2787); RSA (Cert. #2298); SHS (Certs. #1794, #2091, #2737 and #3486); Triple-DES (Certs. #1321, #1513, #1881 and #2304)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Stand Alone

"The market-leading Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environments of all sizes."
2819Toshiba Corporation
1-1, Shibaura 1-chome
Minato-ku
Tokyo 105-8001
Japan

Akihiro Kimura
TEL: +81-45-890-2856
FAX: +81-45-890-2593

CST Lab: NVLAP 200822-0
Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive (PX05S model) Type A
(Hardware Versions: A1 with PX05SVQ080B, A1 with PX05SVQ160B or A1 with PX05SRQ384B; Firmware Version: PX05NA00)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/19/20171/18/2022Overall Level: 2

-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3485, #3486 and #3487); DRBG (Cert. #867); HMAC (Cert. #2231); RSA (Cert. #1795); SHS (Cert. #2879)

-Other algorithms: NDRNG
Multi-Chip Embedded

"The Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive is used for solid state drive data security. This Cryptographic Module (CM) provides various cryptographic services using FIPS approved algorithms. Services include hardware-based data encryption, cryptographic erase, independently protected user data LBA bands, and FW download."
2818Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Global Certification Team

CST Lab: NVLAP 200997-0
Cisco ASA Service Module (SM)
(Hardware Version: WS-SVC-ASA-SM1-K9; Firmware Version: 9.6)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/18/20171/17/2022Overall Level: 1

-Roles, Services, and Authentication: Level 3
-Design Assurance: Level 2
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #2050, #2444 and #4249); CVL (Cert. #1002); DRBG (Certs. #332 and #1328); ECDSA (Cert. #989); HMAC (Certs. #1247 and #2787); RSA (Cert. #2298); SHS (Certs. #1794 and #3486); Triple-DES (Certs. #1321 and #2304)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; RC4
Multi-Chip Embedded

"The market-leading Cisco ASA Security Appliance Series deliver robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The Cisco ASA Service Module (SM) provides comprehensive security, performance, and reliability for network environments of all sizes."
2817Hypori, Inc.
9211 Waterford Centre Blvd
Suite 100
Austin, TX 78758
USA

Evan Watkins
TEL: 512-646-1040

CST Lab: NVLAP 200427-0
Hypori FIPS Object Module for OpenSSL
(Software Version: 2.0.10)
(When built, installed, protected and initialized as assumed by the Crypto Officer role and as specified in the provided Security Policy. Appendix A of the provided Security Policy specifies the actual distribution tar file containing the source code of this module. There shall be no additions, deletions or alterations to the tar file contents as used during module build. The distribution tar file shall be verified as specified in Appendix A of the provided Security Policy. Installation and protection shall be completed as specified in Appendix A of the provided Security Policy. Initialization shall be invoked as per Section 4 of the provided Security Policy. Any deviation from specified verification, protection, installation and initialization procedures will result in a non FIPS 140-2 compliant module. This validation entry is a non-security relevant modification to Cert. #1747)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/13/20171/12/2022Overall Level: 1

-Roles, Services, and Authentication: Level 2
-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Android 2.2 running on Qualcomm QSD8250 (ARMv7) without PAA (gcc Compiler Version 4.4.0)Android 2.2 running on Qualcomm QSD8250 (ARMv7) with PAA (gcc Compiler Version 4.4.0)Microsoft Windows 7 (32 bit) running on Intel Celeron (Microsoft 32 bit C/C++ Optimizing Compiler Version 16.00)uCLinux 0.9.29 running on ARM 922T (ARMv4) (gcc Compiler Version 4.2.1)Fedora 14 running on Intel Core i5 with PAA (gcc Compiler Version 4.5.1)HP-UX 11i (32 bit) running on Intel Itanium 2 (HP C/aC++ B3910B)HP-UX 11i (64 bit) running on Intel Itanium 2 (HP C/aC++ B3910B)Ubuntu 10.04 running on Intel Pentium T4200 (gcc Compiler Version 4.1.3)Ubuntu 10.04 (32 bit) running on Intel Pentium T4200 (gcc Compiler Version 4.1.3)Ubuntu 10.04 (64 bit) running on Intel Pentium T4200 (gcc Compiler Version 4.1.3)Android 3.0 running on NVIDIA Tegra 250 T20 (ARMv7) (gcc Compiler Version 4.4.0)Linux 2.6.27 running on PowerPC e300c3 (gcc Compiler Version 4.2.4)Microsoft Windows 7 (64 bit) running on Intel Pentium 4 (Microsoft C/C++ Optimizing Compiler Version 16.00)Ubuntu 10.04 running on Intel Core i5 with PAA (32 bit) (gcc Compiler Version 4.1.3)Linux 2.6.33 running on PowerPC32 e300 (gcc Compiler Version 4.1.0)Android 2.2 running on OMAP 3530 (ARMv7) with PAA (gcc Compiler Version 4.1.0)VxWorks 6.8 running on TI TNETV1050 (MIPS) (gcc Compiler Version 4.1.2)Linux 2.6 running on Broadcom BCM11107 (ARMv6) (gcc Compiler Version 4.3.2)Linux 2.6 running on TI TMS320DM6446 (ARMv4) (gcc Compiler Version 4.3.2)Linux 2.6.32 running on TI AM3703CBP (ARMv7) (gcc Compiler Version 4.3.2)Oracle Solaris 10 (32 bit) running on SPARC-T3 (SPARCv9) (gcc Compiler Version3.4.3)Oracle Solaris 10 (64 bit) running on SPARC-T3 (SPARCv9) (gcc Compiler Version 3.4.3)Oracle Solaris 11 (32 bit) running on Intel Xeon 5675 (gcc Compiler Version 4.5.2)Oracle Solaris 11 (64 bit) running on Intel Xeon 5675 (gcc Compiler Version 4.5.2)Oracle Solaris 11 running on Intel Xeon 5675 with PAA (32 bit) (gcc Compiler Version 4.5.2)Oracle Solaris 11 running on Intel Xeon 5675 with PAA (64 bit) (gcc Compiler Version 4.5.2)Oracle Linux 5 (64 bit) running on Intel Xeon 5675 (gcc Compiler Version 4.1.2)CascadeOS 6.1 (32 bit) running on Intel Pentium T4200 (gcc Compiler Version 4.4.5)CascadeOS 6.1 (64 bit) running on Intel Pentium T4200 (gcc Compiler Version 4.4.5)Oracle Linux 5 running on Intel Xeon 5675 with PAA (gcc Compiler Version 4.1.2)Oracle Linux 6 running on Intel Xeon 5675 without PAA (gcc Compiler Version 4.4.6)Oracle Linux 6 running on Intel Xeon 5675 with PAA (gcc Compiler Version 4.4.6)Oracle Solaris 11 (32 bit) running on SPARC-T3 (SPARCv9) (Sun C Version 5.12)Oracle Solaris 11 (64 bit) running on SPARC-T3 (SPARCv9) (Sun C Version 5.12)Android 4.0 running on NVIDIA Tegra 250 T20 (ARMv7) (gcc Compiler Version 4.4.3)Apple iOS 5.1 running on ARMv7 (gcc Compiler Version 4.2.1)Microsoft Windows CE 6.0 running on ARMv5TEJ (Microsoft C/C++ Optimizing Compiler Version 15.00 for ARM)Microsoft Windows CE 5.0 running on ARMv7 (Microsoft C/C++ Optimizing Compiler Version 13.10 for ARM)Linux 2.6 running on Freescale PowerPCe500 (gcc Compiler Version 4.1.0)DSP Media Framework 1.4 running on TI C64x+ (TMS320C6x C/C++ Compiler v6.0.13)Android 4.0 running on TI OMAP 3 (ARMv7) with PAA (gcc Compiler Version 4.4.3)NetBSD 5.1 running on PowerPCe500 (gcc Compiler Version 4.1.3)NetBSD 5.1 running on Intel Xeon 5500 (gcc Compiler Version 4.1.3)Microsoft Windows 7 running on Intel Core i5- 2430M (64-bit) with PAA (Microsoft ® C/C++ Optimizing Compiler Version 16.00 for x64)Android 4.1 running on TI DM3730 (ARMv7) without PAA (gcc Compiler Version 4.6)Android 4.1 running on TI DM3730 (ARMv7) with PAA (gcc Complier Version 4.6)Android 4.2 running on Nvidia Tegra 3 (ARMv7) without PAA (gcc Compiler Version 4.6)Android 4.2 running on Nvidia Tegra 3 (ARMv7) with PAA (gcc Compiler Version 4.6)Windows Embedded Compact 7 running on Freescale i.MX53xA (ARMv7) with PAA (Microsoft C/C++ Optimizing Compiler Version 15.00.20720)Windows Embedded Compact 7 running on Freescale i.MX53xD (ARMv7) with PAA (Microsoft C/C++ Optimizing Compiler Version 15.00.20720)Android 4.0 running on Qualcomm Snapdragon APQ8060 (ARMv7) with PAA (gcc compiler Version 4.4.3)Apple OS X 10.7 running on Intel Core i7-3615QM (Apple LLVM version 4.2)Apple iOS 5.0 running on ARM Cortex A8 (ARMv7) with PAA (gcc Compiler Version 4.2.1)OpenWRT 2.6 running on MIPS 24Kc (gcc Compiler Version 4.6.3)QNX 6.4 running on Freescale i.MX25 (ARMv4) (gcc Compiler Version 4.3.3)Apple iOS 6.1 running on Apple A6X SoC (ARMv7s) (gcc Compiler Version 4.2.1)eCos 3 running on Freescale i.MX27 926ejs (ARMv5TEJ) (gcc Compiler Version 4.3.2)Vmware Horizon Workspace 1.5 under Vmware ESXi 5.0 running on Intel Xeon E3-1220 (x86) without PAA (gcc Compiler Version 4.5.1)Vmware Horizon Workspace 1.5 under Vmware ESXi 5.0 running on Intel Xeon E3-1220 (x86) with PAA (gcc Compiler Version 4.5.1)Ubuntu 13.04 running on AM335x Cortex-A8 (ARMv7) without PAA (gcc Compiler Version 4.7.3)Ubuntu 13.04 running on AM335x Cortex-A8 (ARMv7) with PAA (gcc Compiler Version 4.7.3)Linux 3.8 running on ARM926 (ARMv5TEJ) (gcc Compiler Version 4.7.3)Linux 3.4 under Citrix XenServer 6.2 running on Intel Xeon E5-2430L without PAA (gcc Compiler Version 4.8.0)Linux 3.4 under Citrix XenServer 6.2 running on Intel Xeon E5-2430L with PAA (gcc Compiler Version 4.8.0)Linux 3.4 under Vmware ESXi 5.1 running on Intel Xeon E5-2430L without PAA (gcc Compiler Version 4.8.0)Linux 3.4 under Vmware ESXi 5.1 running on Intel Xeon E5-2430L with PAA (gcc Compiler Version 4.8.0)Linux 3.4 under Microsoft Windows 2012 Hyper-V running on Intel Xeon E5-2430L without PAA (gcc Compiler Version 4.8.0)Linux 3.4 under Microsoft Windows 2012 Hyper-V running on Intel Xeon E5-2430L with PAA (gcc Compiler Version 4.8.0)iOS 6.0 running on Apple A5 / ARM Cortex-A9 (ARMv7) without PAA (gcc Compiler Version 4.2.1)iOS 6.0 running on Apple A5 / ARM Cortex-A9 (ARMv7) with PAA (gcc Compiler Version 4.2.1)PexOS 1.0 under vSphere ESXi 5.1 running on Intel Xeon E52430L without PAA (gcc Compiler Version 4.6.3)PexOS 1.0 under vSphere ESXi 5.1 running on Intel Xeon E52430L with PAA (gcc Compiler Version 4.6.3)Linux 2.6 running on Freescale e500v2 (PPC) (gcc Compiler Version 4.4.1)AcanOS 1.0 running on Intel Core i7-3612QE (x86) without PAA (gcc Compiler Version 4.6.2)AcanOS 1.0 running on Intel Core i7-3612QE (x86) with PAA (gcc Compiler Version 4.6.2)AcanOS 1.0 running on Feroceon 88FR131 (ARMv5) (gcc Compiler Version 4.5.3)FreeBSD 8.4 running on Intel Xeon E5440 (x86) without PAA (gcc Compiler Version 4.2.1)FreeBSD 9.1 running on Xeon E5-2430L (x86) without PAA (gcc Compiler Version 4.2.1)FreeBSD 9.1 running on Xeon E5-2430L (x86) with PAA (gcc Compiler Version 4.2.1)ArbOS 5.3 running on Xeon E5645 (x86) without PAA (gcc Compiler Version 4.1.2)Linux ORACLESP 2.6 running on ASPEED AST-Series (ARMv5) (gcc Compiler Version 4.4.5)Linux ORACLESP 2.6 running on Emulex PILOT3 (ARMv5) (gcc Compiler Version 4.4.5)ArbOS 5.3 running on Xeon E5645 (x86) with PAA (gcc Compiler Version 4.1.2)FreeBSD 9.2 running on Xeon E5-2430L (x86) without PAA (gcc Compiler Version 4.2.1)FreeBSD 9.2 running on Xeon E5-2430L (x86) with PAA (gcc Compiler Version 4.2.1)FreeBSD 10.0 running on Xeon E5-2430L (x86) without PAA (clang Compiler Version 3.3)FreeBSD 10.0 running on Xeon E5- 2430L (x86) with PAA (clang Compiler Version 3.3)FreeBSD 8.4 running on Intel Xeon E5440 (x86) 32-bit (gcc Compiler Version 4.2.1)Vmware Horizon Workspace 2.1 under vSphere ESXi 5.5 running on Intel Xeon E3-1220 (x86) without PAA (gcc Compiler Version 4.5.1)Vmware Horizon Workspace 2.1 under vSphere ESXi 5.5 running on Intel Xeon E3-1220 (x86) with PAA (gcc Compiler Version 4.5.1)QNX 6.5 running on Freescale i.MX25 (ARMv4) (gcc Compiler Version 4.3.3)Apple iOS 7.1 64- bit running on Apple A7 (ARMv8) without PAA (clang Compiler Version 5.1)Apple iOS 7.1 64-bit running on Apple A7 (ARMv8) with PAA (clang Compiler Version 5.1)TS-Linux 2.4 running on Arm920Tid (ARMv4) (gcc Compiler Version 4.3.2)iOS 8.1 64-bit running on Apple A7 (ARMv8) without PAA and Crypto Extensions (clang Compilerv Version 600.0.56)iOS 8.1 64-bit running on Apple A7 (ARMv8) with PAA and Crypto Extensions (clang Compiler Version 600.0.56)VxWorks 6.9 running on Freescale P2020 (PPC) (gcc Compiler Version 4.3.3)iOS 8.1 32-bit running on Apple A7 (ARMv8) without PAA (clang Compiler Version 600.0.56)iOS 8.1 32-bit running on Apple A7 (ARMv8) with PAA (clang Compiler Version 600.0.56)Android 5.0 32-bit running on Qualcomm APQ8084 (ARMv7) without PAA (gcc Compiler Version 4.9)Android 5.0 32-bit running on Qualcomm APQ8084 (ARMv7) with PAA (gcc Compiler Version 4.9)Android 5.0 64-bit running on SAMSUNG Exynos7420 (ARMv8) without PAA and Crypto Extensions (gcc Compiler Version 4.9)Android 5.0 64-bit running on SAMSUNG Exynos7420 (ARMv8) with PAA and Crypto Extensions (gcc Compiler Version 4.9) Android 4.4 (ARMv7 with Houdini) running under VMware ESXI 6 on Dell PowerEdge R430 (x86) (gcc Compiler Version 4.8.5)Android 4.4 running under VMware ESXI 6 on Dell PowerEdge R430 (x86) (gcc Compiler Version 4.8.5) (single-user mode)

-FIPS Approved algorithms: AES (Certs. #1884, #2116, #2234, #2342, #2394, #2484, #2824, #2929, #3090, #3264 and #4154); CVL (Certs. #10, #12, #24, #36, #49, #53, #71, #85, #260, #331, #372, #472 and #958); DRBG (Certs. #157, #229, #264, #292, #316, #342, #485, #540, #607, #723 and #1262); DSA (Certs. #589, #661, #693, #734, #748, #764, #853, #870, #896, #933 and #1128); ECDSA (Certs. #264, #270, #315, #347, #378, #383, #394, #413, #496, #528, #558, #620 and #956); HMAC (Certs. #1126, #1288, #1363, #1451, #1485, #1526, #1768, #1856, #1937, #2063 and #2722); RSA (Certs. #960, #1086, #1145, #1205, #1237, #1273, #1477, #1535, #1581, #1664 and #2262); SHS (Certs. #1655, #1840, #1923, #2019, #2056, #2102, #2368, #2465, #2553, #2702 and #3419); Triple-DES (Certs. #1223, #1346, #1398, #1465, #1492, #1522, #1695, #1742, #1780, #1853 and #2270)

-Other algorithms: EC Diffie-Hellman; PRNG; RSA (encrypt/decrypt)
Multi-Chip Stand Alone

"Re-brand of OpenSSL Version 2.0.10 running in Hypori Virtual Device"
2816Microwave Networks Inc.
4000 Greenbriar Dr., #100A
Stafford, TX 77477
USA

Ben Lee
TEL: 281-263-6569
FAX: 281-263-6400

Angelos Liveris
TEL: 281-263-6701
FAX: n/a

CST Lab: NVLAP 100432-0
Proteus MX Licensed Band Radio Cryptographic Module
(Hardware Versions: P/Ns 8209361-10 Rev A03 [1], 8209361-12 Rev A03 [1], 8209361-14 Rev A03 [1], 8209363-10 Rev A03 [2], 8209363-12 Rev A03 [2] and 8209363-14 Rev A03 [2]; Firmware Version: 8746006-02 Rev A02 [1] or 8746007-02 Rev A02 [2])
(When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/12/20171/11/2022Overall Level: 2

-Cryptographic Module Specification: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #4080, 4081 and #4082); CVL (Cert. #900); DSA (Cert. #1107); HMAC (Cert. #2664); SHS (Cert. #3360)

-Other algorithms: HMAC-SHA-1-96 (HMAC Cert. #2664); DES; Diffie-Hellman; HMAC (non-compliant); HMAC-MD5; MD5; PRNG; RC4; SHS (non-compliant); Triple-DES (non-compliant)
Multi-Chip Embedded

"The module is a cryptographic device enclosed in a plug-in chassis that provides mux/demux and mod/dmod functions along with optional payload encryption for a line of license band point-to-point radios."
2815CTERA Networks Ltd.
CTERA Networks NA HQ
205 E. 42nd Street
New York, NY 10017
USA

Aron Brand

Zohar Kaufman

CST Lab: NVLAP 201029-0
CTERA Crypto Module
(Software Version: 2.1)
(When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. This validation entry is a non-security relevant modification to Cert. #2038.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Software01/12/2017
01/17/2017
1/16/2022Overall Level: 1

-Physical Security: N/A
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): Tested as meeting Level 1 with Windows Server 2008 R2 on a Dell OptiPlex 755, CentOS 6.3 on a Dell OptiPlex 755 (single-user mode)

-FIPS Approved algorithms: AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420)

-Other algorithms: EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Dual EC DRBG; RNG
Multi-Chip Stand Alone

"CTERA Crypto Module™ (Server) is a secure cryptographic engine used by CTERA Enterprise File Services Platform. The platform enables organizations to securely sync, serve and protect data on any private or public cloud infrastructure."
2814Utimaco IS GmbH
Germanusstr. 4
52080 Aachen
Germany

Dr. Gesa Ott
TEL: +49 241-1696-245
FAX: +49 241-1696-199

CST Lab: NVLAP 200983-0
CryptoServer Se-Series Gen2
(Hardware Versions: 5.01.2.0 and 5.01.4.0; Firmware Version: 5.0.10.1)
(When operated in FIPS mode)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy

Vendor Product Link
Hardware01/11/2017
01/25/2017
1/24/2022Overall Level: 3

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #4028); CVL (Certs. #855 and #856); DRBG (Cert. #1202); DSA (Cert. #1091); ECDSA (Certs. #897 and #898); HMAC (Cert. #2628); KBKDF (Cert. #97); RSA (Certs. #2066 and #2067); SHS (Cert. #3321, #3322, and #3323); Triple-DES (Cert. #2205); Triple-DES MAC (Triple-DES Cert. #2205, Vendor Affirmed)

-Other algorithms: AES (Cert. #4028, key wrapping; key establishment method provides between 128 and 256 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength); Triple-DES (Cert. #2205, key wrapping; key establishment methodology provides 112 bits of encryption strength); AES MAC (Cert. #4028; non-compliant); DES; ECIES; KDF per PKCS #11 (non-compliant); MD5; MDC-2; RIPEMD-160; RSA (non-compliant); Triple-DES ANSI Retail MAC
Multi-Chip Embedded

"The CryptoServer Se-Series Gen2 Version 5.01.2.0 and 5.01.4.0 is an encapsulated protected security module which is realized as a multi-chip embedded cryptographic module as defined in FIPS 140-2. It's realization meets the overall FIPS 140-2 Level 3 requirements. The primary purpose of this module is to provide secure cryptographic services such as encryption or decryption, hashing, signing and verification of data, random number generation, on-board secure key generation, key storage and further key management functions in a tamper-protected environment."
2813Gemalto SA
Avenue du Jujubier, Z.I Athelia IV
La Ciotat 13705
France

Carlos ROMERO-LICERAS
TEL: +33 442365666
FAX: +33 442365545

Frederic GARNIER
TEL: +33 442364368
FAX: +33 442366953

CST Lab: NVLAP 100432-0
TOPDLv2.1 Platform
(Hardware Version: NXP P60D144P VA (MPH149); Firmware Versions: TOPDLV2.1 (Filter04), Demonstration Applet version V1.3)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/11/20171/10/2022Overall Level: 3

-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Cert. #3543); CVL (Certs. #597, #815 and #834); DRBG (Cert. #900); ECDSA (Cert. #721); KBKDF (Cert. #85); KTS (AES Cert, #3543; key establishment methodology provides between 128 and 256 bits of encryption strength); KTS (Triple-DES Cert. #1984; key establishment methodology provides 112 bits of encryption strength); RSA (Certs. #1822 and #1823); SHS (Cert. #2921); Triple-DES (Cert. #1984); Triple-DES MAC (Triple-DES Cert. #1984, vendor affirmed)

-Other algorithms: NDRNG
Single Chip

"TOPDLv2.1 is a part of Gemalto's TOPDL family of Java Cards and offers a comprehensive array of features and options for logical and physical access control applications. TOPDLv2.1 is a highly secure platform for private and public sector smart card deployments implementing Java Card 2.2.2 and Global Platform 2.1.1/2.2 Amdt D specifications with both contact and contactless interfaces. TOPDLv2.1 is ideally suited for markets such as Identity or Security/Access, including one-time password authentication, Public Key Infrastructure (PKI) services, digital transactions and physical access control"
2812Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
USA

Diana Robinson
TEL: 845-454-6397

Ian Hall
TEL: 703-598-6876

CST Lab: NVLAP 200928-0
SSL Visibility Appliance
(Hardware Versions: SV1800-C [1], SV1800B-C [2], SV1800-F [3], SV1800B-F [4], SV2800 [5] and SV2800B [6]; 090-03061 [1], 080-03560 [1], 080-03676 [1], 090-03547 [2], 080-03779 [2], 080-03784 [2], 090-03062 [3], 080-03561 [3], 080-03677 [3], 090-03548 [4], 080-03780 [4], 080-03785 [4], 090-03063 [5], 080-03562 [5], 080-03678 [5], 090-03549 [6], 080-03781 [6], 080-03786 [6] with FIPS Kit: FIPS-LABELS-SV; Firmware Versions: 3.8.2F build 227, 3.8.4FC, 3.10 build 40)
(When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/11/20171/10/2022Overall Level: 2

-Design Assurance: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #3195, #3496 and #4106); CVL (Certs. #429, #562 and #919); DRBG (Certs. #669, #866 and #1233); ECDSA (Certs. #584, #711 and #931); HMAC (Certs. #2013, #2230 and #2682); PBKDF (vendor affirmed); RSA (Certs. #1238, #1625, #1794 and #2222); SHS (Certs. #2052, #2642, #2885 and #3378); Triple-DES (Certs. #1821, #1968 and #2244)

-Other algorithms: Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Camelia; ChaCha20-Poly1305; DES; HMAC-MD5; MD5; RC4
Multi-Chip Stand Alone

"The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to "inspect" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic."
2811Samsung Electronics Co., Ltd.
275-18, Samsung 1-ro
Hwaseong-si, Gyeonggi-do 445-330
Korea

Jisoo Kim
TEL: 82-31-3096-2832
FAX: 82-31-8000-8000(+62832)

CST Lab: NVLAP 200802-0
Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series
(Hardware Versions: MZILS7T6HMLS-000H9 and MZILS15THMLS-000H9; Firmware Version: 3P00)
(When installed, initialized and configured as specified in the Security Rules Section of the Security Policy.)

Validated to FIPS 140-2
Consolidated Validation Certificate

Security Policy
Hardware01/05/20171/4/2022Overall Level: 2

-EMI/EMC: Level 3
-Mitigation of Other Attacks: N/A
-Tested Configuration(s): N/A

-FIPS Approved algorithms: AES (Certs. #617 and #3213); DRBG (Cert. #121); ECDSA (Cert. #932); SHS (Cert. #3382)

-Other algorithms: NDRNG
Multi-Chip Stand Alone

"Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series are a high-performance Self-Encrypting SSDs supporting SAS 12G Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and CTR_DRBG for key generation."