Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Component Validation List

This list identifies implementations that have been validated as conforming to individual components of FIPS approved and NIST recommended cryptographic algorithms, as specified in the associated publications, using tests described in the associated validation system (VS) documents.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of modulus and curve sizes providing less than 112 bits of security strength (modulus size 1024 and curve sizes P-192, K-163, and B-163), and the use of SHA-1 with Digital Signature Generation, is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
2079Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
312 Kings Way
South Melbourne, Victoria 3025
Australia

John Weston
john.weston@senetas.com
+61 3 9868 4555
Fax: +61 3 9821 4899

CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library

5.0.1 (Firmware)


The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services.

    • ARM Cortex A9
9/14/2018
  • SNMP:
  • SSH:
    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4560
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384
    • Prerequisite: SHS #4560, HMAC #3789
2078Berryville Holdings, LLC
2465 Centerville Road
#J17-812
Herndon, VA 20171
USA

Cael Jacobs
cael@bvhllc.com
(703) 782-9840

Chava Jurado
chava@bvhllc.com
(703) 782-9840

Cryptographic Module for Fognigma

2.0.16


The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)

    • ARM Cortex-A53 without PAA w/ Raspbian Stretch
    • Intel® Xeon E5 without PAA w/ Ubuntu 16.04
    • ARM Cortex-A53 with PAA w/ Raspbian Stretch
    • Intel® Xeon E5 with PAA w/ Ubuntu 16.04
9/14/2018
  • ECC CDH:
    • Primitive
    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
2077Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 NSS without AES-NI

R7-2.0.0


Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
9/14/2018
  • TLS:
    • Supports TLS 1.0/1.1
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4535, HMAC #3767
2076Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

6.2 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Cavium Octeon CN7240
9/14/2018
  • IKEv2:
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-1
    • Prerequisite: SHS #4555, HMAC #3784
  • SNMP:
  • SRTP:
    • AES Key Lengths: 128, 192, 256 (bits)
    • Prerequisite: AES #5683
  • SSH:
    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4555
  • TLS:
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4555, HMAC #3784
2075Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

6.2 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Cavium Octeon CN7240
9/14/2018
  • ECC CDH:
    • Primitive
    • Curves: P-256, P-384, P-521
  • KAS FFC:
    • Functions: Key Pair Generation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
2074Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

    • N/A
9/14/2018
  • IKEv2:
    • Derived Keying Material length: 1056-3072
    • Diffie-Hellman shared secrets:
      • Diffie-Hellman shared secret:
        • Length: 2048 (bits)
        • SHA Functions: SHA-1
    • Prerequisite: SHS #4554, HMAC #3783
  • SNMP:
  • SRTP:
    • AES Key Lengths: 128, 192, 256 (bits)
    • Prerequisite: AES #5682
  • SSH:
    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4554
  • TLS:
    • Supports TLS 1.2:
      • SHA Functions: SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4554, HMAC #3783
2073Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

    • N/A
9/14/2018
  • ECC CDH:
    • Primitive
    • Curves: P-256, P-384, P-521
  • KAS FFC:
    • Functions: Key Pair Generation
    • Schemes:
      • dhEphem:
        • Key Agreement Roles: Initiator, Responder
        • Parameter Sets:
          • FC:
            • SHA: SHA-256
    • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
2072Sonus Networks, Inc.
4 Technology Park Drive
Westford, MA 01886
USA

Adam Elshama
aelshama@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Keith Conger
KConger@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Sonus TLS KDF Library

3.1 (Firmware)


Sonus Session Border Controller FIPS-validated TLS implementation

    • Intel Xeon (Ivy Bridge)
9/14/2018
  • TLS:
    • Supports TLS 1.2:
      • SHA Functions: SHA-256
    • Prerequisite: HMAC #3780
2071Sonus Networks, Inc.
4 Technology Park Drive
Westford, MA 01886
USA

Adam Elshama
aelshama@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Keith Conger
KConger@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Sonus SSH KDF Library

3.1 (Firmware)


Sonus Session Border Controller FIPS-validated SSH KDF implementation.

    • Intel Xeon (Ivy Bridge)
9/14/2018
  • SSH:
    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4550
2070Sonus Networks, Inc.
4 Technology Park Drive
Westford, MA 01886
USA

Adam Elshama
aelshama@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Keith Conger
KConger@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Sonus SNMP KDF Library

3.1 (Firmware)


Sonus Session Border Controller FIPS-validated SNMP KDF implementation.

    • Intel Xeon (Ivy Bridge)
9/14/2018
  • SNMP:
2069
9/14/2018
    2067Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    Web Isolation SSH Library

    1.0


    The Web Isolation SSH Library provides the necessary SSH key derivation functionality for use in the Web Isolation Virtual Appliance.

      • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
    9/14/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4551
    2066Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    Web Isolation Cryptographic Library

    1.0


    The Web Isolation Cryptographic Library provides the necessary cryptographic services specifically for use in the Web Isolation Virtual Appliance.

      • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
    9/14/2018
    • TLS:
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4551, HMAC #3781
    2065Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    Web Isolation Cryptographic Library

    1.0


    The Web Isolation Cryptographic Library provides the necessary cryptographic services specifically for use in the Web Isolation Virtual Appliance.

      • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
    9/14/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4551, DRBG #2296
    • KAS FFC:
      • Functions: Full Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4551, DRBG #2296
    2064Sonus Networks, Inc.
    4 Technology Park Drive
    Westford, MA 01886
    USA

    Adam Elshama
    aelshama@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Keith Conger
    KConger@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Sonus Cryptographic Library

    3.1 (Firmware)


    Sonus Session Border Controller FIPS-validated cryptographic software module

      • Intel Xeon (Ivy Bridge)
    9/14/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2063Sonus Networks, Inc.
    4 Technology Park Drive
    Westford, MA 01886
    USA

    Adam Elshama
    aelshama@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Keith Conger
    KConger@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Sonus Cryptographic Media Processor

    3.1 (Firmware)


    Sonus Session Border Controller FIPS-validated cryptographic media module

      • Cavium OCTEON II CN6800
    9/14/2018
    • SRTP:
      • AES Key Lengths: 128 (bits)
      • Prerequisite: AES #5676
    2062Allegro Software Development Corporation
    1740 Massachusetts Avenue
    Boxborough, MA 01719
    USA

    Bob Van Andel
    bva@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Loren Shade
    loren@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Allegro Cryptographic Engine using the EYL QRNG

    6.31


    The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

      • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
    9/7/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4478, HMAC #3715
    2061Allegro Software Development Corporation
    1740 Massachusetts Avenue
    Boxborough, MA 01719
    USA

    Bob Van Andel
    bva@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Loren Shade
    loren@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Allegro Cryptographic Engine

    6.31


    The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

      • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
    9/7/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4477, HMAC #3714
    2060Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon E5-2609
    9/7/2018
    • IKEv2:
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1
      • Prerequisite: SHS #4546, HMAC #3777
    • SNMP:
    • SRTP:
      • AES Key Lengths: 128, 192, 256 (bits)
      • Prerequisite: AES #5675
    • SSH:
      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4546
    • TLS:
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4546, HMAC #3777
    2059Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon E5-2609
    9/7/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
    2058Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon E5-2680
    9/7/2018
    • IKEv2:
      • Derived Keying Material length: 1056-3072
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1
      • Prerequisite: SHS #4545, HMAC #3776
    • SNMP:
    • SRTP:
      • AES Key Lengths: 128, 192, 256 (bits)
      • Prerequisite: AES #5674
    • SSH:
      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4545
    • TLS:
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4545, HMAC #3776
    2057Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon E5-2680
    9/7/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
    2056NETSCOUT Systems, Inc.
    310 Littleton Road
    Westford, MA 01886
    USA

    Steve Swidrak
    Stephen.Swidrak@netscout.com

    NetScout FIPS Object Module

    1.0


    This cryptographic library provides cryptographic services to NETSCOUT products.

      • Intel Xeon X5620 with AES-NI w/ Linux 2.6.39.1
      • Intel Xeon E5 Series with AES-NI w/ Linux 3.7.5
      • Intel Xeon E5-2608L v3 with AES-NI w/ ArbOS 7.0
      • Intel Xeon E5-2697 v3 with AES-NI w/ Linux 3.10
    9/4/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-224
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4543, ECDSA #1535, DRBG #2291
    2055Klas Telecom
    1101 30th Street NW, Suite 500
    Washington, DC 20007
    USA

    Toby Stidham
    toby.stidham@klastelecom.com
    352-406-0560

    Cian Masterson
    cian.masterson@klastelecom.com

    OpenSSL 1.0.1h without a FIPS object module

    1.0.1h


    Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

      • Marvell Prestera 98DX8212 w/ Linux 3.10.70
    9/4/2018
    • RSADP:
      • Modulus Size: 2048 (bits)
    2054Klas Telecom
    1101 30th Street NW, Suite 500
    Washington, DC 20007
    USA

    Toby Stidham
    toby.stidham@klastelecom.com
    352-406-0560

    Cian Masterson
    cian.masterson@klastelecom.com

    OpenSSL 1.0.1h without a FIPS object module

    1.0.1h


    Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

      • Marvell Prestera 98DX8212 w/ Linux 3.10.70
    9/4/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4542
    2053Klas Telecom
    1101 30th Street NW, Suite 500
    Washington, DC 20007
    USA

    Toby Stidham
    toby.stidham@klastelecom.com
    352-406-0560

    Cian Masterson
    cian.masterson@klastelecom.com

    OpenSSL 1.0.1h without a FIPS object module

    1.0.1h


    Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

      • Marvell Prestera 98DX8212 w/ Linux 3.10.70
    9/4/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384
    • KAS ECC:
      • Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4542, ECDSA #1534, DRBG #2290
    2052SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    844-436-2797

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Windows Server 2012 R2
      • Intel i7 w/ Red Hat Enterprise Linux 7
    9/4/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
      • Prerequisite: SHS #4531, ECDSA #1524, DRBG #2281
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4531, DSA #1450, DRBG #2281
    2051KeyPair Consulting Inc.
    846 Higuera Street
    Suite 2
    San Luis Obispo, CA 93401
    USA

    Mark Minnoch
    mark@keypair.us
    805-316-5024

    Steve Weymann
    steve@keypair.us
    805-316-5024

    KeyPair Cryptographic Module for OpenSSL

    2.0.16


    The KeyPair Cryptographic Module for OpenSSL expands the list of Tested Configurations (operating system + processor) for the OpenSSL FIPS Object Module v2.0. Please contact KeyPair Consulting to include your desired operating system as a Tested Configuration on a FIPS 140-2 certificate branded in your company's name.

      • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 6
      • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 7
      • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 7
      • Nvidia Tegra X1 with PAA w/ Android 8.1
      • Nvidia Tegra X1 without PAA w/ Android 8.1
      • Intel Xeon E5-2430L (x86) with PAA w/ Ubuntu 16.04
      • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 6
      • Intel Xeon E5-2430L (x86) without PAA w/ Ubuntu 16.04
    9/4/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2050Extreme Networks
    6480 Via Del Oro
    San Jose, CA 95119
    USA

    Sunil Chitnis
    schitnis@extremenetworks.com
    408-352-2407

    Joey Salanga
    jsalanga@extremenetworks.com
    408-352-2439

    Extreme FIPS Cryptographic Library

    2.1 (Firmware)


    The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

      • Freescale E500mc
    9/4/2018
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4540
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4540, HMAC #3771
    2049Extreme Networks
    6480 Via Del Oro
    San Jose, CA 95119
    USA

    Sunil Chitnis
    schitnis@extremenetworks.com
    408-352-2407

    Joey Salanga
    jsalanga@extremenetworks.com
    408-352-2439

    Extreme FIPS Cryptographic Library

    2.1 (Firmware)


    The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

      • Freescale E500mc
    9/4/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    2048Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Kevin Meagher
    kmeagher@ciena.com
    1-410-865-8936

    OpenSSL FIPS Object Module

    2.0.12


    Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

      • Cavium OCTEON II CN6xxx w/ SAOS 6.17
    8/27/2018
    • KAS ECC:
      • Functions: Domain Parameter Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4539, ECDSA #1531, DRBG #2287
    2047Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    securitycertifications@gemalto.com

    SafeNet Accelerated Cryptographic Library

    1.0 (Firmware)


    The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

      • Andretta 2.0
    8/27/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4533, DRBG #2283
    2046Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 NSS without AES-NI

    R7-2.0.0


    Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    8/27/2018
    • KAS ECC:
      • Functions: Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4535, ECDSA #1528, DRBG #2284
    • KAS FFC:
      • Functions: Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4535, DSA #1454, DRBG #2284
    2045IBM Corporation
    1701 North Street
    Endicott, NY 13760
    USA

    AIX FIPS Security
    aixfips@in.ibm.com

    AIX FIPS Crypto Module for OpenSSL

    2.0.16


    The AIX FIPS Crypto Module for OpenSSL is supported on AIX for the Power 7, Power 8 and Power 9 platforms.

      • IBM Power9 (PPC) without PAA w/ AIX 7.2 64-bit
      • IBM Power9 (PPC) with PAA w/ AIX 7.2 32-bit
      • IBM Power9 (PPC) with PAA w/ AIX 7.2 64-bit
      • IBM Power9 (PPC) without PAA w/ AIX 7.2 32-bit
    8/17/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2044Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    securitycertifications@gemalto.com

    SafeNet Cryptographic Library

    1.0 (Firmware)


    The SafeNet Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

      • Andretta 2.0
    8/17/2018
    • RSADP:
      • Modulus Size: 2048 (bits)
    2043Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    securitycertifications@gemalto.com

    SafeNet Accelerated Cryptographic Library

    1.0 (Firmware)


    The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

      • Andretta 2.0
    8/17/2018
    • RSADP:
      • Modulus Size: 2048 (bits)
    2042ECI Telecom Ltd
    30 Hasivim Street
    Petach Tikvah 49517
    Israel

    Milind Barve
    milind.barve@ecitele.com
    +91-80-67122000
    Fax: +91-80-67122001

    ECI (OS) Crypto Library

    2.0.16


    ECI (OS) Crypto Library

      • PowerPC w/ Linux
    8/17/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2041Cambium Networks
    3800 Golf Road
    Suite 360
    Rolling Meadows, IL 60008
    USA

    Mark Thomas
    mark.thomas@cambiumnetworks.com
    +44 1364 655500
    Fax: +44 1364 654625

    Nithin Kotekar
    nithin.kotekar@cambiumnetworks.com
    +91 080 67333162

    PTP700-Net-SNMP

    01.00 (Firmware)


    SNMP Key Derivation is used to derive the shared secret key for SNMP agent.

      • TI TMS320C6657 - Multicore Fixed and Floating-Point DSP
    8/17/2018
    • SNMP:
    2040Cambium Networks
    3800 Golf Road
    Suite 360
    Rolling Meadows, IL 60008
    USA

    Mark Thomas
    mark.thomas@cambiumnetworks.com
    +44 1364 655500
    Fax: +44 1364 654625

    Nithin Kotekar
    nithin.kotekar@cambiumnetworks.com
    +91 080 67333162

    PTP700-MatrixSSL

    01.00 (Firmware)


    MatrixSSL v3.8.1a third party TLS library supports variety of cryptographic algorithm implementations to provide confidentiality, integrity, authentication and data transport security services.

      • TI TMS320C6657 - Multicore Fixed and Floating-Point DSP
    8/17/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4528, HMAC #3761
    2039Blue Cedar
    325 Pacific Avenue
    San Francisco, CA 94111
    USA

    FIPS Admin
    fips@bluecedar.com
    415-329-0401

    Blue Cedar Cryptographic Module

    2.0.16


    The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Nvidia Tegra X1 with PAA w/ Android 8.1
      • Nvidia Tegra X1 without PAA w/ Android 8.1
      • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
      • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
    8/10/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2038Q Core Medical Ltd.
    29 Yad Harutsim St.
    Netanya 4250529
    Israel

    Nimrod Schweitzer
    nimrod.schweitzer@qcore.com
    +972-73-2388839
    Fax: +972-73-2388800

    Lee Aydelotte
    laydelotte@silexamerica.com
    801-676-8673
    Fax: 714-258-0730

    QCore OpenSSL FIPS Object Module 2.0.9

    2.0.9


    QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

      • NXP i.MX280 ARM w/ Linux 2.6.35
    8/10/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2037Sony Imaging Products & Solutions Inc.
    1-7-1 Konan
    Minato-ku, Tokyo 108-0075
    JAPAN

    Toshiaki Ouchi
    sips-pssg-b2b-fipsinfo@sony.com
    +81 50 3140 9893

    Hirokazu Morishita
    sips-pssg-b2b-fipsinfo@sony.com
    +81 50 3140 1739

    Sony IMB TLSKDF Core-SH

    1.0.0 (Firmware)


    Sony IMB TLSKDF Core-SH is the firmware module for digital cinema system.

      • Renesas Electronics Corporation SH7724
    8/10/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Prerequisite: SHS #4522, HMAC #3756
    2035Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    66005f41fbc3529ffe8d007708756720529da20d


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • POWER9 without PAA w/ Ubuntu Linux 18.04
      • POWER9 with PAA w/ Ubuntu Linux 18.04
      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
    8/2/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4509, HMAC #3743
    2034Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    66005f41fbc3529ffe8d007708756720529da20d


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      • POWER9 with PAA w/ Ubuntu Linux 18.04
      • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
      • POWER9 without PAA w/ Ubuntu Linux 18.04
    8/2/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2253
    2033Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    66005f41fbc3529ffe8d007708756720529da20d


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • POWER9 with PAA w/ Ubuntu Linux 18.04
      • POWER9 without PAA w/ Ubuntu Linux 18.04
      • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
    8/2/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-224
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4509, ECDSA #1520, DRBG #2253
    2032Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    libreswan (KDF 800-135) - generic CPU

    6.0


    KDF for Intel x86_64 bit for the IKE protocol

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    8/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 256-512
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4498, HMAC #3734
    • IKEv2:
      • Derived Keying Material length: 1056-3072
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4498, HMAC #3734
    2031Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 XLP-MX104

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Broadcom XLP432
    8/2/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4503, DRBG #2248
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4503, DRBG #2248
    2030Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 QuickSec-MX104

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Freescale P5021
    8/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-2040
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384
        • Diffie-Hellman shared secret:
          • Length: 384 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4503, HMAC #3739
    • IKEv2:
      • Derived Keying Material length: 960-1792
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384
        • Diffie-Hellman shared secret:
          • Length: 384 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4503, HMAC #3739
    2029Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 OpenSSL-MX104

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Freescale P5021
    8/2/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #402
    2028Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 OpenSSL-MX104

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Freescale P5021
    8/2/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4502, ECDSA #1516, DRBG #2248
    2027Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4499, HMAC #3735
    2026Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4499, ECDSA #1515, DRBG #2246
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4499, DSA #1442, DRBG #2026
    2025Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4498, HMAC #3734
    2024Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4498, ECDSA #1514, DRBG #2245
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4498, DSA #1441, DRBG #2245
    2023Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    3218c1db82718a54e4d41de493d006eaa3ba445c


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4496, HMAC #3733
    2022Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    3218c1db82718a54e4d41de493d006eaa3ba445c


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
    7/27/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2244
    2021Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    3218c1db82718a54e4d41de493d006eaa3ba445c


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • POWER9 with PAA w/ Ubuntu Linux 18.04
      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
      • POWER9 without PAA w/ Ubuntu Linux 18.04
    7/27/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-224
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4496, ECDSA #1512, DRBG #2244
    2020Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4491, HMAC #3728
    2019Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4491, ECDSA #1511, DRBG #2236
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4491, DSA #1440, DRBG #2236
    2018Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4490, HMAC #3727
    2017Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4490, ECDSA #1510, DRBG #2235
    2016Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4489, HMAC #3726
    2015Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4489, ECDSA #1509, DRBG #2234
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4489, DSA #1438, DRBG #2234
    2014Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSH Server/Client - generic CPU

    6.0


    SP 800-135 KDF for Intel x86 64-bit

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4193
    2013Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4488, HMAC #3725
    2011Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4487, HMAC #3724
    2010Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4487, ECDSA #1507, DRBG #2232
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4487, DSA #1436, DRBG #2232
    2009Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4484, HMAC #3721
    2008Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4483, HMAC #3720
    2007Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4480, HMAC #3717
    2006Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • KAS ECC:
      • Functions: Full Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4480, ECDSA #1506, DRBG #2225
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4480, DSA #1435, DRBG #2225
    2005Allegro Software Development Corporation
    1740 Massachusetts Avenue
    Boxborough, MA 01719
    USA

    Bob Van Andel
    bva@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Loren Shade
    loren@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Allegro Cryptographic Engine using the EYL QRNG

    6.31


    The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

      • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
    7/27/2018
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-256
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-512
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4478, ECDSA #1505, DRBG #2224
    2004Allegro Software Development Corporation
    1740 Massachusetts Avenue
    Boxborough, MA 01719
    USA

    Bob Van Andel
    bva@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Loren Shade
    loren@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Allegro Cryptographic Engine

    6.31


    The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

      • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
    7/27/2018
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-256
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-512
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4477, ECDSA #1504, DRBG #2223
    2003Entrust Datacard Corporation
    Two Lincoln Centre
    5420 LBJ Freeway Suite 300
    Dallas, TX 75240
    USA

    John Gray
    John.Gray@entrustdatacard.com

    John Mahoney
    John.Mahoney@entrustdatacard.com

    Entrust Authority™ Security Toolkit for the Java® Platform RSA 1.0

    1.0


    The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

      • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
    7/20/2018
    • RSADP:
      • Modulus Size: 2048 (bits)
    2002Entrust Datacard Corporation
    Two Lincoln Centre
    5420 LBJ Freeway Suite 300
    Dallas, TX 75240
    USA

    John Gray
    John.Gray@entrustdatacard.com

    John Mahoney
    John.Mahoney@entrustdatacard.com

    Entrust Authority™ Security Toolkit for the Java® Platform RSA 1.0

    1.0


    The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

      • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
    7/20/2018
    • RSASP1:
      • Modulus Size: 2048 (bits)
      • Padding Algorithms: PKCS 1.5
    2001Entrust Datacard Corporation
    Two Lincoln Centre
    5420 LBJ Freeway Suite 300
    Dallas, TX 75240
    USA

    John Gray
    John.Gray@entrustdatacard.com

    John Mahoney
    John.Mahoney@entrustdatacard.com

    Entrust Authority™ Security Toolkit for the Java® Platform KDF 1.0

    1.0


    The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

      • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
    7/20/2018
    • ANS 9.63:
      • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4475
    2000Entrust Datacard Corporation
    Two Lincoln Centre
    5420 LBJ Freeway Suite 300
    Dallas, TX 75240
    USA

    John Gray
    John.Gray@entrustdatacard.com

    John Mahoney
    John.Mahoney@entrustdatacard.com

    Entrust Authority™ Security Toolkit for the Java® Platform EC 1.0

    1.0


    The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

      • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
    7/20/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    • KAS ECC:
      • Functions: Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-224
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4475, ECDSA #1502
    1999HP Inc.
    11311 Chinden Blvd
    Boise, Idaho 83714-0021
    USA

    Gerardo Colunga
    gerardo.del.colunga@hp.com
    208-333-5607

    Chris Gunning
    chris.gunning@hp.com
    208-333-6785

    HP FutureSmart QuickSec

    5.1 (Firmware)


    HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

      • Arm Cortex-A8
    7/20/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4474, ECDSA #1501, DRBG #2220
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-256
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4474, DSA #1432, DRBG #2220
    1998Nutanix
    1740 Technology Drive, Suite 150
    San Jose, CA 95110
    USA

    Eric Hammersley
    fips@nutanix.com

    Ashutosh Pangasa
    fips@nutanix.com

    Nutanix Cryptographic Library for OpenSSH

    1.0


    The Nutanix Cryptographic Library for OpenSSH provides the KDF for SSH.

      • Intel E5-2620 w/PAA w/ CentOS 7.4
    7/20/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4465
    1997Nutanix
    1740 Technology Drive, Suite 150
    San Jose, CA 95110
    USA

    Eric Hammersley
    fips@nutanix.com

    Ashutosh Pangasa
    fips@nutanix.com

    Nutanix Cryptographic Library for OpenSSL

    1.0


    The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

      • Intel E5-2620 w/PAA w/ CentOS 7.4
    7/20/2018
    • RSADP:
      • Modulus Size: 2048 (bits)
    1996Nutanix
    1740 Technology Drive, Suite 150
    San Jose, CA 95110
    USA

    Eric Hammersley
    fips@nutanix.com

    Ashutosh Pangasa
    fips@nutanix.com

    Nutanix Cryptographic Library for OpenSSL

    1.0


    The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

      • Intel E5-2620 w/PAA w/ CentOS 7.4
    7/20/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4465, HMAC #3708
    1995Nutanix
    1740 Technology Drive, Suite 150
    San Jose, CA 95110
    USA

    Eric Hammersley
    fips@nutanix.com

    Ashutosh Pangasa
    fips@nutanix.com

    Nutanix Cryptographic Library for OpenSSL

    1.0


    The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

      • Intel E5-2620 w/PAA w/ CentOS 7.4
    7/20/2018
    • ECDSA SigGen:
      • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2216
    1994Nutanix
    1740 Technology Drive, Suite 150
    San Jose, CA 95110
    USA

    Eric Hammersley
    fips@nutanix.com

    Ashutosh Pangasa
    fips@nutanix.com

    Nutanix Cryptographic Library for OpenSSL

    1.0


    The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

      • Intel E5-2620 w/PAA w/ CentOS 7.4
    7/20/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4465, ECDSA #1499, DRBG #2216
    • KAS FFC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4465, DSA #1429, DRBG #2216
    1993Elster GmbH
    Strothweg 1
    Lotte (Buren) 49504
    Germany

    Michael Habermann
    michael.habermann@honeywell.com
    +49-541-1214-215
    Fax: +49-541-1214-595

    Markus Bölter
    markus.boelter@honeywell.com
    +49-541-1214-114
    Fax: +49-541-1214-595

    elster_cv

    02.02.01 (Firmware)


    elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

      • STM32L152RE
    7/20/2018
    • ECDSA SigGen:
      • P-256 SHA: SHA-256
      • Prerequisite: DRBG #2210
    1992Elster GmbH
    Strothweg 1
    Lotte (Buren) 49504
    Germany

    Michael Habermann
    michael.habermann@honeywell.com
    +49-541-1214-215
    Fax: +49-541-1214-595

    Markus Bölter
    markus.boelter@honeywell.com
    +49-541-1214-114
    Fax: +49-541-1214-595

    elster_cv

    02.02.01 (Firmware)


    elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

      • STM32L152RE
    7/20/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256
    1991Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Bhanu Parlapalli
    bhanu.parlapalli@gigamon.com

    Gigamon Linux-Based Cryptographic Module

    1.0 (Firmware)


    The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

      • Intel Atom C Series
      • P2020
      • P2041
    7/13/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4457, ECDSA #1497, DRBG #2209
    • KAS FFC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4457, DSA #1428, DRBG #2209
    1990International Business Machines
    1702 North Street
    Building 256-3
    Endicott, NY 13760
    USA

    Brian W. Hugenbruch
    bwhugen@us.ibm.com
    607-429-3660

    IBM z/VM System SSL

    V6.4


    z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

      • IBM z13 w/ IBM z/VM V6.4
    7/13/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4456, HMAC #3701
    1989International Business Machines
    1702 North Street
    Building 256-3
    Endicott, NY 13760
    USA

    Brian W. Hugenbruch
    bwhugen@us.ibm.com
    607-429-3660

    IBM z/VM System SSL

    V6.4


    z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

      • IBM z13 w/ IBM z/VM V6.4
    7/13/2018
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
        • dhOneFlow:
          • Key Agreement Roles: Initiator, Responder
        • dhStatic:
          • Key Agreement Roles: Initiator, Responder
      • Prerequisite: SHS #4456, DSA #1427, DRBG #2208
    1988SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    844-436-2797

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
    7/13/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4455, ECDSA #1496, DRBG #2207
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4455, DSA #1426, DRBG #2207
    1987Sierra Nevada Corporation
    444 Salomon Circle
    Sparks, NV 89434
    USA

    Kevin Streander
    Kevin.Streander@sncorp.com
    303-566-9687
    Fax: 775-331-0370

    Red Hat OpenSSL (64bit)

    5.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

      • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
    7/13/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4450, HMAC #3695
    1986Sierra Nevada Corporation
    444 Salomon Circle
    Sparks, NV 89434
    USA

    Kevin Streander
    Kevin.Streander@sncorp.com
    303-566-9687
    Fax: 775-331-0370

    Red Hat OpenSSL (64bit)

    5.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

      • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
    7/13/2018
    • KAS ECC:
      • Functions: Full Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4450, ECDSA #1495, DRBG #2199
    • KAS FFC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4450, DSA #1425, DRBG #2199
    1985Sierra Nevada Corporation
    444 Salomon Circle
    Sparks, NV 89434
    USA

    Kevin Streander
    Kevin.Streander@sncorp.com
    303-566-9687
    Fax: 775-331-0370

    Red Hat NSS Softoken (64bit)

    5.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

      • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
    7/13/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4449, HMAC #3694
    1984Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Chunsheng Xie
    chunsheng.xie@gigamon.com

    Cavium OpenSSL Library

    1.0.2d (Firmware)


    The ECC CDH, ECDSA and TLS KDF cryptographic algorithms provided by Cavium OpenSSL Library provide data security across GigaSmart cards in Gigamon HC2 Appliance.

      • Cavium CN6880
    7/13/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256
      • Prerequisite: SHS #2023, HMAC #1455
    1983Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Chunsheng Xie
    chunsheng.xie@gigamon.com

    Cavium OpenSSL Library

    1.0.2d (Firmware)


    The ECC CDH, ECDSA and TLS KDF cryptographic algorithms provided by Cavium OpenSSL Library provide data security across GigaSmart cards in Gigamon HC2 Appliance.

      • Cavium CN6880
    7/13/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    1982Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    libreswan (KDF 800-135)

    6.0


    KDF for Intel x86_64 bit for the IKE protocol

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 256-512
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4300, HMAC #3546
    • IKEv2:
      • Derived Keying Material length: 1056-3072
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 (bits)
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4300, HMAC #3546
    1981Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Bhanu Parlapalli
    bhanu.parlapalli@gigamon.com

    Gigamon Linux-Based Cryptographic Module

    1.0


    The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

      • P2020 w/ CentOS 5.8
      • P2041 w/ CentOS 5.8
      • Intel Atom C Series w/ CentOS 6.6
    7/13/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-224
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4447, ECDSA #1492, DRBG #2196
    • KAS FFC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
        • MQV1:
        • Prerequisite: SHS #4447, DSA #1423, DRBG #2196
      1980Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Allen Ting
      yting@juniper.net
      408-858-5008

      Mounir Hahad
      mhahad@juniper.net

      CryptoCore

      1.0


      Cryptographic module to support the cryptographic functionalities for Juniper products.

        • Intel Core i5 w/ Ubuntu Linux 14.04
        • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
        • Intel Xeon E5 family w/ Ubuntu Linux 14.04
      7/13/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1979Thales e-security
      900 South Pine Island Road
      Suite 710
      Plantation, Florida 33324
      USA

      Natalya Robert
      natalya.robert@thalesesec.com
      954-888-6268

      Robert Burns
      robert.burns@thalesesec.com
      954-888-6215

      Vormetric Data Security Manager Virtual Appliance Module

      6.0.2


      The Vormetric Data Security Manager Virtual Appliance is a multi-chip standalone software cryptographicmodule operating in virtualization environment. The Vormetric Data Security Manager is the central pointof management for the Vormetric Data Security product. It manages keys and policies, and controls VTE.

        • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5
      7/13/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4443, HMAC #3688
      1978Thales e-security
      900 South Pine Island Road
      Suite 710
      Plantation, Florida 33324
      USA

      Natalya Robert
      natalya.robert@thalesesec.com
      954-888-6268

      Robert Burns
      robert.burns@thalesesec.com
      954-888-6215

      Vormetric Data Security Manager Module

      6.0.2 (Firmware)


      Vormetric Data Security Manager Module is a multi-chip standalone software cryptographicmodule operating in virtualization environment. The Vormetric Data Security Manager is the central pointof management for the Vormetric Data Security product. It manages keys and policies, and controls VTE.

        • Intel Xeon
      7/13/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4442, HMAC #3687
      1977Infosec Global Inc.
      2225 Sheppard Avenue East
      Suite 1402
      Toronto, Ontario M2J 5C2
      Canada

      Brian Neill
      brian.neill@infosecglobal.com
      416-492-3333
      Fax: 647-343-6933

      Ian Laidlaw
      ian.laidlaw@infosecglobal.com
      416-492-3333
      Fax: 647-343-6933

      AgileSec FIPS Provider 1.0

      1.0


      AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
        • Intel Core i5 CPU with AES-NI w/ OSX 10.12
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
        • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
        • Intel Core i5 CPU without AES-NI w/ OSX 10.12
        • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
        • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
        • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
        • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
      7/13/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      1976Accellion, Inc.
      1804 Embarcadero Road
      Suite 200
      Palo Alto, Ca 94303
      USA

      Frank Balonis
      frank.balonis@accellion.com
      650-485-4300

      Sim Han Seah
      hanseah@accellion.com
      +65 6244 5678

      Accellion Cryptographic Module

      2.0.16


      The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Intel Xeon E5 without PAA w/ CentOS 6
        • Intel Xeon E5 with PAA w/ CentOS 6
      7/6/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1975SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply for Java

      3.0.1


      SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
        • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
      7/6/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1974SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply for Java

      3.0.1


      SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
        • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
      7/6/2018
      • ANS 9.63:
        • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4439
      • IKEv2:
        • Derived Keying Material length: 160-8192
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4439, HMAC #3684
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5532
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4439
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4439, HMAC #3684
      1973SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply for Java

      3.0.1


      SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
        • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
      7/6/2018
      • ECDSA SigGen:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4439, DRBG #2190
      1972SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply for Java

      3.0.1


      SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
        • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
      7/6/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1971Virtual Instruments
      2331 Zanker Road
      San Jose, CA 95131
      USA

      Susanta Pattanayak
      Susanta.pattanayak@virtualinstruments.com
      +1 408 579 4000

      Jay Nitikman
      Jay.nitikman@virtualinstruments.com
      +1 408 579 4000

      Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

      v5.7 (Firmware)


      The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

        • Intel Broadwell Xeon without AES-NI
      6/29/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4436, ECDSA #1486, DRBG #2189
      1970Cisco Systems, Inc.
      170 W. Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Adaptive Security Appliance (ASA)

      9.6


      The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

        • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
      6/29/2018
      • IKEv2:
        • Derived Keying Material length: 800-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4435, HMAC #3680
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4435
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4435, HMAC #3680
      1969Harris Corporation
      1680 University Avenue
      Rochester, NY 14610
      USA

      Chris Wood
      cwood06@harris.com
      585-720-8730
      Fax: 585-241-8459

      Esther Betancourt
      ebetanco@harris.com
      585-242-3635
      Fax: 585-241-8459

      Harris Broadband Ethernet Radio GPP Cryptographic Library

      6.0 (Firmware)


      This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products

        • Broadcom XLS108
      6/29/2018
      • SNMP:
      • SSH:
        • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4434
      • TLS:
        • Supports TLS 1.0/1.1
        • Prerequisite: SHS #4434, HMAC #3679
      1968Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone Controller Java Crypto Library

      1.0


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
        • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
      6/29/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1967Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone Controller Java Crypto Library

      1.0


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
        • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
      6/29/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4433
      1966Information Security Corporation
      1011 Lake St. Suite 425
      Oak Park, IL 60118
      USA

      Jonathan Schulze-Hewett
      schulze-hewett@infoseccorp.com
      708-445-1704
      Fax: 708-445-9705

      Michael Markowitz
      markowitz@infoseccorp.com
      708-445-1704
      Fax: 708-445-9705

      ISC Cryptographic Development Kit (CDK)

      8.0


      The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

        • Intel Core i7 with AES-NI w/ Windows Server 2012 R2/64-bit
      6/29/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      1965Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Ingrid Barker
      ibarker@juniper.net

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E312xx Sandy Bridge
      6/29/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4432
      1964Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Ingrid Barker
      ibarker@juniper.net

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E312xx Sandy Bridge
      6/29/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4432, ECDSA #1484, DRBG #2184
      1963Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - OpenSSL

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7020)
      6/29/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4431
      1962Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (3305)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon E5
      6/29/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 112-224
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4424, HMAC #3669
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4424, HMAC #3669
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4424
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4424, HMAC #3669
      1961Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (3305)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon E5
      6/29/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4424, ECDSA #1482, DRBG #2181
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4424, DSA #1415, DRBG #2181
      1960Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (2101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon D
      6/29/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 112-224
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4423, HMAC #3668
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4423, HMAC #3668
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4423
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4423, HMAC #3668
      1959Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (2101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon D
      6/29/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Prerequisite: SHS #4423, ECDSA #1481, DRBG #2180
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4423, DSA #1414, DRBG #2180
      1958Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (1101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Pentium D
      6/29/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 112-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4422, HMAC #3667
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4422, HMAC #3667
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4422
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4422, HMAC #3667
      1957Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW Cryptographic Library Module (1101)

      6.4.1.20056.fips.8 (Firmware)


      Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Pentium D
      6/29/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4422, ECDSA #1480, DRBG #2179
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4422, DSA #1413, DRBG #2179
      1956Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      OpenSSL - EX4300

      Junos OS 17.4 R1-S4 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      6/22/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4421
      1955ST Microelectronics (Protonworld)
      Green Square Building B, Lambroekstraat 5
      Diegem/Machelen B-1831
      Belgium

      Olivier COLLART
      olivier.collart@st.com
      +32 272 450 77
      Fax: +32 272 451 43

      Fabien ARRIVE
      fabien.arrive@st.com
      +33 223 470 633
      Fax: +33 223 470 400

      ST33TPHF2EI2C

      49.09 (Firmware)


      ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications.

        • SecureCore SC300
      6/22/2018
      1954Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - OpenSSL

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4416
      1953Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - OpenSSL

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4416, ECDSA #1477, DRBG #2173
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4416, DRBG #2173
      1952Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 MX: MS MPC-XLP

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Broadcom XLP832
      6/22/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4415, ECDSA #1476, DRBG #2173
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4415, DRBG #2173
      1951Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 RE1800 - Quicksec

      Junos OS 18.1R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/22/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-2040
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4414, HMAC #3655
      • IKEv2:
        • Derived Keying Material length: 960-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4414, HMAC #3655
      1950Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 RE1800-Quicksec

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/15/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4411, HMAC #3652
      • IKEv2:
        • Derived Keying Material length: 960-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4411, HMAC #3652
      1949Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 17.4R1-S1 RE1800-OpenSSL

      Junos OS 17.4 R1-S1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon (Jasper Forest Family)
      6/15/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4409
      1948Silvus Technologies
      10990 Wilshire Blvd.
      STE 1500
      Los Angeles, CA 90024
      USA

      Ajit Warrier
      ajit@silvustechnologies.com
      310-479-3333 ext 41
      Fax: 310-479-2225

      Weijun Zhu
      weijun@silvustechnologies.com
      310-479-3333 ext 27
      Fax: 310-479-2225

      Silvus Crypto Module

      3.15.1 (Firmware)


      The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

        • Xilinx Zynq-7000
      6/15/2018
      • SSH:
        • SHA Functions: SHA-512
        • Prerequisite: SHS #4406
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4406, HMAC #3647
      1947CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security TLS Library for Windows

      1.0


      The CyberArk Privileged Account Security TLS Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libssl library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
      6/15/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4404, HMAC #3645
      1946CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Windows SSH Server Cryptographic Module

      1.0


      The CyberArk Privileged Account Security Windows SSH Server is a general purpose SSH server compiled from the source code of the OpenSSH for Windows application. It is incorporated into the CyberArk Privileged Session Manager.

        • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
      6/15/2018
      • SSH:
        • SHA Functions: SHA-256, SHA-512
        • Prerequisite: SHS #4404
      1945CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Cryptographic Library for Windows

      1.0


      The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
      6/15/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4404, ECDSA #1473, DRBG #2162
      1944CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security TLS Library for Linux

      1.0


      The CyberArk Privileged Account Security TLS Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libssl library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
      6/15/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4403, HMAC #3644
      1943CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Linux SSH Client Cryptographic Module

      1.0


      The CyberArk Privileged Account Security Linux SSH Client is a general purpose SSH client compiled from the source code of the OpenSSH for Linux application. It is incorporated into the Privileged Session Manager SSH Proxy.

        • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
      6/15/2018
      • SSH:
        • SHA Functions: SHA-256, SHA-512
        • Prerequisite: SHS #4403
      1942CyberArk Software Ltd.
      9 Hapsagot St. Park Ofer 2
      P.O.B. 3143
      Petach-Tikva 4951040
      Israel

      Yariv Oren
      yariv.oren@gmail.com
      +972-3-918-0000x2258
      Fax: +972-3-924-0111

      Elad Moshe
      elad.moshe@cyberark.com
      +972-3-918-0000x2378
      Fax: +972-3-924-0111

      CyberArk Privileged Account Security Cryptographic Library for Linux

      1.0


      The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

        • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
      6/15/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4403, ECDSA #1472, DRBG #2161
      1941Securosys SA
      Forrlibuckstrasse 70
      Zurich, Zurich 8005
      Switzerland

      Marcel Dasen
      dasen@securosys.ch
      +41 44 552 31 33

      Robert Rogenmoser
      roro@securosys.ch
      +41 44 552 31 11

      Primus HSM Cryptographic Library

      XC7K160T 2.5.3 (Firmware)


      Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

        • Marvell Armada XP PJ4Bv7
      6/15/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2160
      1940Securosys SA
      Forrlibuckstrasse 70
      Zurich, Zurich 8005
      Switzerland

      Marcel Dasen
      dasen@securosys.ch
      +41 44 552 31 33

      Robert Rogenmoser
      roro@securosys.ch
      +41 44 552 31 11

      Primus HSM Cryptographic Library

      XC7K160T 2.5.3 (Firmware)


      Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

        • Marvell Armada XP PJ4Bv7
      6/15/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1939Securosys SA
      Forrlibuckstrasse 70
      Zurich, Zurich 8005
      Switzerland

      Marcel Dasen
      dasen@securosys.ch
      +41 44 552 31 33

      Robert Rogenmoser
      roro@securosys.ch
      +41 44 552 31 11

      Primus HSM Cryptographic Library

      XC7K160T 2.5.3 (Firmware)


      Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

        • Marvell Armada XP PJ4Bv7
      6/15/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1938Securosys SA
      Forrlibuckstrasse 70
      Zurich, Zurich 8005
      Switzerland

      Marcel Dasen
      dasen@securosys.ch
      +41 44 552 31 33

      Robert Rogenmoser
      roro@securosys.ch
      +41 44 552 31 11

      Primus HSM Cryptographic Library

      XC7K160T 2.5.3 (Firmware)


      Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

        • Marvell Armada XP PJ4Bv7
      6/15/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      1937Trend Micro Inc.
      11305 Alterra Parkway
      Austin, TX 78758
      USA

      Paul Tucker
      paul_tucker@trendmicro.com
      512-633-7945

      Trend Micro, TippingPoint Crypto Core OpenSSL

      2.0.13


      The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

        • Intel Core i3 without AES-NI w/ Linux 4.4
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
        • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
        • Intel Xeon E5 with AES-NI w/ Linux 4.4
      6/15/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-256
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4401, ECDSA #1470, DRBG #2159
      1936ST Microelectronics (Protonworld)
      Green Square Building B, Lambroekstraat 5
      Diegem/Machelen B-1831
      Belgium

      Olivier COLLART
      olivier.collart@st.com
      +32 272 450 77
      Fax: +32 272 451 43

      Fabien ARRIVE
      fabien.arrive@st.com
      +33 223 470 633
      Fax: +33 223 470 400

      ST33TPHF2ESPI

      49.08 (Firmware)


      ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications.

        • SecureCore SC300
      6/15/2018
      1935Arista Networks Inc.
      5453 Great America Pkwy
      Santa Clara, CA 95054
      USA

      Richard Whitney
      rw@arista.com
      703-627-6092
      Fax: 408-538-8920

      Ethan Rahn
      erahn@arista.com
      408-547-5825

      EOS MACsec Hybrid Firmware v1.0

      1.0 (Firmware)


      The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

        • Intel Pentium B9
        • Intel Xeon D-1500
        • AMD GE Series
        • AMD GX Series
        • Intel Xeon E3
      6/15/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2158
      1934Arista Networks Inc.
      5453 Great America Pkwy
      Santa Clara, CA 95054
      USA

      Richard Whitney
      rw@arista.com
      703-627-6092
      Fax: 408-538-8920

      Ethan Rahn
      erahn@arista.com
      408-547-5825

      EOS MACsec Hybrid Firmware v1.0

      1.0 (Firmware)


      The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

        • AMD GE Series
        • AMD GX Series
        • Intel Xeon D-1500
        • Intel Xeon E3
        • Intel Pentium B9
      6/15/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1933Arista Networks Inc.
      5453 Great America Pkwy
      Santa Clara, CA 95054
      USA

      Richard Whitney
      rw@arista.com
      703-627-6092
      Fax: 408-538-8920

      Ethan Rahn
      erahn@arista.com
      408-547-5825

      EOS MACsec Hybrid Firmware v1.0

      1.0 (Firmware)


      The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

        • Intel Xeon E3
        • AMD GX Series
        • Intel Pentium B9
        • Intel Xeon D-1500
        • AMD GE Series
      6/15/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4399
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4399, HMAC #3636
      1932Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-XLP

      Junos OS 18.1R1 (Firmware)


      Juniper MX and EX9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Broadcom XLP832
      6/15/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4397, ECDSA #1468, DRBG #2147
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4397, DRBG #2147
      1931Taisys Technologies Co. Ltd.
      7F., No.56, Lane 321
      Yangguang St., Neihu Dist.
      Taipei, Taipei 11491
      Taiwan (R.O.C.)

      Joe Wang
      joe.wang@taisys.com
      +886-2-26270927x6699
      Fax: +886-2-26270619

      Kent Horng
      kent.horng@taisys.com
      +886-2-26562185 #206
      Fax: +886-2-26579657

      TAISYS JUISE-S2-COS

      32 53 (Firmware)


      The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

        • SC300
      6/15/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1930ViaSat, Inc.
      6155 El Camino Real
      Carlsbad, CA 92009
      USA

      David Suksumrit
      david.suksumrit@viasat.com
      760-476-2200
      Fax: 760-929-3941

      Lorenzo Page
      lorenzo.page@viasat.com
      760-893-4198

      NetSNMP KDF

      5.7.1 EBEM Patch 2 (Firmware)


      SHA-1 based KDF used by NetSNMP

        • IBM PowerPC 405GPr
      6/15/2018
      • SNMP:
      1929ViaSat, Inc.
      6155 El Camino Real
      Carlsbad, CA 92009
      USA

      David Suksumrit
      david.suksumrit@viasat.com
      760-476-2200
      Fax: 760-929-3941

      Lorenzo Page
      lorenzo.page@viasat.com
      760-893-4198

      OpenSSH Algorithms

      6.1p1 EBEM Patch 1 (Firmware)


      KDF implementation in OpenSSH.

        • IBM PowerPC 405GPr
      6/15/2018
      • SSH:
        • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4394
      1928ViaSat, Inc.
      6155 El Camino Real
      Carlsbad, CA 92009
      USA

      David Suksumrit
      david.suksumrit@viasat.com
      760-476-2200
      Fax: 760-929-3941

      Lorenzo Page
      lorenzo.page@viasat.com
      760-893-4198

      OpenSSH Algorithms

      6.1p1 EBEM Patch 1 (Firmware)


      KDF implementation in OpenSSH.

        • IBM PowerPC 405GPr
      6/15/2018
      • KAS ECC:
        • Functions: Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4394, ECDSA #1467, DRBG #2154
      1927Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • PPCe500
        • Intel Xeon w/ ESXI 6.0
      6/8/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-224
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4392, HMAC #3629
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4392, HMAC #3629
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5474
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4392
      • TLS:
        • Supports TLS 1.0/1.1
        • Prerequisite: SHS #4392, HMAC #3629
      1926Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • PPCe500
        • Intel Xeon w/ ESXI 6.0
      6/8/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4392, ECDSA #1465, DRBG #2153
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4392, DRBG #2153
      1925Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 NSS without AES-NI

      R6-1.0.0


      Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      6/8/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Prerequisite: SHS #4391, HMAC #3628
      1924Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 NSS without AES-NI

      R6-1.0.0


      Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      6/8/2018
      • KAS ECC:
        • Functions: Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4391, ECDSA #1464, DRBG #2151
      • KAS FFC:
        • Functions: Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4391, DSA #1407, DRBG #2151
      1923Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone Controller Java Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
        • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
      6/8/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1922Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone Controller Java Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
        • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
      6/8/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4390, HMAC #3627
      1921Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Brian Wood
      be.wood@samsung.com
      +1-973-440-9125

      Samsung BoringSSL Cryptographic Module

      v1.2.1


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Qualcomm MSM8998 w/ Android 8.1
        • Samsung Electronics Exynos 9810 w/ Android 8.1
        • Qualcomm SDM845 w/ Android 8.1
        • Qualcomm SDM450 w/ Android 8.1
      6/8/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1920Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Brian Wood
      be.wood@samsung.com
      +1-973-440-9125

      Samsung BoringSSL Cryptographic Module

      v1.2.1


      The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

        • Qualcomm SDM845 w/ Android 8.1
        • Samsung Electronics Exynos 9810 w/ Android 8.1
        • Qualcomm MSM8998 w/ Android 8.1
        • Qualcomm SDM450 w/ Android 8.1
      6/8/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4389, ECDSA #1463, DRBG #2149
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4389, DSA #1406, DRBG #2149
      1919Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-QuickSec

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-2040
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4388, HMAC #3625
      • IKEv2:
        • Derived Keying Material length: 960-1792
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4388, HMAC #3625
      1918Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-OpenSSL

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4387
      1917Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.1R1 MTRE-OpenSSL

      Junos OS 18.1R1 (Firmware)


      Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

        • Intel Xeon CPU E5
      6/8/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4387, ECDSA #1462, DRBG #2147
      1916Futurex
      864 Old Boerne Road
      Bulverde, TX 78163
      USA

      Futurex Security Certifications
      certifications@futurex.com
      830-980-9782

      Futurex Cryptographic Engine

      6.2.0.1 (Firmware)


      The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

        • TI AM3352
      6/8/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4384, HMAC #3621
      1915SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5 for TZ, NSA and SuperMassive

      6.5.2 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN62XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon II (CN68XX)
        • Cavium Octeon III (CN71XX)
        • Cavium Octeon III (CN70XX)
      6/8/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 176-1024
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 521 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4383, HMAC #3620
      • IKEv2:
        • Derived Keying Material length: 160-512
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 521 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4383, HMAC #3620
      • SNMP:
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4383
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4383, HMAC #3620
      1914SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5 for TZ, NSA and SuperMassive

      6.5.2 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN66XX)
        • Cavium Octeon II (CN62XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon III (CN71XX)
        • Cavium Octeon II (CN68XX)
      6/8/2018
      • ECDSA SigGen:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2144
      1913SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5 for TZ, NSA and SuperMassive

      6.5.2 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN62XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon II (CN68XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon III (CN71XX)
      6/8/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Full Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4383, ECDSA #1460, DRBG #2144
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhHybrid1:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-512
              • FC:
                • SHA: SHA-512
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-512
              • FC:
                • SHA: SHA-512
          • dhHybrid1Flow:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-512
              • FC:
                • SHA: SHA-512
          • dhOneFlow:
            • Key Agreement Roles: Initiator, Responder
          • dhStatic:
            • Key Agreement Roles: Initiator, Responder
        • Prerequisite: SHS #4383, DSA #1405, DRBG #2144
      1912Taisys Technologies Co. Ltd.
      7F., No.56, Lane 321
      Yangguang St., Neihu Dist.
      Taipei, Taipei 11491
      Taiwan (R.O.C.)

      Joe Wang
      joe.wang@taisys.com
      +886-2-26270927x6699
      Fax: +886-2-26270619

      Kent Horng
      kent.horng@taisys.com
      +886-2-26562185 #206
      Fax: +886-2-26579657

      TAISYS JUISE-S2-COS

      32 53 (Firmware)


      The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

        • SC300
      6/1/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1911Taisys Technologies Co. Ltd.
      7F., No.56, Lane 321
      Yangguang St., Neihu Dist.
      Taipei, Taipei 11491
      Taiwan (R.O.C.)

      Joe Wang
      joe.wang@taisys.com
      +886-2-26270927x6699
      Fax: +886-2-26270619

      Kent Horng
      kent.horng@taisys.com
      +886-2-26562185 #206
      Fax: +886-2-26579657

      TAISYS JUISE-S2-COS

      32 53 (Firmware)


      The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

        • SC300
      6/1/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2134
      1910Taisys Technologies Co. Ltd.
      7F., No.56, Lane 321
      Yangguang St., Neihu Dist.
      Taipei, Taipei 11491
      Taiwan (R.O.C.)

      Joe Wang
      joe.wang@taisys.com
      +886-2-26270927x6699
      Fax: +886-2-26270619

      Kent Horng
      kent.horng@taisys.com
      +886-2-26562185 #206
      Fax: +886-2-26579657

      TAISYS JUISE-S2-COS

      32 53 (Firmware)


      The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

        • SC300
      6/1/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      1909Juniper Networks, Inc
      1133 Innovation Way
      Sunnyvale, California 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 QFX10K-OpenSSL

      Junos OS 18.1R1 (Firmware)


      The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

        • Intel Xeon E3
      6/1/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4381
      1908Juniper Networks, Inc
      1133 Innovation Way
      Sunnyvale, California 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos OS 18.1R1 QFX10K-OpenSSL

      Junos OS 18.1R1 (Firmware)


      The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

        • Intel Xeon E3
      6/1/2018
      • KAS ECC:
        • Functions: Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4381, ECDSA #1458, DRBG #2142
      1907REDCOM Laboratories, Inc
      One REDCOM Center
      Victor, NY 14564-0995
      United States

      Sal Ceravolo
      Sal.ceravolo@redcom.com
      585-905-0451

      Chris Hasenauer
      Chris.hasenauer@redcom.com
      585-905-0451

      REDCOM Encryption 140-2

      3.0.1


      REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
        • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
      6/1/2018
      • ANS 9.63:
        • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4377
      • IKEv2:
        • Derived Keying Material length: 160-8192
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4377, HMAC #3614
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5457
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4377
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4377, HMAC #3614
      1906REDCOM Laboratories, Inc
      One REDCOM Center
      Victor, NY 14564-0995
      United States

      Sal Ceravolo
      Sal.ceravolo@redcom.com
      585-905-0451

      Chris Hasenauer
      Chris.hasenauer@redcom.com
      585-905-0451

      REDCOM Encryption 140-2

      3.0.1


      REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
        • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
      6/1/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1905REDCOM Laboratories, Inc
      One REDCOM Center
      Victor, NY 14564-0995
      United States

      Sal Ceravolo
      Sal.ceravolo@redcom.com
      585-905-0451

      Chris Hasenauer
      Chris.hasenauer@redcom.com
      585-905-0451

      REDCOM Encryption 140-2

      3.0.1


      REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
        • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
      6/1/2018
      • ECDSA SigGen:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2140
      1904REDCOM Laboratories, Inc
      One REDCOM Center
      Victor, NY 14564-0995
      United States

      Sal Ceravolo
      Sal.ceravolo@redcom.com
      585-905-0451

      Chris Hasenauer
      Chris.hasenauer@redcom.com
      585-905-0451

      REDCOM Encryption 140-2

      3.0.1


      REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
        • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
      6/1/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1903Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 QuickSec

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-256
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4376, HMAC #3613
      • IKEv2:
        • Derived Keying Material length: 1136-2432
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4376, HMAC #3613
      1902Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2001

      Junos OS 18.1R1 OpenSSH

      Junos OS 18.1R1 (Firmware)


      The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

        • Intel(R) Xeon(R) CPU E5
      5/25/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4375
      1901KeyNexus, Inc.
      205-2657 Wilfert Road
      Victoria, BC V9B6A7
      Canada

      Jason Novecosky
      jason@keynexus.net

      KeyNexus Cryptographic Library

      1.0


      The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

        • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
      5/25/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1900KeyNexus, Inc.
      205-2657 Wilfert Road
      Victoria, BC V9B6A7
      Canada

      Jason Novecosky
      jason@keynexus.net

      KeyNexus Cryptographic Library

      1.0


      The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

        • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
      5/25/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1899KeyNexus, Inc.
      205-2657 Wilfert Road
      Victoria, BC V9B6A7
      Canada

      Jason Novecosky
      jason@keynexus.net

      KeyNexus Cryptographic Library

      1.0


      The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

        • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
      5/25/2018
      • ECDSA SigGen:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2137
      1898KeyNexus, Inc.
      205-2657 Wilfert Road
      Victoria, BC V9B6A7
      Canada

      Jason Novecosky
      jason@keynexus.net

      KeyNexus Cryptographic Library

      1.0


      The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

        • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
      5/25/2018
      • ANS 9.63:
        • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4373
      • IKEv2:
        • Derived Keying Material length: 160-8192
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4373, HMAC #3611
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5453
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4373
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4373, HMAC #3611
      1897Hypersecu Information System Inc
      #206-6191 Westminster Hwy
      Richmond, BC V7C 4V4
      Canada

      James Li
      james@hypersecu.com
      (604) 279-2000
      Fax: (604) 272-1233

      HYP ALG Library

      V1.0 (Firmware)


      The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

        • HSC32K1
      5/25/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256
        • Prerequisite: DRBG #2135
      1896Cisco Systems, Inc.
      170 W Tasman Dr
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      tbd

      CiscoSSL FIPS Object Module

      6.0


      The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

        • Apple A10 w/ iOS 11.x
      5/25/2018
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1
        • Prerequisite: SHS #4357, HMAC #3608
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5434
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4357
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4357, HMAC #3608
      1895Cisco Systems, Inc.
      170 W Tasman Dr
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      tbd

      CiscoSSL FIPS Object Module

      6.0


      The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

        • Apple A10 w/ iOS 11.x
      5/25/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: AES #5434, SHS #4357, ECDSA #1452, DRBG #2121, HMAC #3608
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4357, DSA #1402, DRBG #2121
      1894DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      972-3-9279529

      DocuSign-SA-TLS

      8.51.9.0 (Firmware)


      DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

        • Intel® Xeon Quad-Core
      5/25/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256
        • Prerequisite: SHS #4368, HMAC #3607
      1893IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      845-435-5538

      William Santiago
      wsf1@us.ibm.com
      845-435-9265

      Miniboot 6.63 with 00CW683

      Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


      Miniboot Implemented Algorithms with hardware acceleration

        • IBM PowerPC 405
      5/25/2018
      • ECDSA SigGen:
        • P-521 SHA: SHA-512
        • Prerequisite: DRBG #2130
      1892wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      4.0


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
      5/25/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1892wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      4.0


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
      5/18/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1891wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      4.0


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
        • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
      5/18/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4365, ECDSA #1451, DRBG #2131
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4365, DSA #1401, DRBG #2131
      1890Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Petra Manche
      +44 1189 245470

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle OpenSSL FIPS Object Module

      OpenSSL_2.0.13_OracleFIPS_1.0


      Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

        • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
        • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
        • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
        • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
        • SPARC S7 with PAA w/ Oracle Solaris 11.4
        • SPARC S7 without PAA w/ Oracle Solaris 11.4
        • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
        • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
        • Intel Xeon E5 with PAA w/ Solaris 11.4
        • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
        • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
      5/18/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1889Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      UnBound EKM Cryptographic Module

      2.0.1801.21683


      This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

        • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      5/18/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1888Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      UnBound EKM Cryptographic Module

      2.0.1801.21683


      This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      5/18/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2126
      1887Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      UnBound EKM Cryptographic Module

      2.0.1801.21683


      This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
      5/18/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      1886Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      OpenSSL

      FIPS 2.0.16


      This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      5/18/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2126
      1885Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      OpenSSL

      FIPS 2.0.16


      This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      5/18/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4362, HMAC #3600
      1884Unbound Tech
      25 Efal Street
      Petah Tikva
      Israel

      Unbound Tech
      contact@unboundtech.com
      631-316-8114

      OpenSSL

      FIPS 2.0.16


      This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      5/18/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-256, SHA-384, SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-384, SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4362, ECDSA #1447, DRBG #2126
      1883Splunk, Inc.
      270 Brannan Street
      San Francisco, CA 94107
      USA

      Robert Truesdell
      rtruesdell@splunk.com
      412.913.8242

      Splunk Phantom Cryptographic Library

      1.0


      The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

        • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
        • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
      5/18/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1882Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4360, HMAC #3598
      1881Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4360, ECDSA #1445, DRBG #2124
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4360, DSA #1398, DRBG #2124
      1880Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

        • n/a
      5/18/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4359, HMAC #3597
      1879Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

        • n/a
      5/18/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4359, ECDSA #1444, DRBG #2123
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4359, DSA #1397, DRBG #21231397
      1878Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4358, HMAC #3596
      1877Texas Instruments, Inc.
      12500 TI Blvd.
      Dallas, Texas 75243
      USA

      Alon Srednizki
      alons@ti.com
      +972-9-7906059
      Fax: +972-9-7906098

      Barak Cherches
      barakch@ti.com
      +972-9-7906238
      Fax: +972-9-7906098

      TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

      CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


      The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

        • n/a
      5/18/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4358, ECDSA #1443, DRBG #2122
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4358, DSA #1396, DRBG #2122
      1876Cohesity, Inc.
      300 Park Ave
      Suite 800
      San Jose, CA 95110
      USA

      Vivek Agarwal
      vivek@cohesity.com
      +1 (415) 690-7805

      Cohesity OpenSSL FIPS Object Module

      1.0.2


      The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

        • Intel Xeon with AES-NI w/ CentOS 7
        • Intel Xeon without AES-NI w/ CentOS 7
      5/10/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      1875Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      +1 (628)-400-2043

      SDKMS Crypto Library

      1.0.0 (Firmware)


      Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

        • Intel® Xeon E3-1230v5 4-Core, 3.40GHz
      5/10/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4241, HMAC #3489
      1874Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      +1 (628)-400-2043

      SDKMS Crypto Library

      1.0.0 (Firmware)


      Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

        • Intel® Xeon E3-1230v5 4-Core, 3.40GHz
      5/10/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2115
      1873Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      +1 (628)-400-2043

      SDKMS Crypto Library

      1.0.0 (Firmware)


      Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

        • Intel® Xeon E3-1230v5 4-Core, 3.40GHz
      5/10/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • SHA: SHA-512
        • Prerequisite: ECDSA #1441, DRBG #2115
      1872Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      kmeagher@ciena.com
      1-410-865-8936

      OpenSSL FIPS Object Module

      2.0.12


      Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

        • Intel Xeon D-1500 w/ SAOS 8.6.1
        • AARCH64(arm) w/ SAOS 6.17
        • Cavium 52xx w/ SAOS 6.17
        • ARMv7 w/ SAOS 6.17
      5/10/2018
      • KAS ECC:
        • Functions: Domain Parameter Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4350, ECDSA #1440, DRBG #2114
      1871NIKSUN, Inc.
      457 N. Harrison St.
      3rd Floor
      Princeton, NJ 08540
      USA

      Darryle Merlette
      merlette@niksun.com

      NIKOS FIPS Object Module

      2.0.16


      The NIKOS FIPS Object Module is a software library that provides cryptographic services to a vast array of NIKSUN's networking products.

        • Intel Xeon E5-2680 v2 w/ FreeBSD 11.1
      5/10/2018
      • KAS FFC:
        • Functions: Full Public Key Validation, Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4349, DSA #1394, DRBG #2113
      1870Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 OpenSSH Server & Client

      R7-2.0.0


      Oracle Linux OpenSSH Cryptographic Module is a software module that supplies cryptographic support for the SSH protocol.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      5/10/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4295, SHS #4312, SHS #4329
      1869LG Electronics, Inc.
      20 Yoido-dong
      Youngdungpo-gu
      Seoul 152-721
      Republic of Korea

      Donghoon Shin
      hoon.shin@lge.com
      82-10-2280-4056

      LG BoringSSL

      3.0


      General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

        • Snapdragon 845 (SDM845) w/ Android 8.0
        • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
        • Snapdragon 835 (MSM8998) w/ Android 8.0
      5/10/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4348, ECDSA #1439, DRBG #2112
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4348, DSA #1393, DRBG #2112
      1868INFINIDAT
      500 Totten Pond Road
      Waltham, MA 02451
      USA

      David Hebert
      davidh@infinidat.com
      +1 860-214-5666

      Steve Sullivan
      steves@infinidat.com
      +1 781-264-1544

      INFINIDAT Cryptographic Module (libssl)

      1.0.2k


      The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the KDF for TLSv1.2.

        • Intel Xeon E5-2697 w/ InfiniBox OS 4.7
      5/4/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4344, HMAC #3585
      1867Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Gokul Karthik Balaswamy
      gokulk@microsoft.com
      425-706-8583
      Fax: 425-708-0107

      Christine Ahonen
      chrisah@microsoft.com
      425-706-8675
      Fax: 425-936-7329

      Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

      7.00.2883


      The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

        • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
        • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
        • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
        • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
        • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
      5/4/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
        • Pre-shared Key Length: 64-2048
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-384
        • Prerequisite: SHS #3649, HMAC #2943
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #3649, HMAC #2943
      1866INFINIDAT
      500 Totten Pond Road
      Waltham, MA 02451
      USA

      David Hebert
      davidh@infinidat.com
      +1 860-214-5666

      Steve Sullivan
      steves@infinidat.com
      +1 781-264-1544

      INFINIDAT Cryptographic Module (libcrypto)

      1.0.2k


      The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

        • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
      5/4/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      1865Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-9951

      Fortinet FortiGate-VM FIPS Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2102
      1864Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-9951

      Fortinet FortiGate-VM FIPS Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
        • Pre-shared Key Length: 128-1016
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 3072 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4339, HMAC #3580
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4339, HMAC #3580
      1863Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-9951

      Fortinet FortiGate-VM SSL Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2102
      1862Fortinet Inc.
      1090 Kifer Road
      Sunnyvale, CA 94086-5301
      USA

      Alan Kaye
      akaye@fortinet.com
      613-225-9381 x87416
      Fax: 613-225-9951

      Fortinet FortiGate-VM SSL Cryptographic Library v5.4

      5.4


      This document focuses on the software implementation of the Fortinet FortiGate-VM SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

        • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
      5/3/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256
        • Prerequisite: HMAC #3579
      1861Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-1-01 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in sensor and access point.

        • ARMv7
      5/3/2018
      • KAS ECC:
        • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
        • Prerequisite: SHS #4165, ECDSA #1336, DRBG #1936
      1860Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-3-00 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in server.

        • Intel Xeon
      5/3/2018
      • KAS ECC:
        • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4270, ECDSA #1396, DRBG #2049
      1859D'Crypt Pte Ltd
      28 Sin Ming Lane
      #06-133 Midview City
      Singapore, Singapore 573953
      Singapore

      Sales & Marketing
      marketing@d-crypt.com
      (65) 6933-1800
      Fax: (65) 6684-5142

      Quek Gim Chye
      fips@d-crypt.com
      (65) 6933-1823
      Fax: (65) 6684-5142

      D'Crypt Cryptographic Library

      3.8 (Firmware)


      The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

        • ARM Cortex-A
        • Intel x86 64 bit
      5/3/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2094
      1858D'Crypt Pte Ltd
      28 Sin Ming Lane
      #06-133 Midview City
      Singapore, Singapore 573953
      Singapore

      Sales & Marketing
      marketing@d-crypt.com
      (65) 6933-1800
      Fax: (65) 6684-5142

      Quek Gim Chye
      fips@d-crypt.com
      (65) 6933-1823
      Fax: (65) 6684-5142

      D'Crypt Cryptographic Library

      3.8 (Firmware)


      The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

        • Intel x86 64 bit
        • ARM Cortex-A
      5/3/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      1857ClevX, LLC
      9306 NE 125th Street
      Kirkland, WA 98034
      USA

      Lev Bolotin
      Lev.Bolotin@clevx.com
      +1.425.820.9929

      Marc Singer
      Marc.Singer@clevx.com
      425.820.9929

      ClevX Datalock Cryptographic Library

      ClevX-Datalock-v2.0 (Firmware)


      ClevX Datalock Cryptographic Firmware Library

        • STM32L071C
      5/3/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256
      1856Nuvoton Technology Corporation
      No. 4, Creation Rd. III
      Hsinchu Science Park 300
      Taiwan, R.O.C.

      Yossi Talmi
      yossi.talmi@nuvoton.com
      +972-9-9702364
      Fax: +972-9-9702001

      Oren Tanami
      oren.tanami@nuvoton.com
      +972-9-9702390
      Fax: +972-9-9702001

      Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

      LAG019


      Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

        • N/A
      5/3/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1855Nuvoton Technology Corporation
      No. 4, Creation Rd. III
      Hsinchu Science Park 300
      Taiwan, R.O.C.

      Yossi Talmi
      yossi.talmi@nuvoton.com
      +972-9-9702364
      Fax: +972-9-9702001

      Oren Tanami
      oren.tanami@nuvoton.com
      +972-9-9702390
      Fax: +972-9-9702001

      Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

      LAG019


      Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

        • N/A
      5/3/2018
      1854Nuvoton Technology Corporation
      No. 4, Creation Rd. III
      Hsinchu Science Park 300
      Taiwan, R.O.C.

      Yossi Talmi
      yossi.talmi@nuvoton.com
      +972-9-9702364
      Fax: +972-9-9702001

      Oren Tanami
      oren.tanami@nuvoton.com
      +972-9-9702390
      Fax: +972-9-9702001

      Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

      LAG019


      Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

        • N/A
      5/3/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384
      1853Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen, Certification Program Manager
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos 18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Freescale e500 dual core (PB0BJSSE1PNB)
        • Intel Xeon E31xx (Sandy Bridge)
      5/3/2018
      • KAS ECC:
        • Functions: Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4324, ECDSA #1424, DRBG #2087
      1852Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen, Certification Program Manager
      vann@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Junos 18.1R1 - OpenSSL

      18.1R1 (Firmware)


      The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

        • Intel Xeon E31xx (Sandy Bridge)
        • Freescale e500 dual core (PB0BJSSE1PNB)
      5/3/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4324
      1851Certicom Corp.
      4701 Tahoe Blvd, Building A
      5th Floor
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder® FIPS Core

      6.3.0


      Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

        • Intel Atom C3558 without AES-NI w/ QNX SDP 7
        • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
        • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
        • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
        • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
      4/27/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1850Certicom Corp.
      4701 Tahoe Blvd, Building A
      5th Floor
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder® FIPS Core

      6.3.0


      Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
        • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
        • Intel Atom C3558 without AES-NI w/ QNX SDP 7
        • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
        • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
        • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
      4/27/2018
      • ANS 9.63:
        • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4321
      1849Certicom Corp.
      4701 Tahoe Blvd, Building A
      5th Floor
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder® FIPS Core

      6.3.0


      Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

        • Intel Atom C3558 without AES-NI w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
        • Intel Atom C3558 with AES-NI w/ QNX SDP 7
        • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
        • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
        • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
        • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      4/27/2018
      • ECC CDH:
        • Primitive
        • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1848Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - OpenSSL

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon II (CN6335)
        • Cavium Octeon III (CN7130)
        • Intel Xeon C5518
      4/27/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4320
      1847Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mike Jamison
      (678) 473-2907
      Fax: (678) 473-8470

      Cloudpath Cryptographic Library for Java

      1.0


      Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
      4/27/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4318, HMAC #3536
      1846Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mike Jamison
      (678) 473-2907
      Fax: (678) 473-8470

      Cloudpath Cryptographic Library for Java

      1.0


      Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
        • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
      4/27/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1845Nuvoton Technology Corporation
      No. 4, Creation Rd. III
      Hsinchu Science Park 300
      Taiwan, R.O.C.

      Yossi Talmi
      yossi.talmi@nuvoton.com
      +972-9-9702364
      Fax: +972-9-9702001

      Oren Tanami
      oren.tanami@nuvoton.com
      +972-9-9702390
      Fax: +972-9-9702001

      Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

      LAG019


      Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16

        • N/A
      4/13/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1844Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      4/13/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4314, HMAC #3562
      1843Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      4/13/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4314, ECDSA #1420, DRBG #2081
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4314, DSA #1389, DRBG #2081
      1842Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd.
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ancrypto.dylib

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • ARMv7 w/ iOS 10.3.3
      4/13/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1841Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1(628)400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/13/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4280, ECDSA #1419, DRBG #2073
      1840Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1(628)400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/13/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: ECDSA #1418, DRBG #2072
      1839BiObex, LLC
      11501 Sunset Hills Rd
      Suite 200
      Reston, VA 22190
      USA

      Arthur Joyce
      ajoyce@biobex.com
      571-313-0969

      SAFE-Key device

      1.2.0.0 (Firmware)


      The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

        • STM32F415
      4/13/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1838Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R7-2.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      4/13/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4312, HMAC #3558
      1837Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R7-2.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      4/13/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4312, ECDSA #1417, DRBG #2079
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4312, DSA #1388, DRBG #2079
      1836IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL [1] with the OpenSSL FIPS Object Module [2]

      1.0.2o [1]; 2.0.13 [2]


      The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
      4/13/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4311, ECDSA #1416, DRBG #2078
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4311, DSA #1387, DRBG #2078
      1835Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 OpenSSH Server & Client

      R6-1.0.0


      Oracle Linux OpenSSH Cryptographic Module is a software module which supplies cryptographic support for the SSH protocol

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      4/13/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4302, SHS #4303, SHS #4304
      1834Allied Telesis
      27 Nazareth Ave
      Christchurch, Canterbury 8024
      New Zealand

      Alex Murray
      Alex.murray@alliedtelesis.co.nz
      +64 3 339 3000
      Fax: +64 3 339 3001

      Catherine Grulla
      securitycertification@alliedtelesis.co.nz
      +64 3 339 3000
      Fax: +64 3 339 3001

      AW+ OpenSSL FIPS Object Module Version 2.0.10

      Openssl-fips-2.0.10 (Firmware)


      AW+ OpenSSL FIPS Object Module is a software library which provides cryptographic support for secure communication and protection of information. The cryptographic services provided by the library include Symmetric Encryption and Decryption, Digital Signature, Cryptographic Hashing and Keyed-Hash Message Authentication

        • Freescale PowerPC P2040
      4/9/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #3228, ECDSA #858, DRBG #1133
      1833VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
      4/9/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1832VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
      4/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1831VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
        • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
      4/9/2018
      • ANS 9.63:
        • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4307
      • IKEv2:
        • Derived Keying Material length: 160-8192
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4307, HMAC #3553
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5365
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4307
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4307, HMAC #3553
      1830Realia Technologies, S.L
      Infanta Mercedes 90, 4th floor
      Madrid, Madrid 28020
      Spain

      Jesus Rodriguez
      jrodriguez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Luis Jesus Hernandez
      ljhernandez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Cryptosec Dekaton

      1.1


      The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

        • N/A
      4/9/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
        • P-256 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
        • P-384 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
        • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
        • Prerequisite: DRBG #2056
      1829Certes Networks, Inc
      300 Corporate Center Drive
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      Certes Enforcement Point SNMP Library

      1.0 (Firmware)


      The Certes Enforcement Point SNMP Library provides SNMPv3 support for the Certes CEP appliances.

        • Intel Atom Processor C Series
        • Intel Xeon Processor E5 v4 Family
        • Intel Xeon Processor E3 v5 Family
      4/9/2018
      • SNMP:
      1828Certes Networks, Inc
      300 Corporate Center Drive
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      Certes Enforcement Point SSH Library

      1.0 (Firmware)


      The Certes Enforcement Point SSH Library provides SSH support for the Certes CEP appliances.

        • Intel Atom Processor C Series
        • Intel Xeon Processor E5 v4 Family
        • Intel Xeon Processor E3 v5 Family
      4/9/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4289
      1827Certes Networks, Inc
      300 Corporate Center Drive
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      Certes Enforcement Point TLS Library

      1.0 (Firmware)


      The Certes Enforcement Point TLS Library provides TLSv1.2 support for the Certes CEP appliances.

        • Intel Xeon Processor E5 v4 Family
        • Intel Xeon Processor E3 v5 Family
        • Intel Atom Processor C Series
      4/9/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4289, HMAC #3535
      1826wolfSSL Inc.
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Larry Stefonic
      larry@wolfssl.com
      206-369-4800

      wolfCrypt

      3.14.2


      The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

        • Intel x86 w/ NetBSD v6.0.1
      4/9/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256, SHA-384, SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-384, SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4306, ECDSA #1414, DRBG #2075
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4306, DSA #1385, DRBG #2075
      1825Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/9/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: ECDSA #1412, DRBG #2073
      1824Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/9/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2073
      1823Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1822Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
      4/9/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4280, HMAC #3526
      1821Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/9/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
      1820Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/9/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2036
      1819Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/9/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1818Fortanix, Inc.
      444 Castro Street, #702
      Mountain View, CA 94041
      USA

      Ambuj Kumar
      info@fortanix.com
      +1 (628) 400-2043

      Fortanix Crypto Algorithm Library

      2.6.0


      Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

        • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
      4/9/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4281, HMAC #3527
      1817Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R6-1.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      3/30/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4303, HMAC #3549
      1816Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

      R6-1.0.0


      Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
      3/30/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4303, ECDSA #1409, DRBG #2070
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4303, DSA #1383, DRBG #2070
      1815Bivio Networks, Inc.
      4457 Willow Road, Suite 240
      Pleasanton, CA 94588
      USA

      Raj Srinivasan
      raj@bivio.net
      (925) 924-8608
      Fax: (925) 924-8650

      OpenSSL

      1.0.2k-8


      OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

        • Intel Xeon Skylake w/ RHEL 7.4
      3/30/2018
      • RSADP:
        • Modulus Size: 2048 (bits)
      1814Bivio Networks, Inc.
      4457 Willow Road, Suite 240
      Pleasanton, CA 94588
      USA

      Raj Srinivasan
      raj@bivio.net
      (925) 924-8608
      Fax: (925) 924-8650

      OpenSSL

      1.0.2k-8


      OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

        • Intel Xeon Skylake w/ RHEL 7.4
      3/30/2018
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4301
      1813Bivio Networks, Inc.
      4457 Willow Road, Suite 240
      Pleasanton, CA 94588
      USA

      Raj Srinivasan
      raj@bivio.net
      (925) 924-8608
      Fax: (925) 924-8650

      OpenSSL

      1.0.2k-8


      OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

        • Intel Xeon Skylake w/ RHEL 7.4
      3/30/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256
      • KAS ECC:
        • Functions: Domain Parameter Generation, Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-384
        • Prerequisite: SHS #4301, ECDSA #1408, DRBG #2069, HMAC #3547
      1812Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      3/30/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4300, ECDSA #1407, DRBG #2068
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
        • Prerequisite: SHS #4300, DSA #1382, DRBG #2068
      1811Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit)

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      3/30/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4300, HMAC #3546
      1810SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5.1 for TZ, NSA and SuperMassive

      6.5.1 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN68XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon III (CN71XX)
        • Cavium Octeon II (CN62XX)
        • Cavium Octeon II (CN66XX)
      3/30/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2066
      1809SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5.1 for TZ, NSA and SuperMassive

      6.5.1 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN66XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon II (CN62XX)
        • Cavium Octeon III (CN71XX)
        • Cavium Octeon II (CN68XX)
      3/30/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 176-1024
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 521 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4297, HMAC #3543
      • IKEv2:
        • Derived Keying Material length: 160-512
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 521 (bits)
            • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4297, HMAC #3543
      • SNMP:
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4297
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4297, HMAC #3543
      1808SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5.1 for TZ, NSA and SuperMassive

      6.5.1 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium Octeon II (CN68XX)
        • Cavium Octeon II (CN66XX)
        • Cavium Octeon III (CN70XX)
        • Cavium Octeon II (CN62XX)
        • Cavium Octeon III (CN71XX)
      3/30/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Full Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • Static Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-512
              • EC:
                • Curve: P-256
                • SHA: SHA-512
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4297, ECDSA #1406, DRBG #2066
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhHybrid1:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-512
              • FC:
                • SHA: SHA-512
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-512
              • FC:
                • SHA: SHA-512
          • dhHybrid1Flow:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-512
              • FC:
                • SHA: SHA-512
          • dhOneFlow:
            • Key Agreement Roles: Initiator, Responder
          • dhStatic:
            • Key Agreement Roles: Initiator, Responder
        • Prerequisite: SHS #4297, DSA #1381, DRBG #2066
      1807Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      Aruba Common Cryptographic Module (CCM)

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • Intel Core i7 w/ Windows 10 64-bit User Mode
        • Intel Core i5 w/ Windows 10 32-bit User Mode
        • ARMv7 w/ Android 7.1
      3/30/2018
      • RSASP1:
        • Modulus Size: 2048 (bits)
        • Padding Algorithms: PKCS 1.5
      1806Realia Technologies, S.L
      Infanta Mercedes 90, 4th floor
      Madrid, Madrid 28020
      Spain

      Jesus Rodriguez
      jrodriguez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Luis Jesus Hernandez
      ljhernandez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Cryptosec Dekaton

      1.1


      The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

        • N/A
      3/30/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4278
      1805ALE (Alcatel Lucent Enterprise)
      26801 Agoura Road
      Calabasas, CA 91301
      USA

      Tao Shen
      tao.shen@al-enterprise.com
      818-878-5038

      Vadivel Poonathan
      vadivel.poonathan@al-enterprise.com
      818-878-4601

      Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS9900(Intel_Atom_C2518)) - ECDH

      AOS 8.3.1.R01


      This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

        • Intel Atom C2518 w/ AOS 8.3.1.R01
      3/30/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #3526, ECDSA #1082, DRBG #1348
      1804ALE (Alcatel Lucent Enterprise)
      26801 Agoura Road
      Calabasas, CA 91301
      USA

      Tao Shen
      tao.shen@al-enterprise.com
      818-878-5038

      Vadivel Poonathan
      vadivel.poonathan@al-enterprise.com
      818-878-4601

      Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6900(Freescale_PowerPC_MPC8572)) - ECDH

      AOS 8.3.1.R01


      This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

        • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
      3/30/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #3524, ECDSA #1079, DRBG #1346
      1803ALE (Alcatel Lucent Enterprise)
      26801 Agoura Road
      Calabasas, CA 91301
      USA

      Tao Shen
      tao.shen@al-enterprise.com
      818-878-5038

      Vadivel Poonathan
      vadivel.poonathan@al-enterprise.com
      818-878-4601

      Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6900(PowerPC_P2040)) - ECDH

      AOS 8.3.1.R01


      This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

        • PowerPC P2040 w/ AOS 8.3.1.R01
      3/30/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #3525, ECDSA #1081, DRBG #1347
      1802ALE (Alcatel Lucent Enterprise)
      26801 Agoura Road
      Calabasas, CA 91301
      USA

      Tao Shen
      tao.shen@al-enterprise.com
      818-878-5038

      Vadivel Poonathan
      vadivel.poonathan@al-enterprise.com
      818-878-4601

      Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6860) - ECDH

      AOS 8.3.1.R01


      This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

        • Cortex ARM 9 w/ AOS 8.3.1.R01
      3/30/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #3523, ECDSA #1078, DRBG #1345
      1801ALE (Alcatel Lucent Enterprise)
      26801 Agoura Road
      Calabasas, CA 91301
      USA

      Tao Shen
      tao.shen@al-enterprise.com
      818-878-5038

      Vadivel Poonathan
      vadivel.poonathan@al-enterprise.com
      818-878-4601

      Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS10K) - ECDH

      AOS 8.3.1.R01


      This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

        • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
      3/30/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #3520, ECDSA #1077, DRBG #1342
      1800Certes Networks, Inc.
      300 Corporate Center Drive
      Suite 140
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      Certes Enforcement Point Cryptographic Library

      1.0.2l (Firmware)


      The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

        • Intel Xeon Processor E3 v5 Family
        • Intel Atom Processor C Series
        • Intel Xeon Processor E5 v4 Family
      3/30/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      1799Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 17.4R1 - Authentec

      17.4R1 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7020)
        • Broadcom XLP832
        • Cavium Octeon III (CN7130)
        • Cavium Octeon II (CN6335)
      3/30/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-256
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4288, HMAC #3534
      • IKEv2:
        • Derived Keying Material length: 1136-2432
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 (bits)
            • SHA Functions: SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4288, HMAC #3534
      1798Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • Intel Atom
      3/23/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-224
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4283, HMAC #3529
      • IKEv2:
        • Derived Keying Material length: 1056-3072
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 (bits)
            • SHA Functions: SHA-1, SHA-256
        • Prerequisite: SHS #4283, HMAC #3529
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 (bits)
        • Prerequisite: AES #5333
      • SSH:
        • SHA Functions: SHA-1
        • Prerequisite: SHS #4283
      • TLS:
        • Supports TLS 1.0/1.1
        • Prerequisite: SHS #4283, HMAC #3529
      1797Cisco Systems, Inc
      170 W Tasman Drive
      San Jose, California 95134
      USA

      CLint Winebrenner
      cwinebre@cisco.com
      919.392.6250

      IOS Common Cryptographic Module (IC2M)

      Rel5 (Firmware)


      The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

        • Intel Atom
      3/23/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4283, ECDSA #1401, DRBG #2059
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4283, DRBG #2059
      1796Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      OpenSSL - EX4300

      Junos OS 17.4 R1 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

        • Freescale e500mc
      3/23/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4282
      1795BeyondTrust
      5090 N. 40th Street
      Suite 400
      Phoenix, AZ 85018
      USA

      David Allen
      dallen@beyondtrust.com
      1-800-234-9072, 9292

      BeyondTrust Cryptographic Library

      2.0.10


      BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

        • Intel Xeon w/ Windows Server 2012 R2 Standard
      3/23/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4279
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4279, HMAC #3525
      1794BeyondTrust
      5090 N. 40th Street
      Suite 400
      Phoenix, AZ 85018
      USA

      David Allen
      dallen@beyondtrust.com
      1-800-234-9072, 9292

      BeyondTrust Cryptographic Library

      2.0.10


      BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

        • Intel Xeon w/ Windows Server 2012 R2 Standard
      3/23/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4279, ECDSA #1399, DRBG #2057
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
        • Prerequisite: SHS #4279, DSA #1377, DRBG #2057
      1793Realia Technologies, S.L
      Infanta Mercedes 90, 4th floor
      Madrid, Madrid 28020
      Spain

      Jesus Rodriguez
      jrodriguez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Luis Jesus Hernandez
      ljhernandez@realsec.com
      +34 91 449 03 30
      Fax: +34 91 579 56 06

      Cryptosec Dekaton

      1.1


      The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

        • N/A
      3/23/2018
      • ECDSA SigGen:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2056
      1792
      3/23/2018
        1791
        3/23/2018
          1790Ruckus Networks, An ARRIS company
          350 W Java Drive
          Sunnyvale, CA 94089
          USA

          Abhi Maras
          (650) 265-4200
          Fax: (408) 738-2065

          Mukunda Chikkeralli
          +91 80 49134180

          Ruckus Smartzone SNMP Crypto Library

          1.0


          The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

            • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
            • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
          3/16/2018
          • SNMP:
          1789Digital Guardian, Inc.
          860 Winter Street
          Suite 3
          Waltham, MA 02541
          USA

          Craig Hansen
          201-572-3784

          FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

          1.1


          Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

            • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
          3/16/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1788Digi International, Inc.
          11001 Bren Road East
          Minnetonka, MN 55343
          USA

          Donald Schleede
          Donald.Scleede@digi.com
          952-912-3444

          Digi ConnectCore Security Module

          1.0


          The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

            • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
            • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
          3/16/2018
          • ECC CDH:
            • Primitive
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          1787Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x7416
          Fax: 613-225-9951

          Fortinet FortiMail SSL Cryptographic Library 6.0

          6.0 (Firmware)


          This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

            • Intel Xeon
          3/16/2018
          • SSH:
            • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4271
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4271, HMAC #3517
          1786Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x7416
          Fax: 613-225-9951

          Fortinet FortiMail SSL Cryptographic Library 6.0

          6.0 (Firmware)


          This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

            • Intel Xeon
          3/16/2018
          • KAS ECC:
            • Functions: Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4271, DRBG #2050
          • KAS FFC:
            • Functions: Partial Public Key Validation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4271, DRBG #2050
          1785Evertz Microsystems
          5292 John Lucas Dr.
          Burlington, Ontario L7L 5Z9
          Canada

          Naveed Afzal
          nafzal@evertz.com
          905-335-3700

          EXE OpenSSL Cryptographic Module

          2v0_b1 (Firmware)


          Card for 6RU Shelf loaded with Evertz IPX

            • MPC8377E
          3/16/2018
          • KAS ECC:
            • Functions: Key Pair Generation, Public Key Regeneration
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4220, ECDSA #1364, DRBG #2004
          1784Mojo Networks, Inc.
          339 N Bernardo Avenue, Suite 200
          Mountain View, CA 94043
          USA

          Hemant Chaskar
          hemant.chaskar@mojonetworks.com
          (650) 961-1111
          Fax: (650) 961-1169

          Crypto Core

          2.0.16-3-00 (Firmware)


          Cryptographic library offering various cryptographic mechanisms in server.

            • Intel Xeon
          3/16/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1783Mojo Networks, Inc.
          339 N Bernardo Avenue, Suite 200
          Mountain View, CA 94043
          USA

          Hemant Chaskar
          hemant.chaskar@mojonetworks.com
          (650) 961-1111
          Fax: (650) 961-1169

          Crypto Core

          2.0.16-3-00 (Firmware)


          Cryptographic library offering various cryptographic mechanisms in server.

            • Intel Xeon
          3/16/2018
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384
          1782Mojo Networks, Inc.
          339 N Bernardo Avenue, Suite 200
          Mountain View, CA 94043
          USA

          Hemant Chaskar
          hemant.chaskar@mojonetworks.com
          (650) 961-1111
          Fax: (650) 961-1169

          Crypto Core

          2.0.16-3-00 (Firmware)


          Cryptographic library offering various cryptographic mechanisms in server.

            • Intel Xeon
          3/16/2018
          • SNMP:
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384
            • Prerequisite: SHS #4270
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4270, HMAC #3516
          1781Microchip Technology
          1150 E. Cheyenne Mountain Blvd
          Colorado Springs, CO USA
          80906

          Jim Hallman
          jim.hallman@microchip.com
          (919) 846-3391

          ATECC608A

          ATECC608A rev 6001 (Firmware)


          The device is a member of the Microchip CryptoAuthentication family. It is a cryptographic Co-processor with secure hardware-based key storage used for secure authentication and product validation.

            • n/a
          3/16/2018
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
            • Prerequisite: SHS #4268, HMAC #3514
          1780Cisco Systems, Inc
          170 West Tasman Dr.
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          (919) 392-6520

          CiscoSSL FIPS Object Module

          7.0


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

            • Intel Pentium w/ Linux 3.4
            • Intel Core i5 w/ Windows 10
            • ARMv8 w/ iOS 11.2
            • ARMv8 w/ Android 7.1
            • Intel Core i5 w/ Windows 10 (with AES-NI)
            • Intel Core i7 w/ macOS 10.12 (with AES-NI)
            • Intel Core i7 w/ macOS 10.12 (without AES-NI)
            • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
            • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
            • Cavium Octeon II 68XX w/ Wind River Linux 4
          3/16/2018
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1
            • Prerequisite: SHS #4267, HMAC #3513
          • SNMP:
          • SRTP:
            • AES Key Lengths: 128, 192, 256 (bits)
            • Prerequisite: AES #5310
          • SSH:
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4267
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4267, HMAC #3513
          1779Cisco Systems, Inc
          170 West Tasman Dr.
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          (919) 392-6520

          CiscoSSL FIPS Object Module

          7.0


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

            • ARMv8 w/ Android 7.1
            • Intel Core i5 w/ Windows 10 (with AES-NI)
            • Intel Core i7 w/ macOS 10.12 (with AES-NI)
            • Intel Core i5 w/ Windows 10
            • Intel Pentium w/ Linux 3.4
            • ARMv8 w/ iOS 11.2
            • Intel Core i7 w/ macOS 10.12 (without AES-NI)
            • Cavium Octeon II 68XX w/ Wind River Linux 4
            • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
            • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
          3/16/2018
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384, P-521
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: AES #5310, AES #5310, SHS #4267, ECDSA #1395, DRBG #2048, HMAC #3513
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-256
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4267, DSA #1374, DRBG #2048
          1778Ruckus Networks, An ARRIS company
          350 W Java Drive
          Sunnyvale, CA 94089
          USA

          Abhi Maras
          (650) 265-4200
          Fax: (408) 738-2065

          Mukunda Chikkeralli
          +91 80 49134180

          Ruckus Smartzone SNMP Crypto Library

          1.0 (Firmware)


          The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

            • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
            • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
          3/16/2018
          • SNMP:
          1777Ruckus Networks, An ARRIS company
          350 W Java Drive
          Sunnyvale, CA 94089
          USA

          Abhi Maras
          (650) 265-4200
          Fax: (408) 738-2065

          Mukunda Chikkeralli
          +91 80 49134180

          Ruckus Access Point SNMP Crypto Library

          1.0 (Firmware)


          The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

            • Qualcomm IPQ8064
            • Qualcomm IPQ8068
            • Qualcomm IPQ8065
          3/16/2018
          • SNMP:
          1776Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

          10.0.15063.728


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
          3/16/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1775Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

          10.0.15063.728


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
          3/16/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1774Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Junos OS 17.4R1-S1 - Quicksec

          Junos OS 17.4R1-S1 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          3/16/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key
            • Pre-shared Key Length: 8-256
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4266, HMAC #3512
          • IKEv2:
            • Derived Keying Material length: 1136-2432
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4266, HMAC #3512
          1773Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Junos OS 17.4R1-S1 - Quicksec

          Junos OS 17.4R1-S1 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          3/16/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key
            • Pre-shared Key Length: 8-256
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4265, HMAC #3511
          • IKEv2:
            • Derived Keying Material length: 1136-2432
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4265, HMAC #3511
          1772Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Junos OS 17.4R1-S1 - Quicksec

          Junos OS 17.4R1-S1


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
          3/16/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key
            • Pre-shared Key Length: 8-256
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4264, HMAC #3510
          • IKEv2:
            • Derived Keying Material length: 1136-2432
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4264, HMAC #3510
          1771Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Junos OS 17.4R1-S1 - OpenSSH

          Junos OS 17.4R1-S1


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
          3/16/2018
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384
            • Prerequisite: SHS #4263
          1770Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Junos OS 17.4R1-S1 - OpenSSH

          Junos OS 17.4R1-S1 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          3/16/2018
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4262
          1769Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Junos OS 17.4R1-S1 - OpenSSH

          Junos OS 17.4R1-S1 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          3/16/2018
          • SSH:
            • SHA Functions: SHA-1, SHA-256, SHA-384
            • Prerequisite: SHS #4261
          1768Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Patrick Scully
          613-670-3207

          Ciena Waveserver

          1.5.1 (Firmware)


          The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

            • Xilinx XC7Z030
          3/9/2018
          • IKEv2:
            • Derived Keying Material length: 1056-2432
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 224 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256, SHA-384
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4254, HMAC #3500
          1767Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

          10.0.15063.728


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
          3/9/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1766Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

          10.0.15063.728


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
          3/9/2018
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #2037
          1765Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

          10.0.15063.728


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
          3/9/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1764Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

          10.0.15063.728


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
          3/9/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4253, HMAC #3499
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4253, HMAC #3499
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4253, HMAC #3499
          1763Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); BcryptPrimitives and NCryptSSLp

          10.0.14393.1770


          The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
            • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
            • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
          3/9/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4250, HMAC #3497
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4250, HMAC #3497
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4250, HMAC #3497
          1762Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); Cryptography Next Generation (CNG) Implementations

          10.0.14393.1770


          The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
            • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
            • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
          3/9/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1761Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

          10.0.14393.1770


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
            • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
            • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
          3/9/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1760Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

          10.0.14393.1770


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
            • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
            • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
            • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
            • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
            • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
          3/9/2018
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #2036
          1759Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

          10.0.10240.17643


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
          3/9/2018
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #2035
          1758Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Enterprise LTSB (version 1507); Cryptography Next Generation (CNG) Implementations

          10.0.10240.17643


          The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
          3/9/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1757Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Enterprise LTSB (version 1507); BcryptPrimitives and NCryptSSLp

          10.0.10240.17643


          The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
          3/9/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4248, HMAC #3496
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4248, HMAC #3496
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4248, HMAC #3496
          1756Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

          10.0.10240.17643


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
          3/9/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1755Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); Cryptography Next Generation (CNG) Implementations

          10.0.10586.1176


          The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
            • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
            • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
          3/9/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1754Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); BcryptPrimitives and NCryptSSLp

          10.0.10586.1176


          The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
            • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
            • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
            • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
          3/9/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
            • Pre-shared Key Length: 64-2048
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4246, HMAC #3494
          • IKEv2:
            • Derived Keying Material length: 192-1792
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4246, HMAC #3494
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4246, HMAC #3494
          1753Google, Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Adam Langley
          security@chromium.org

          BoringCrypto

          ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


          A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

            • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
          3/9/2018
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4247, HMAC #3495
          1752Google, Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Adam Langley
          security@chromium.org

          BoringCrypto

          ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


          A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

            • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
          3/9/2018
          • ECDSA SigGen:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #2034
          1751Google, Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Adam Langley
          security@chromium.org

          BoringCrypto

          ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


          A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

            • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
          3/9/2018
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EB:
                    • Curve: P-224
                    • SHA: SHA-224
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4247, ECDSA #1382, DRBG #2034
          1750Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

          10.0.10586.1176


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
            • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
            • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
            • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
          3/9/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1749Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

          10.0.10586.1176


          The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
            • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
            • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
            • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
            • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
            • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
            • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
            • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
          3/9/2018
          • ECDSA SigGen:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
            • P-521 SHA: SHA-512
            • Prerequisite: DRBG #2033
          1748Docker, Inc.
          144 Townsend Street
          San Francisco, California 94107
          USA

          Rahim Ibrahim
          security-team@docker.com
          415-941-0376

          Docker Enterprise Edition Crypto Library v 1.0

          1.0


          The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

            • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
          3/9/2018
          • ECC CDH:
            • Primitive
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          1747Docker, Inc.
          144 Townsend Street
          San Francisco, California 94107
          USA

          Rahim Ibrahim
          security-team@docker.com
          415-941-0376

          Docker Enterprise Edition Crypto Library v 1.0

          1.0


          The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

            • Dual Intel E5-2670v3 w/ CentOS v7.3
          3/9/2018
          • ECC CDH:
            • Primitive
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          1746DocuSign, Inc.
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          Ezer.Farhi@docusign.com
          +972-39279529
          Fax: +972-39230864

          Moshe Harel
          Moshe.Harel@docusign.com
          +972-39279578
          Fax: +972-39230864

          PrivateServer-OpenSSL

          5.0.3 (Firmware)


          PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

            • Intel® E3-1268LV3 Quad-Core
          3/9/2018
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256
            • Prerequisite: SHS #4243, HMAC #3491
          1745DocuSign, Inc.
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          Ezer.Farhi@docusign.com
          +972-39279529
          Fax: +972-39230864

          Moshe Harel
          Moshe.Harel@docusign.com
          +972-39279578
          Fax: +972-39230864

          PrivateServer

          5.0.3 (Firmware)


          PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

            • Intel® E3-1268LV3 Quad-Core
          3/9/2018
          • ECDSA SigGen:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: RNG #2030
          1744Apple Inc.
          1 Infinite Loop
          Cupertino, CA 95014
          USA

          Shawn Geddis
          geddis@apple.com
          (669)227-3579
          Fax: (866)315-1954

          Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

          8.0


          Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

            • intel i7 w/ macOS 10.13
          3/2/2018
          • ECDSA SigGen:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #1885
          1743Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          George Guo
          george.guo@oracle.com
          (781) 538-7399

          Chris Marks
          chris.marks@oracle.com
          (650) 506-0391

          Oracle Acme Packet Mocana Cryptographic Library

          ECz 8.0.0 (Firmware)


          The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Atom C2358
            • Intel Xeon D-1548 (Intel Broadwell-DE)
          3/2/2018
          • IKEv1:
            • Methods: Pre-shared Key
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4239, HMAC #3844
          • SSH:
            • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4239
          1742Splunk, Inc.
          270 Brannan Street
          San Francisco, CA 94107
          USA

          Michael Arrowsmith
          415-848-8400

          Splunk Cryptographic Module

          2.0.16


          The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

            • Intel Xeon E5 without PAA w/ Ubuntu 16.04
            • Intel Xeon E5 with PAA w/ Ubuntu 16.04
          2/23/2018
          • ECC CDH:
            • Primitive
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          1741Cisco Systems, Inc.
          170 West Tasman Dr.
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          (919) 392-6520

          CiscoSSL with FOM 6.0

          6.0


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

            • Intel Xeon w/ ADE-OS v3.0
          2/23/2018
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384, P-521
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
          1740Cisco Systems, Inc.
          170 West Tasman Dr.
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          (919) 392-6520

          CiscoSSL with FOM 6.0

          6.0


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

            • Intel Xeon w/ ADE-OS v3.0
          2/23/2018
          • IKEv2:
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1
            • Prerequisite: SHS #4237, HMAC #3486
          • SNMP:
          • SRTP:
            • AES Key Lengths: 128, 192, 256 (bits)
            • Prerequisite: AES #5267
          • SSH:
            • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4237
          • TLS:
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4237, HMAC #3486
          1739Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS OpenSSL Module

          ArubaOS 6.5.1 (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • NXP QorIQ T1024
            • Qualcomm IPQ8064
            • Qualcomm IPQ4029
          2/23/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1738Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS OpenSSL Module

          ArubaOS 6.5.1 (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • Qualcomm IPQ8064
            • Qualcomm IPQ4029
            • NXP QorIQ T1024
          2/23/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key
            • Pre-shared Key Length: 48-384
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4236, HMAC #3485
          • SNMP:
          • SSH:
            • SHA Functions: SHA-1
            • Prerequisite: SHS #4236
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #4236, HMAC #3485
          1737Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          ArubaOS 6.5.1 (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • NXP QorIQ T1024
            • Qualcomm IPQ8064
            • Qualcomm IPQ4029
          2/23/2018
          • RSASP1:
            • Modulus Size: 2048 (bits)
            • Padding Algorithms: PKCS 1.5
          1736Aruba, a Hewlett Packard Enterprise company
          3333 Scott Blvd
          Santa Clara, CA 95054
          USA

          Steve Weingart
          steve.weingart@hpe.com
          512-319-2480

          ArubaOS Crypto Module

          ArubaOS 6.5.1 (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • Qualcomm IPQ4029
            • Qualcomm IPQ8064
            • NXP QorIQ T1024
          2/23/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key
            • Pre-shared Key Length: 48-384
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4235, HMAC #3484
          • IKEv2:
            • Derived Keying Material length: 1120-2688
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 256 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 384 (bits)
                • SHA Functions: SHA-256
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-384
            • Prerequisite: SHS #4235, HMAC #3484
          1735IBM Corporation
          1787 Sentry Pkwy West
          Building 18, Suite 200
          Blue Bell, PA 19422
          USA

          Sandeep Singhal
          Sandeep.Singhal1@ibm.com
          215-664-1614

          OpenSSL [1] with the OpenSSL FIPS Object Module [2]

          1.0.2n [1]; 2.0.13 [2]


          The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

            • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
          2/23/2018
          • KAS ECC:
            • Functions: Partial Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4234, ECDSA #1373, DRBG #2016
          • KAS FFC:
            • Functions: Partial Public Key Validation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: DSA #1364, DRBG #2016
          1734Hangzhou Hikvision Digital Technology Co., Ltd.
          No.555 Qianmo Road, Binjiang District
          Hangzhou, Zhejiang 310052
          China

          Jiadong Chen
          chenjiadong@hikvision.com
          +86 136 5663 1443

          HikSSL Library

          1.0.0


          The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

            • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
          2/23/2018
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4233, HMAC #3482
          1733Hangzhou Hikvision Digital Technology Co., Ltd.
          No.555 Qianmo Road, Binjiang District
          Hangzhou, Zhejiang 310052
          China

          Jiadong Chen
          chenjiadong@hikvision.com
          +86 136 5663 1443

          HikSSL Library

          1.0.0


          The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

            • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
          2/23/2018
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384, P-521
          • KAS ECC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4233, ECDSA #1372, DRBG #2015
          • KAS FFC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-224
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4233, DSA #1363, DRBG #2015
          1732Hangzhou Hikvision Digital Technology Co., Ltd.
          No.555 Qianmo Road, Binjiang District
          Hangzhou, Zhejiang 310052
          China

          Jiadong Chen
          chenjiadong@hikvision.com
          +86 136 5663 1443

          HikSSL Library

          1.0.0


          The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

            • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
          2/23/2018
          • TLS:
            • Supports TLS 1.0/1.1
            • Supports TLS 1.2:
              • SHA Functions: SHA-256, SHA-384
            • Prerequisite: SHS #4232, HMAC #3481
          1731Hangzhou Hikvision Digital Technology Co., Ltd.
          No.555 Qianmo Road, Binjiang District
          Hangzhou, Zhejiang 310052
          China

          Jiadong Chen
          chenjiadong@hikvision.com
          +86 136 5663 1443

          HikSSL Library

          1.0.0


          The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

            • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
          2/23/2018
          • ECC CDH:
            • Primitive
            • Curves: P-256, P-384, P-521
          • KAS ECC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4232, ECDSA #1371, DRBG #2012
          • KAS FFC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-224
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4232, DSA #1362, DRBG #2012
          1730Cisco Systems, Inc
          170 W Tasman Drive
          San Jose, California 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          IOS Common Cryptographic Module (IC2M)

          Rel5 (Firmware)


          The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

            • ARMv8
          2/23/2018
          • IKEv1:
            • Methods: Digital Signature, Pre-shared Key
            • Pre-shared Key Length: 8-224
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4231, HMAC #3480
          • IKEv2:
            • Derived Keying Material length: 1056-3072
            • Diffie-Hellman shared secrets:
              • Diffie-Hellman shared secret:
                • Length: 2048 (bits)
                • SHA Functions: SHA-1, SHA-256
            • Prerequisite: SHS #4231, HMAC #3480
          • SNMP:
          • SRTP:
            • AES Key Lengths: 128, 192, 256 (bits)
            • Prerequisite: AES #5258
          • SSH:
            • SHA Functions: SHA-1
            • Prerequisite: SHS #4231
          • TLS:
            • Supports TLS 1.0/1.1
            • Prerequisite: SHS #4231, HMAC #3480
          1729Cisco Systems, Inc
          170 W Tasman Drive
          San Jose, California 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          IOS Common Cryptographic Module (IC2M)

          Rel5 (Firmware)


          The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

            • ARMv8
          2/23/2018
          • KAS ECC:
            • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
            • Prerequisite: SHS #4231, ECDSA #1370, DRBG #2011
          • KAS FFC:
            • Functions: Full Public Key Validation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4231, DRBG #2011
          1728Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Chris Marks
          seceval_us@oracle.com
          650-506-0391

          Cavium Nitrox PX1620

          PX1620


          The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

            • N/A
          2/23/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1727Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Chris Marks
          seceval_us@oracle.com
          650-506-0391

          Cavium Octeon CN 6880

          CN 6880


          The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

            • N/A
          2/23/2018
          • SRTP:
            • AES Key Lengths: 128 (bits)
            • Prerequisite: AES #5256
          1726Samsung Electronics Co., Ltd
          416 Maetan-3dong, Yeongtong-gu
          Suwon, Gyeonggi 152-848
          South Korea

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung BoringSSL Cryptographic Module

          v1.2


          The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

            • Samsung Electronics Exynos7570 w/ Android 8.0
            • Qualcomm MSM8996 w/ Android 8.0
            • Qualcomm SDM845 w/ Android 8.0
            • Samsung Electronics Exynos9810 w/ Android 8.0
            • Samsung Electronics Exynos8895 w/ Android 8.0
            • Samsung Electronics Exynos8890 w/ Android 8.0
            • Qualcomm MSM8998 w/ Android 8.0
            • Samsung Electronics Exynos7883 w/ Android 8.0
            • Samsung Electronics Exynos7884 w/ Android 8.0
          2/16/2018
          • RSADP:
            • Modulus Size: 2048 (bits)
          1725Samsung Electronics Co., Ltd
          416 Maetan-3dong, Yeongtong-gu
          Suwon, Gyeonggi 152-848
          South Korea

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung BoringSSL Cryptographic Module

          v1.2


          The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

            • Samsung Electronics Exynos7883 w/ Android 8.0
            • Qualcomm MSM8998 w/ Android 8.0
            • Qualcomm MSM8996 w/ Android 8.0
            • Qualcomm SDM845 w/ Android 8.0
            • Samsung Electronics Exynos8890 w/ Android 8.0
            • Samsung Electronics Exynos9810 w/ Android 8.0
            • Samsung Electronics Exynos8895 w/ Android 8.0
            • Samsung Electronics Exynos7570 w/ Android 8.0
            • Samsung Electronics Exynos7884 w/ Android 8.0
          2/16/2018
          • ECC CDH:
            • Primitive
            • Curves: P-224, P-256, P-384, P-521
          • KAS ECC:
            • Functions: Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator
                • Parameter Sets:
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-384
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4230, ECDSA #1369, DRBG #2010
          • KAS FFC:
            • Functions: Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-256
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4230, DSA #1361, DRBG #2010
          1724Mocana Corporation
          150 Mathilda Place
          Suite 208
          Sunnyvale, CA 94086
          USA

          Srinivas Kumar
          fips@mocana.com
          1-415-617-0055
          Fax: 1-415-617-0056

          Mocana Cryptographic Library

          6.5.1f


          The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

            • Intel Atom E3800 w/ Wind River Linux 6.0
          2/16/2018
          • ECDSA SigGen:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: DRBG #2009
          1723Mocana Corporation
          150 Mathilda Place
          Suite 208
          Sunnyvale, CA 94086
          USA

          Srinivas Kumar
          fips@mocana.com
          1-415-617-0055
          Fax: 1-415-617-0056

          Mocana Cryptographic Library

          6.5.1f


          The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

            • Intel Atom E3800 w/ Wind River Linux 6.0
          2/16/2018
          • KAS ECC:
            • Functions: Domain Parameter Generation, Key Pair Generation
            • Schemes:
              • Ephemeral Unified:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • EB:
                    • Curve: P-224
                    • SHA: SHA-256
                  • EC:
                    • Curve: P-256
                    • SHA: SHA-256
                  • ED:
                    • Curve: P-384
                    • SHA: SHA-512
                  • EE:
                    • Curve: P-521
                    • SHA: SHA-512
            • Prerequisite: SHS #4229, ECDSA #1368, DRBG #2009
          • KAS FFC:
            • Functions: Domain Parameter Generation, Key Pair Generation
            • Schemes:
              • dhEphem:
                • Key Agreement Roles: Initiator, Responder
                • Parameter Sets:
                  • FB:
                    • SHA: SHA-256
                  • FC:
                    • SHA: SHA-256
            • Prerequisite: SHS #4229, DSA #1360, DRBG #2009
          1722
          2/16/2018
            1721Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Chris Marks
            seceval_us@oracle.com
            650-506-0391

            Oracle Acme Packet Mocana Cryptographic Library

            ECz8.0.0 (Firmware)


            The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

              • Intel Core i7
              • Intel Core i3
            2/16/2018
            • IKEv1:
              • Methods: Pre-shared Key
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4226, HMAC #3475
            • SSH:
              • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4226
            1720Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Chris Marks
            seceval_us@oracle.com
            650-506-0391

            Oracle Acme Packet Cryptographic Library

            ECz8.0.0 (Firmware)


            The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

              • Intel Core i3
              • Intel Core i7
            2/16/2018
            • SNMP:
            • SRTP:
              • AES Key Lengths: 128 (bits)
              • Prerequisite: AES #5247
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4225, HMAC #3474
            1719Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            George Guo
            george.guo@oracle.com
            (781) 538-7399

            Chris Marks
            chris.marks@oracle.com
            (650) 506-0391

            Oracle Acme Packet Mocana Cryptographic Library

            ECz 8.0.0


            The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
            2/16/2018
            • IKEv1:
              • Methods: Pre-shared Key
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4224, HMAC #3473
            • SSH:
              • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4224
            1718Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSH Server/Client

            6.0


            SP 800-135 KDF for Intel x86 64-bit

              • Intel(R) Xeon(R) CPU E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
            2/16/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4193
            1717Gemalto
            Avenue du Jujubier
            Z.I Athelia IV
            La Ciotat, 13705
            France

            Frederic Garnier
            Frederic.Garnier@gemalto.com
            +33 442364368
            Fax: +33 442366953

            Didier Bonnet
            Didier.Bonnet@gemalto.com
            +33 442366803
            Fax: +33 442365545

            Gemalto Cryptographic library for IDCore 3130 on SLE78

            Infineon SLE78CLFX400VPHM 1.9 (Firmware)


            IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

              • Infineon SLE78 chip (M7892)
            2/16/2018
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1716Gemalto
            Avenue du Jujubier
            Z.I Athelia IV
            La Ciotat, 13705
            France

            Frederic Garnier
            Frederic.Garnier@gemalto.com
            +33 442364368
            Fax: +33 442366953

            Didier Bonnet
            Didier.Bonnet@gemalto.com
            +33 442366803
            Fax: +33 442365545

            Gemalto Cryptographic library for IDCore 3130 on SLE78

            Infineon SLE78CLFX400VPHM 1.9 (Firmware)


            IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

              • Infineon SLE78 chip (M7892)
            2/16/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1715Gemalto
            Avenue du Jujubier
            Z.I Athelia IV
            La Ciotat, 13705
            France

            Frederic Garnier
            Frederic.Garnier@gemalto.com
            +33 442364368
            Fax: +33 442366953

            Didier Bonnet
            Didier.Bonnet@gemalto.com
            +33 442366803
            Fax: +33 442365545

            Gemalto Cryptographic library for IDCore 3130 on SLE78

            Infineon SLE78CLFX400VPHM 1.9 (Firmware)


            IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

              • Infineon SLE78 chip (M7892)
            2/16/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1714Gemalto
            Avenue du Jujubier
            Z.I Athelia IV
            La Ciotat, 13705
            France

            Frederic Garnier
            Frederic.Garnier@gemalto.com
            +33 442364368
            Fax: +33 442366953

            Didier Bonnet
            Didier.Bonnet@gemalto.com
            +33 442366803
            Fax: +33 442365545

            Gemalto Cryptographic library for IDCore 3130 on SLE78

            Infineon SLE78CLFX400VPHM 1.9 (Firmware)


            IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

              • Infineon SLE78 chip (M7892)
            2/16/2018
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1713Gemalto
            Avenue du Jujubier
            Z.I Athelia IV
            La Ciotat, 13705
            France

            Frederic Garnier
            Frederic.Garnier@gemalto.com
            +33 442364368
            Fax: +33 442366953

            Didier Bonnet
            Didier.Bonnet@gemalto.com
            +33 442366803
            Fax: +33 442365545

            Gemalto Cryptographic library for IDCore 3130 on SLE78

            Infineon SLE78CLFX400VPHM 1.9 (Firmware)


            IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

              • Infineon SLE78 chip (M7892)
            2/16/2018
            • ECC CDH:
              • Primitive
              • Curves: P-224, P-256, P-384, P-521
            1712Gallagher Group
            181 Kahikatea Drive
            Hamilton 3206
            New Zealand

            Andrew Scothern
            andrew.scothern@gallagher.com
            +64-7-838-9800

            Simon Lawrence
            simon.lawrence@gallagher.com
            +64-7-838-9800

            Gallagher OpenSSL Cryptographic Module

            2.0.12


            Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

              • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
            2/9/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1711Silver Spring Networks
            230 W Tasman Drive
            San Jose, CA 95134
            USA

            Andrew Pendray
            support@ssni.com
            +1 669 770 4000
            Fax: +1 886 776 0015

            Silver Spring Networks Endpoint Security Module

            130-0117-03 82136; 1.00 (Firmware)


            Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

              • ESM instruction manager processor
            2/9/2018
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1710Silver Spring Networks
            230 W Tasman Drive
            San Jose, CA 95134
            USA

            Andrew Pendray
            support@ssni.com
            +1 669 770 4000
            Fax: +1 886 776 0015

            Silver Spring Networks Endpoint Security Module

            130-0117-03 82136; 1.00 (Firmware)


            Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

              • ESM instruction manager processor
            2/9/2018
            • ANS 9.63:
              • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4148
            • IKEv1:
              • Methods: Digital Signature
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 (bits)
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 (bits)
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-256
              • Prerequisite: SHS #4148, HMAC #3402
            • IKEv2:
              • Derived Keying Material length: 160-512
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 (bits)
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 (bits)
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-256
              • Prerequisite: SHS #4148, HMAC #3402
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4148, HMAC #3402
            1709Silver Spring Networks
            230 W Tasman Drive
            San Jose, CA 95134
            USA

            Andrew Pendray
            support@ssni.com
            +1 669 770 4000
            Fax: +1 886 776 0015

            Silver Spring Networks Endpoint Security Module

            130-0117-03 82136; 1.00 (Firmware)


            Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

              • ESM instruction manager processor
            2/9/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            • KAS FFC:
              • Functions: Key Pair Generation, Public Key Regeneration
              • Schemes:
                • dhHybrid1:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
                • dhHybrid1Flow:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
                • dhOneFlow:
                  • Key Agreement Roles: Initiator, Responder
                • dhStatic:
                  • Key Agreement Roles: Initiator, Responder
              • Prerequisite: SHS #4148, DSA #1359, DRBG #1906
            1708Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            George Guo
            george.guo@oracle.com
            (781) 538-7399

            Chris Marks
            chris.marks@oracle.com
            (650) 506-0391

            Oracle Acme Packet Cryptographic Library

            E-CZ 8.0.0


            The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
            2/9/2018
            • SNMP:
            • SRTP:
              • AES Key Lengths: 128 (bits)
              • Prerequisite: AES #5236
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4216, HMAC #3468
            1707Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            George Guo
            george.guo@oracle.com
            (781) 538-7399

            Chris Marks
            chris.marks@oracle.com
            (650) 506-0391

            Oracle Acme Packet Cryptographic Library

            E-CZ 8.0.0 (Firmware)


            The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Xeon D-1548 (Intel Broadwell-DE)
              • Intel Atom C2358
            2/9/2018
            • SNMP:
            • SRTP:
              • AES Key Lengths: 128 (bits)
              • Prerequisite: AES #5235
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4215, HMAC #3467
            1706Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder® FIPS Core

            6.3.0


            Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

              • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
              • Intel Atom C3558 with AES-NI w/ QNX SDP 7
              • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
              • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
              • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
              • Intel Atom C3558 without AES-NI w/ QNX SDP 7
              • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
            2/9/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1705Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder® FIPS Core

            6.3.0


            Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

              • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
              • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
              • Intel Atom C3558 with AES-NI w/ QNX SDP 7
              • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
              • Intel Atom C3558 without AES-NI w/ QNX SDP 7
              • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
              • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
            2/9/2018
            • ANS 9.63:
              • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4210
            1704Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder® FIPS Core

            6.3.0


            Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

              • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
              • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
              • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
              • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
              • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
              • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
              • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
              • Intel Atom C3558 without AES-NI w/ QNX SDP 7
              • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
              • Intel Atom C3558 with AES-NI w/ QNX SDP 7
            2/9/2018
            • ECC CDH:
              • Primitive
              • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1703IBM Corporation
            222 South Riverside Plaza
            Ste 1700
            Chicago, IL 60606
            USA

            Mark Seaborn
            mseaborn@us.ibm.com
            +1 312 423 6640x2354

            IBM Cloud Object Storage System's™ FIPS Cryptographic Module

            1.1


            The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

              • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
              • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
            2/9/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1702Aruba, a Hewlett Packard Enterprise company
            3333 Scott Blvd
            Santa Clara, CA 95054
            USA

            Steve Weingart
            steve.weingart@hpe.com
            512-319-2480

            libancrypto.so

            1.0.0


            The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

              • Intel Core i7 w/ Linux 2.6 64-bit
            2/9/2018
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1701Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (no AVX2, x86_64, 32-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4207, HMAC #3459
            1700Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (no AVX2, x86_64, 32-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4207, ECDSA #1353, DRBG #1993
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4207, DSA #1350, DRBG #1993
            1699Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple S3 w/ watchOS 4
            2/9/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1988
            1698Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple S3 w/ watchOS 4
            2/9/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4204, ECDSA #1352, DRBG #1988, HMAC #3456
            1697Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple S1P w/ watchOS 4
            2/9/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1987
            1696Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple S1P w/ watchOS 4
            2/9/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4703, ECDSA #1351, DRBG #1987, HMAC #3455
            1695Cisco Systems, Inc
            170 W Tasman Drive
            San Jose, California 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            IOS Common Cryptographic Module (IC2M)

            Rel 5 (Firmware)


            The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

              • Intel Atom
              • Intel Xeon
              • MIPS64
              • Intel Xeon on ESXi 5.5
            2/9/2018
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #3760, ECDSA #1241, DRBG #1529
            • KAS FFC:
              • Functions: Full Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3760, DRBG #1529
            1694Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (no AVX2, x86_64, 64-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4202, HMAC #3454
            1693Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (no AVX2, x86_64, 64-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • KAS ECC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4202, ECDSA #1350, DRBG #1984
            • KAS FFC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4202, DSA #1349, DRBG #1984
            1692Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4199, HMAC #3451
            1691Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4198, HMAC #3450
            1690Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (Full CPU set, x86_64, 32-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4194, HMAC #3446
            1689Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (Full CPU set, x86_64, 32-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/9/2018
            • KAS ECC:
              • Functions: Full Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4194, ECDSA #1348, DRBG #1976
            • KAS FFC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4194, DSA #1347, DRBG #1976
            1688Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (Full CPU set, x86_64, 64-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/2/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4193, HMAC #3445
            1687Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            fips140@redhat.com

            OpenSSL (Full CPU set, x86_64, 64-bit library)

            6.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
            2/2/2018
            • KAS ECC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4193, ECDSA #1347, DRBG #1975
            • KAS FFC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4193, DSA #1346, DRBG #1975
            1686Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
            2/2/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1972
            1685Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
            2/2/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4191, ECDSA #1346, DRBG #1972, HMAC #3443
            1684Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
            2/2/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1959
            1683Centrify Corporation
            3300 Tannery Way
            Santa Clara, California 95054
            USA

            Kitty Shih
            kitty.shih@centrify.com
            669-444-5238

            Centrify Cryptographic Library

            2.1


            Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

              • Intel Xeon X5650 x86_64 w/ RHEL 7.2
            2/2/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1682Samsung Electronics Co., Ltd
            416 Maetan-3dong, Yeongtong-gu
            Suwon, Gyeonggi 152-848
            South Korea

            Brian Wood
            be.wood@samsung.com
            +1-973-440-9125

            Jung Ha Paik
            jungha.paik@samsung.com
            +82-10-8861-0858

            Samsung SCrypto Library

            v2.2


            Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

              • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
            2/2/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1681Samsung Electronics Co., Ltd
            416 Maetan-3dong, Yeongtong-gu
            Suwon, Gyeonggi 152-848
            South Korea

            Brian Wood
            be.wood@samsung.com
            +1-973-440-9125

            Jung Ha Paik
            jungha.paik@samsung.com
            +82-10-8861-0858

            Samsung SCrypto Library

            v2.2


            Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

              • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
              • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
              • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
            2/2/2018
            • ECC CDH:
              • Primitive
              • Curves: P-224, P-256, P-384, P-521
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4184, ECDSA #1343, DRBG #1955
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4184, DSA #1344, DRBG #1955
            1680Datrium
            385 Moffett Park Dr #205
            Sunnyvale, CA 94089
            USA

            R. Hugo Patterson
            info@datrium.com
            +1 (669) 721-9444

            Datrium FIPS Object Module

            2.0.12


            The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

              • Intel Xeon E5-2618L v4 w/ Linux 3.10
              • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
              • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
            1/26/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1679Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

              • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
            1/26/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1951
            1678Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

              • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
            1/26/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4180, ECDSA #1341, DRBG #1951, HMAC #3432
            1677SafeLogic, Inc.
            530 Lytton Ave
            Suite 200
            Palo Alto, CA 94301
            USA

            SafeLogic Sales
            sales@safelogic.com

            CryptoComply® Server

            2.1


            CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

              • Intel i7 w/ Windows Server 2012 R2
            1/26/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1676Forcepoint
            10900-A Stonelake Blvd.
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW FIPS Object Module

            2.0.14


            Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

              • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
              • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
              • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
              • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
              • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
            1/26/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4175, ECDSA #1339, DRBG #1946
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4175, DSA #1340, DRBG #1946
            1675Forcepoint
            10900-A Stonelake Blvd.
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW FIPS Object Module

            2.0.13


            Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
            1/26/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4174, ECDSA #1338, DRBG #1945
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4174, DSA #1339, DRBG #1945
            1674Forcepoint
            10900-A Stonelake Blvd.
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW FIPS Java API

            1.0.0


            Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

              • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
            1/26/2018
            • IKEv2:
              • Derived Keying Material length: 1056-3072
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4173, HMAC #3427
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4173
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4173, HMAC #3427
            1673Mojo Networks, Inc.
            339 N Bernardo Avenue, Suite 200
            Mountain View, CA 94043
            USA

            Hemant Chaskar
            hemant.chaskar@mojonetworks.com
            (650) 961-1111
            Fax: (650) 961-1169

            Crypto Core

            2.0.16-1-01 (Firmware)


            Cryptographic library offering various cryptographic mechanisms in sensor and access point.

              • ARMv7
            1/26/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256
            1672Mojo Networks, Inc.
            339 N Bernardo Avenue, Suite 200
            Mountain View, CA 94043
            USA

            Hemant Chaskar
            hemant.chaskar@mojonetworks.com
            (650) 961-1111
            Fax: (650) 961-1169

            Crypto Core

            2.0.16-1-01 (Firmware)


            Cryptographic library offering various cryptographic mechanisms in sensor and access point.

              • ARMv7
            1/26/2018
            • SSH:
              • SHA Functions: SHA-1
              • Prerequisite: SHS #4165
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-384
              • Prerequisite: SHS #4165, HMAC #3419
            1671Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A7 w/ iOS 11 Fusion
            1/26/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1935
            1670Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A7 w/ iOS 11 Fusion
            1/26/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4164, ECDSA #1335, DRBG #1935, HMAC #3418
            1669Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A11 Bionic w/ iOS 11
            1/26/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1934
            1668Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A11 Bionic w/ iOS 11
            1/26/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4163, ECDSA #1334, DRBG #1934, HMAC #3417
            1667Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A10 Fusion w/ iOS 11
            1/26/2018
            • ECDSA SigGen:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1933
            1666Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A10 Fusion w/ iOS 11
            1/26/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4162, ECDSA #1333, DRBG #1933, HMAC #3416
            1665Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A9X w/ iOS 11
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1932
            1664Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A9X w/ iOS 11
            1/19/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4161, ECDSA #1332, DRBG #1932
            1663Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A9 w/ iOS 11
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1931
            1662Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A9 w/ iOS 11
            1/19/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4160, ECDSA #1331, DRBG #1931, HMAC #3414
            1661Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A8X w/ iOS 11
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1930
            1660Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A8X w/ iOS 11
            1/19/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4159, ECDSA #1330, DRBG #1930, HMAC #3413
            1659Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A7 w/ iOS 11
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1929
            1658Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A7 w/ iOS 11
            1/19/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4158, ECDSA #1329, DRBG #1929, HMAC #3412
            1657Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A8 w/ iOS 11
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1928
            1656Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

              • Apple A8 w/ iOS 11
            1/19/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4157, ECDSA #1328, DRBG #1928, HMAC #3411
            1655Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A10X w/ tvOS 11 Fusion
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1925
            1654Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A10X w/ tvOS 11 Fusion
            1/19/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4155, ECDSA #1327, DRBG #1925, HMAC #3409
            1653Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

              • Apple S3 w/ watchOS 4
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1918
            1652Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

              • Apple S1P w/ watchOS 4
            1/19/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1917
            1651GDC Technology (USA) LLC
            1016 West Magnolia Boulevard
            Burbank, California 91506
            USA

            Pranay Kumar
            pranay@gdc-tech.com
            (852) 2507 9565
            Fax: (852) 2579 1131

            ChernYue Kwok
            Chernyue.kwok@gdc-tech.com
            (852) 2507 9552
            Fax: (852) 2579 1131

            Standalone IMB Cryptographic Module

            2.0.11 (Firmware)


            A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

              • Xilinx Zynq Ultrascale+
            1/19/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1650GDC Technology (USA) LLC
            1016 West Magnolia Boulevard
            Burbank, California 91506
            USA

            Pranay Kumar
            pranay@gdc-tech.com
            (852) 2507 9565
            Fax: (852) 2579 1131

            ChernYue Kwok
            Chernyue.kwok@gdc-tech.com
            (852) 2507 9552
            Fax: (852) 2579 1131

            Standalone IMB Cryptographic Module

            2.0.11 (Firmware)


            A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

              • Xilinx Zynq Ultrascale+
            1/19/2018
            • TLS:
              • Supports TLS 1.0/1.1
            1649Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Timothy McDonough
            timothy.mcdonough@hpe.com

            Hewlett Packard Enterpprise SSL Crypto Module

            2.1


            Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

              • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
            1/12/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1648Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (650) 265-4200
            Fax: (408) 738-2065

            Mukunda Chikkeralli
            +91 80 49134180

            Ruckus Smartzone SSL Crypto Library

            1.0


            The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

              • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
              • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
            1/12/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4146
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4146, HMAC #3400
            1647Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (650) 265-4200
            Fax: (408) 738-2065

            Mukunda Chikkeralli
            +91 80 49134180

            Ruckus Smartzone SSL Crypto Library

            1.0 (Firmware)


            The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

              • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
              • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
            1/12/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4145
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4145, HMAC #3399
            1646Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (650) 265-4200
            Fax: (408) 738-2065

            Mukunda Chikkeralli
            +91 80 49134180

            Ruckus Access Point SSL Crypto Library

            1.0 (Firmware)


            The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

              • Qualcomm IPQ8068
              • Qualcomm IPQ8064
              • Qualcomm IPQ8065
            1/12/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4144
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4144, HMAC #3398
            1645Ruckus Wireless, Inc.
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Suneetha Sarala
            Suneetha.Sarala@arris.com
            650-265-4200

            Julie Lu
            Julie.Lu@arris.com
            650-265-4200

            BRCD-IP-CRYPTO-VER-4.0

            BRCD-IP-CRYPTO-VER-4.0 (Firmware)


            Firmware algorithm for the Brocade FastIron Series

              • Freescale P2041
            1/12/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256, SHA-384
              • Prerequisite: SHS #4083, DSA #1320, DRBG #1839
            1644Ruckus Wireless, Inc.
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Suneetha Sarala
            Suneetha.Sarala@arris.com
            650-265-4200

            Julie Lu
            Julie.Lu@arris.com
            650-265-4200

            BRCD-IP-CRYPTO-VER-4.0

            BRCD-IP-CRYPTO-VER-4.0 (Firmware)


            Firmware algorithm for the Brocade FastIron Series

              • ARM Cortex A57
            1/12/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256, SHA-384
              • Prerequisite: SHS #4082, DSA #1319, DRBG #1838
            1643Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (678) 473-2907
            Fax: (678) 473-8470

            Mike Jamison
            (678) 473-2907
            Fax: (678) 473-8470

            Cloudpath Cryptographic Library

            1.0


            Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

              • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
              • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
            1/12/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4143
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4143, HMAC #3397
            1642Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (678) 473-2907
            Fax: (678) 473-8470

            Mike Jamison
            (678) 473-2907
            Fax: (678) 473-8470

            Cloudpath Cryptographic Library

            1.0


            Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

              • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
              • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
            1/12/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1641Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Seyed Safakish
            seyeds@juniper.net
            408-745-2000
            Fax: 408-745-2100

            JUNOS 17.3R2 RE1800 - OpenSSL

            17.3R2 (Firmware)


            Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

              • Intel Xeon LC5518
            1/12/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #4138
            1640Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

              • Apple S3 w/ watchOS 4
            1/12/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1893
            1639Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

              • Apple S3 w/ watchOS 4
            1/12/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4137, ECDSA #1318, DRBG #1894, HMAC #3391
            1638Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

              • Apple S1P w/ watchOS 4
            1/12/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1893
            1637Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

              • Apple S1P w/ watchOS 4
            1/12/2018
            • KAS ECC:
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4136, ECDSA #1317, DRBG #1893, HMAC #3390
            1636Motorola Solutions Inc
            1301 East Algonquin Road
            Schaumburg, IL 60196
            USA

            Amalendu Roy
            aroy@motorolasolutions.com
            847-576-5000

            Ken Fuchs
            Ken.Fuchs@motorolasolutions.com
            847-576-5000

            uMACE KDF

            R03.01.07_KDF (Firmware)


            uMACE KDF implementation for the uMace cryptographic processor which is used in security modules embedded in Motorola Solutions security products.

              • Motorola µMace AT58Z04
            1/12/2018
            • SRTP:
              • AES Key Lengths: 256 (bits)
              • Prerequisite: AES #5077
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-384
              • Prerequisite: SHS #4132, HMAC #3386
            1635Private Machines, Inc
            164 20th Street
            4A-4B
            Brooklyn, NY 11232
            USA

            Sumeet Bajaj
            sumeet@privatemachines.com

            Radu Sion
            sion@privatemachines.com

            Private Machines Enforcer LIBUCL

            L4-1 2.5.13 (Firmware)


            The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

              • MAX32550 Cortex M3
            1/5/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1634Private Machines, Inc
            164 20th Street
            4A-4B
            Brooklyn, NY 11232
            USA

            Sumeet Bajaj
            sumeet@privatemachines.com

            Radu Sion
            sion@privatemachines.com

            Private Machines Enforcer LIBUCL

            L4-1 2.5.13 (Firmware)


            The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

              • MAX32550 Cortex M3
            1/5/2018
            • RSASP1:
              • Modulus Size: 2048 (bits)
              • Padding Algorithms: PKCS 1.5
            1633Private Machines, Inc
            164 20th Street
            4A-4B
            Brooklyn, NY 11232
            USA

            Sumeet Bajaj
            sumeet@privatemachines.com

            Radu Sion
            sion@privatemachines.com

            Private Machines Enforcer LIBUCL

            L4-1 2.5.13 (Firmware)


            The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

              • MAX32550 Cortex M3
            1/5/2018
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-384
              • Prerequisite: SHS #4132, HMAC #3385
            1632SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            Usha Sanagala
            usanagala@sonicwall.com
            408-962-6248
            Fax: 408-745-9300

            SonicWall Crypto Library

            SonicOS 6.2.5 (Firmware)


            SonicWall Crypto Library

              • Cavium Octeon
            1/5/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 176-1024
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4130, HMAC #3384
            • IKEv2:
              • Derived Keying Material length: 160512-0
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4130, HMAC #3384
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1
              • Prerequisite: SHS #4130
            • TLS:
              • Supports TLS 1.0/1.1
              • Prerequisite: SHS #4130, HMAC #3384
            1631SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            Usha Sanagala
            usanagala@sonicwall.com
            408-962-6248
            Fax: 408-745-9300

            SonicWall Crypto Library

            SonicOS 6.2.5 (Firmware)


            SonicWall Crypto Library

              • Cavium Octeon
            1/5/2018
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
              • Schemes:
                • Full Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • One Pass Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • Static Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4130, ECDSA #1315, DRBG #1887
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
              • Schemes:
                • dhHybrid1:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
                • dhHybrid1Flow:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
                • dhOneFlow:
                  • Key Agreement Roles: Initiator, Responder
                • dhStatic:
                  • Key Agreement Roles: Initiator, Responder
              • Prerequisite: SHS #4130, DSA #1335, DRBG #1887
            1630Infineon Technologies AG
            Alter Postweg 101
            Augsburg, BY 86159
            Germany

            Roland Ebrecht
            Roland.Ebrecht@infineon.com
            +49-821-25851-68
            Fax: +49-821-25851-40

            Thomas Hoffmann
            Thomas.Hoffmann@infineon.com
            +49-821-25851-24
            Fax: +49-821-25851-40

            Trusted Platform Module 2.0 SLB 9670

            SLB 9670 7.83 (Firmware)


            Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

              • Infineon SLB 9670 security controller IC
            1/5/2018
            • RSADP:
              • Modulus Size: 2048 (bits)
            1629Infineon Technologies AG
            Alter Postweg 101
            Augsburg, BY 86159
            Germany

            Roland Ebrecht
            Roland.Ebrecht@infineon.com
            +49-821-25851-68
            Fax: +49-821-25851-40

            Thomas Hoffmann
            Thomas.Hoffmann@infineon.com
            +49-821-25851-24
            Fax: +49-821-25851-40

            Trusted Platform Module 2.0 SLB 9670

            SLB 9670 7.83 (Firmware)


            Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

              • Infineon SLB 9670 security controller IC
            1/5/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256
            1628Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A11 Bionic w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3428, DSA #1334, DRBG #1283
            1627Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A10x Fusion w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3428, DSA #1333, DRBG #1283
            1626Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A9X w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3425, DSA #1332, DRBG #1280
            1625Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A10 Fusion w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3428, DSA #1331, DRBG #1283
            1624Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A9 w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3426, DSA #1330, DRBG #1281
            1623Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A8X w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3423, DSA #1329, DRBG #1278
            1621Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669) 227-3579

            Apple iOS CoreCrypto Module

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A7 w/ iOS 11
            1/5/2018
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3421, DSA #1327, DRBG #1276
            1620Huawei Technologies Co., Ltd
            Huawei Industrial Base, Bantian Longgang
            Shenzhen, Guangdong 518129
            China

            SPENCER HE
            heshunbin@huawei.com
            +86-755-28979041

            EulerOS 2.0

            EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

              • Intel Xeon w/ EulerOS 2.0
            1/5/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            • KAS ECC:
              • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4126, ECDSA #1312, DRBG #1884
            1619Silver Peak Systems, Inc.
            2860 De La Cruz Blvd.
            Santa Clara, CA 95050
            USA

            Damon Ennis
            (408) 935-1836

            Anusha Vaidyanathan
            (408) 935 1800
            Fax: (408) 588-1608

            Silver Peak Cryptographic library

            1.0 (Firmware)


            Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

              • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
              • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
            1/5/2018
            • IKEv1:
              • Methods: Pre-shared Key
              • Pre-shared Key Length: 8-224
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 8192 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4125, HMAC #3380
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4125
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4125, HMAC #3380
            1618Silver Peak Systems, Inc.
            2860 De La Cruz Blvd.
            Santa Clara, CA 95050
            USA

            Damon Ennis
            (408) 935-1836

            Anusha Vaidyanathan
            (408) 935 1800
            Fax: (408) 588-1608

            Silver Peak Cryptographic library

            1.0 (Firmware)


            Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

              • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
              • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
            1/5/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1617Hewlett Packard Enterprise
            8 Technology Drive
            Westborough, MA 01581
            USA

            Aftab Alan
            aftab.alan@hpe.com
            917 576-6680

            OmniStack Cryptographic Library

            2.1


            The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

              • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
            12/22/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            1616Hewlett Packard Enterprise
            8 Technology Drive
            Westborough, MA 01581
            USA

            Aftab Alan
            aftab.alan@hpe.com
            917 576-6680

            OmniStack Cryptographic Library

            2.1


            The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

              • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
            12/22/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4124
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4124, HMAC #3379
            1615DocuSign, Inc.
            221 Main St.
            Suite 1000
            San Francisco, CA 94105
            USA

            Ezer.Farhi@docusign.com
            Ezer.Farhi@docusign.com
            972-3-9279529

            DocuSign-SA-TLS

            8.5 (Firmware)


            DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

              • Intel® Xeon Quad-Core
            12/22/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #4123, HMAC #3378
            1614Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • intel Core M w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1874
            1613Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • intel i5 w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1873
            1612Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • intel Xeon w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1872
            1611A10 Networks, Inc.
            3 West Plumeria Drive
            San Jose, CA 95134
            USA

            John Chiong
            +1 408 325-8668

            A10 Networks Data Plane FIPS Library CNN3550

            CNN3550


            The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

              • N/A
            12/22/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            1610A10 Networks, Inc.
            3 West Plumeria Drive
            San Jose, CA 95134
            USA

            John Chiong
            +1 408 325-8668

            A10 Networks Data Plane FIPS Library CNN3530

            CNN3530


            The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

              • N/A
            12/22/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            1609Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel i7 w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1871
            1608Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel i7 w/ macOS 10.13
            12/22/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4119, ECDSA #1307, DRBG #1871
            1607Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel Core M w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1870
            1606Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel Core M w/ macOS 10.13
            12/22/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
              • Prerequisite: SHS #4118, ECDSA #1306, DRBG #1870
            1605Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel Xeon w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1869
            1604Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel Xeon w/ macOS 10.13
            12/22/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4117, ECDSA #1305, DRBG #1869
            1603Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel i5 w/ macOS 10.13
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1868
            1602Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Intel i5 w/ macOS 10.13
            12/22/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4116, ECDSA #1304, DRBG #1868
            1601Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Bill Shelton
            bshelton@juniper.net
            408-745-2000

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS Version 17.3R2 - OpenSSL

            17.3R2 (Firmware)


            The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

              • Intel Xeon D
            12/22/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4112
            1600Hewlett Packard Enterprise
            8 Technology Drive
            Westborough, MA 01581
            USA

            Aftab Alan
            aftab.alan@hpe.com
            917 576-6680

            OmniStack Cryptographic Library

            2.1


            The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

              • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
            12/22/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            1599Hewlett Packard Enterprise
            8 Technology Drive
            Westborough, MA 01581
            USA

            Aftab Alan
            aftab.alan@hpe.com
            917 576-6680

            OmniStack Cryptographic Library

            2.1


            The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

              • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
            12/22/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4110
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4110, HMAC #3365
            1598SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            George Duo
            gduo@sonicwall.com
            (408) 962-7049

            SonicOS 6.5.0 for TZ, NSA and SuperMassive

            FW Version 6.5.0 (Firmware)


            The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

              • Cavium OCTEON III (CN7XXX)
              • Cavium OCTEON II (CN6XXX)
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #1865
            1597SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            George Duo
            gduo@sonicwall.com
            (408) 962-7049

            SonicOS 6.5.0 for TZ, NSA and SuperMassive

            FW Version 6.5.0 (Firmware)


            The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

              • Cavium OCTEON II (CN6XXX)
              • Cavium OCTEON III (CN7XXX)
            12/22/2017
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 176-1024
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4109, HMAC #3364
            • IKEv2:
              • Derived Keying Material length: 160-512
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Diffie-Hellman shared secret:
                  • Length: 2048 (bits)
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4109, HMAC #3364
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1
              • Prerequisite: SHS #4109
            • TLS:
              • Supports TLS 1.0/1.1
              • Prerequisite: SHS #4109, HMAC #3364
            1596SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            George Duo
            gduo@sonicwall.com
            (408) 962-7049

            SonicOS 6.5.0 for TZ, NSA and SuperMassive

            FW Version 6.5.0 (Firmware)


            The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

              • Cavium OCTEON III (CN7XXX)
              • Cavium OCTEON II (CN6XXX)
            12/22/2017
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • Full Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256, SHA-384, SHA-512
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256, SHA-384, SHA-512
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384, SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256, SHA-384, SHA-512
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256, SHA-384, SHA-512
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384, SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • One Pass Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256, SHA-384, SHA-512
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256, SHA-384, SHA-512
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384, SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • One Pass DH:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256, SHA-384, SHA-512
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256, SHA-384, SHA-512
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384, SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
                • Static Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256, SHA-384, SHA-512
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256, SHA-384, SHA-512
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384, SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4109, ECDSA #1299, DRBG #1865, HMAC #3364
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
              • Schemes:
                • dhHybrid1:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256, SHA-384, SHA-512
                    • FC:
                      • SHA: SHA-256, SHA-384, SHA-512
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256, SHA-384, SHA-512
                    • FC:
                      • SHA: SHA-256, SHA-384, SHA-512
                • dhHybrid1Flow:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256, SHA-384, SHA-512
                    • FC:
                      • SHA: SHA-256, SHA-384, SHA-512
                • dhOneFlow:
                  • Key Agreement Roles: Initiator, Responder
                • dhStatic:
                  • Key Agreement Roles: Initiator, Responder
              • Prerequisite: SHS #4109, DSA #1325, DRBG #1865, HMAC #3364
            1595Cisco Systems, Inc.
            170 West Tasman Drive
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            CiscoSSL FIPS Object Module (Assembler)

            6.2


            The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Cavium Octeon MIPS64 w/ Linux 3.10
            12/22/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #3471, ECDSA #1254, DRBG #1317
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #3471, DSA #1130, DRBG #1317
            1594Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

              • Apple A10X Fusion w/ tvOS 11
            12/22/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1861
            1593Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 7 GnuTLS C Implementation

            R7-2.0.0


            GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

              • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            12/22/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4105, HMAC #3360
            1592Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 7 GnuTLS C Implementation

            R7-2.0.0


            GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

              • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            12/22/2017
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4105, ECDSA #1297, DRBG #1859
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4105, DSA #1324, DRBG #1859
            1591Extreme Networks
            6480 Via Del Ora
            San Jose, CA 95119
            USA

            Craig J Ficik
            cficik@extremenetworks.com
            603-9525922
            Fax: 404-806-5377

            Extreme Networks Summit Series

            22.3 (Firmware)


            Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

              • Cavium Octeon II
            12/15/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #4104
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-512
              • Prerequisite: SHS #4104, HMAC #3359
            1590Extreme Networks
            6480 Via Del Ora
            San Jose, CA 95119
            USA

            Craig J Ficik
            cficik@extremenetworks.com
            603-952-5922
            Fax: 404-806-5377

            Extreme Networks Summit Series

            22.3 (Firmware)


            Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

              • Intel Atom C series
            12/15/2017
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #4103
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-512
              • Prerequisite: SHS #4103, HMAC #3358
            1589Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A10 Fusion w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1856
            1588Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A11 Bionic w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1855
            1587Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A10X Fusion w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1854
            1586Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A9X w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1853
            1585Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A9 w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1852
            1584Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A8X w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1851
            1583Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A8 w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1850
            1582Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Apple A7 w/ iOS 11
            12/15/2017
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1849
            1581SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            Usha Sangala
            usanagala@SonicWALL.com
            408-962-6248
            Fax: 408-745-9300

            Mike Vache
            mvache@sonicwall.com
            408-962-6760
            Fax: 408-745-9300

            Net-SNMP

            5.6.1 (Firmware)


            Net-snmp-5.6.1 with minor patches

              • Intel Core i5 with AES-NI
              • Intel Xeon with AES-NI
            12/15/2017
            • SNMP:
            1580SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            Usha Sangala
            usanagala@SonicWALL.com
            408-962-6248
            Fax: 408-745-9300

            Mike Vache
            mvache@sonicwall.com
            408-962-6760
            Fax: 408-745-9300

            OpenSSL

            1.0.2k (Firmware)


            OpenSSL 1.0.2k with minor patches

              • Intel Core i5 with AES-NI
              • Intel Xeon with AES-NI
            12/15/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #4088, HMAC #3343
            1579SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            Usha Sangala
            usanagala@SonicWALL.com
            408-962-6248
            Fax: 408-745-9300

            Mike Vache
            mvache@sonicwall.com
            408-962-6760
            Fax: 408-745-9300

            OpenSSH

            openssh-7.4p1 (Firmware)


            SSH may generate keys of any size. Default is 2048. Open source version slightly modified to read our CSPs and perform necessary testing and validation.

              • Intel Core i5 with AES-NI
              • Intel Xeon with AES-NI
            12/15/2017
            • SSH:
              • SHA Functions: SHA-256
              • Prerequisite: SHS #4088
            1578OpenSSL Validation Services, Inc.
            1829 Mount Ephraim Road
            Adamstown, MD 21710
            USA

            Steve Marquess
            info@openssl.com
            301-874-2571

            OpenSSL FIPS Object Module

            2.0.16


            The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

              • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
              • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
            12/15/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: B-283, K-283, P-256
                      • SHA: SHA-256, SHA-384, SHA-512
                    • ED:
                      • Curve: B-409, K-409, P-384
                      • SHA: SHA-384, SHA-512
              • Prerequisite: SHS #3681, ECDSA #1091, DRBG #1451
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3681, DSA #1195, DRBG #1451
            1577Gemalto
            20 Colonnade Road, Suite 200
            Ottawa, ON K2E7M6
            Canada

            Security and Certifications Team
            SecurityCertifications@gemalto.com

            Luna IS Cryptographic Library

            6.3.2 (Firmware)


            The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

              • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
            12/15/2017
            • ECDSA SigGen:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1704
            1576McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Andy Nissen
            andy.nissen@intel.com
            651-770-6151

            McAfee Advanced Threat Defense

            4.0


            A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

              • Intel Xeon w/ Linux 4.4.27
            12/8/2017
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #1801, ECDSA #415, DRBG #822
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #1801, DSA #1322, DRBG #822
            1575SonicWALL Inc.
            5455 Great America Parkway
            Santa Clara, CA 95054
            USA

            Usha Sangala
            usanagala@SonicWALL.com
            408-962-6248
            Fax: 408-745-9300

            Mike Vache
            mvache@sonicwall.com
            408-962-6760
            Fax: 408-745-9300

            OpenJDK

            1.8.0-jdk8u152-b01-20170213 (Firmware)


            CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc..

              • Intel Xeon with AES-NI
              • Intel Core i5 with AES-NI
            12/8/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #4089, HMAC #3344
            1574Certes Networks, Inc.
            300 Corporate Center Drive
            Suite 140
            Pittsburgh, PA 15108
            USA

            Sean Everson
            sean.everson@certesnetworks.com
            1.412.357.1130
            Fax: 1.412.262.2574

            Gary Brunner
            gary.brunner@certesnetworks.com
            1.412.200.2177
            Fax: 1.412.262.2574

            CryptoFlow Net Creator Java Crypto Module

            1.0


            The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

              • Intel Xeon E3-1270v5 w/ CentOS 6.7
            12/8/2017
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            1573Certes Networks, Inc.
            300 Corporate Center Drive
            Suite 140
            Pittsburgh, PA 15108
            USA

            Sean Everson
            sean.everson@certesnetworks.com
            1.412.357.1130
            Fax: 1.412.262.2574

            Gary Brunner
            gary.brunner@certesnetworks.com
            1.412.200.2177
            Fax: 1.412.262.2574

            CryptoFlow Net Creator Java Crypto Module

            1.0


            The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

              • Intel Xeon E3-1270v5 w/ CentOS 6.7
            12/8/2017
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4087, HMAC #3342
            1572RSA Security LLC
            174 Middlesex Turnpike
            Bedford, MA 01730
            USA

            FIPS Program
            fips-program@rsa.com

            RSA BSAFE® Crypto-J JSAFE and JCE Software Module

            6.2.4


            RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

              • Intel Core i5 w/ Windows 10 (64-bit)
              • Intel Xeon w/ CentOS 7.3
              • Qualcomm Snapdragon w/ Android 7.1.2
            12/8/2017
            • RSADP:
              • Modulus Size: 2048 (bits)
            1571RSA Security LLC
            174 Middlesex Turnpike
            Bedford, MA 01730
            USA

            FIPS Program
            fips-program@rsa.com

            RSA BSAFE® Crypto-J JSAFE and JCE Software Module

            6.2.4


            RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

              • Intel Core i5 w/ Windows 10 (64-bit)
              • Qualcomm Snapdragon w/ Android 7.1.2
              • Intel Xeon w/ CentOS 7.3
            12/8/2017
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4085, HMAC #3340
            1570RSA Security LLC
            174 Middlesex Turnpike
            Bedford, MA 01730
            USA

            FIPS Program
            fips-program@rsa.com

            RSA BSAFE® Crypto-J JSAFE and JCE Software Module

            6.2.4


            RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

              • Intel Core i5 w/ Windows 10 (64-bit)
              • Intel Xeon w/ CentOS 7.3
              • Qualcomm Snapdragon w/ Android 7.1.2
            12/8/2017
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1569Ruckus Wireless, Inc.
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Suneetha Sarala
            Suneetha.Sarala@arris.com
            650-265-4200

            Julie Lu
            Julie.Lu@arris.com
            650-265-4200

            BRCD-IP-CRYPTO-VER-4.0

            BRCD-IP-CRYPTO-VER-4.0 (Firmware)


            Firmware algorithm for the Brocade FastIron Series

              • Freescale P2041
            12/8/2017
            • SNMP:
              • SSH:
                • SHA Functions: SHA-1, SHA-256
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
              1568Ruckus Wireless, Inc.
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Suneetha Sarala
              Suneetha.Sarala@arris.com
              650-265-4200

              Julie Lu
              Julie.Lu@arris.com
              650-265-4200

              BRCD-IP-CRYPTO-VER-4.0

              BRCD-IP-CRYPTO-VER-4.0 (Firmware)


              Firmware algorithm for the Brocade FastIron Series

                • ARM Cortex A57
              12/8/2017
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1, SHA-256
                • Prerequisite: SHS #4082
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #4082, HMAC #3337
              1567Ruckus Wireless, Inc.
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Suneetha Sarala
              Suneetha.Sarala@arris.com
              650-265-4200

              Julie Lu
              Julie.Lu@arris.com
              650-265-4200

              BRCD-IP-CRYPTO-VER-4.0

              BRCD-IP-CRYPTO-VER-4.0 (Firmware)


              Firmware algorithm for the Brocade FastIron Series

                • ARM Cortex A9
              12/8/2017
              • IKEv2:
                • Derived Keying Material length: 1536-2432
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256, SHA-384
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256, SHA-384
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4081, HMAC #3336
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1, SHA-256
                • Prerequisite: SHS #4081
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #4081, HMAC #3336
              1566Ruckus Wireless, Inc.
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Suneetha Sarala
              Suneetha.Sarala@arris.com
              650-265-4200

              Julie Lu
              Julie.Lu@arris.com
              650-265-4200

              BRCD-IP-CRYPTO-VER-4.0

              BRCD-IP-CRYPTO-VER-4.0 (Firmware)


              Firmware algorithm for the Brocade FastIron Series

                • ARM Cortex A9
              12/8/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4081, ECDSA #1282, DRBG #1837
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256, SHA-384
                • Prerequisite: SHS #4081, DSA #1318, DRBG #1837
              1565Gemalto
              20 Colonnade Road, Suite 200
              Ottawa, ON K2E7M6
              Canada

              Security and Certifications Team
              SecurityCertifications@gemalto.com

              Luna K6 Cryptographic Library

              6.24.6 (Firmware)


              The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

                • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
              12/8/2017
              • ECDSA SigGen:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1704
              1564Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

                • Apple A10X w/ tvOS 11 Fusion
              11/30/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1832
              1563Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

                • Apple A10X w/ tvOS 11 Fusion
              11/30/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4076, ECDSA #1279, HMAC #3331
              1562Gemalto
              20 Colonnade Road, Suite 200
              Ottawa, ON K2E7M6
              Canada

              Security and Certifications Team
              SecurityCertifications@gemalto.com

              Luna G5 Cryptographic Library

              6.24.6 (Firmware)


              The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

                • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
              11/30/2017
              • ECDSA SigGen:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1704
              1561Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              Cisco Security Crypto Virtual

              F6.2


              The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

                • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
              11/30/2017
              • IKEv2:
                • Derived Keying Material length: 800-3072
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4074, HMAC #3329
              • SSH:
                • SHA Functions: SHA-1
                • Prerequisite: SHS #4074
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4074, HMAC #3329
              1560Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              Cisco Security Crypto Virtual

              F6.2


              The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

                • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
              11/30/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4074, ECDSA #1277, DRBG #1828
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4074, DSA #1314, DRBG #1828
              1559Cavium, Inc.
              2315 N 1st Street
              San Jose, CA 95131
              USA

              Tejinder Singh
              Tejinder.Singh@caviumnetworks.com
              408-943-7403
              Fax: 408-577-1992

              Phanikumar Kancharla
              Pkkancharla@caviumnetworks.com
              408-943-7496

              ngfips_ecc

              CN52XX 1.0.1 (Firmware)


              The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

                • Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX
              11/30/2017
              • ECDSA SigGen:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #32
              1558Brocade Communications Systems LLC
              120 Holger Way
              San Jose, CA 95110
              USA

              Hamid Sabouti
              hamid.sobouti@broadcom.com
              408-333-4150
              Fax: 408-333-3844

              Brocade Fabric OS FIPS Cryptographic Module

              8.2.0


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
                • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
              11/30/2017
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4071
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #4071, HMAC #3328
              1557Brocade Communications Systems LLC
              120 Holger Way
              San Jose, CA 95110
              USA

              Hamid Sabouti
              hamid.sobouti@broadcom.com
              408-333-4150
              Fax: 408-333-3844

              Brocade Fabric OS FIPS Cryptographic Module

              8.2.0


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
                • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
              11/30/2017
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4071, ECDSA #1275, DRBG #1827
              • KAS FFC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4071, DSA #2583, DRBG #1827
              1556SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE NSS on x86 with AES-NI

              2.0


              SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
              11/30/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4070, HMAC #3327
              1555SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE NSS on x86 with AES-NI

              2.0


              SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
              11/30/2017
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4070, ECDSA #1274, DRBG #1826
              • KAS FFC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4070, DSA #1311, DRBG #1826
              1554SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE NSS on x86 without AES-NI

              2.0


              SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
              11/30/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4069, HMAC #3326
              1553SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE NSS on x86 without AES-NI

              2.0


              SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
              11/30/2017
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4069, ECDSA #1273, DRBG #1825
              • KAS FFC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4069, DSA #1310, DRBG #1825
              1552SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE NSS z13

              2.0


              SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                • z13 w/ SUSE Linux Enterprise Server 12 SP2
              11/30/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4068, HMAC #3325
              1551SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE NSS z13

              2.0


              SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                • z13 w/ SUSE Linux Enterprise Server 12 SP2
              11/30/2017
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4068, ECDSA #1272, DRBG #1824
              • KAS FFC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4068, DSA #1309, DRBG #1824
              1550Lexmark International, Inc.
              740 West New Circle Road
              Lexington, KY 40550
              USA

              Graydon Dodson
              gdodson@lexmark.com
              +1 859 232-6483

              Crypto Module (user)

              3.2


              Lexmark Crypto Module (user)

                • Marvell 88PA6270C0 w/ Lexmark Linux v4
              11/22/2017
              • IKEv1:
                • Methods: Digital Signature, Public Key Encryption
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 (bits)
                    • SHA Functions: SHA-256, SHA-512
                • Prerequisite: SHS #4063, HMAC #3320
              • IKEv2:
                • Derived Keying Material length: 1056-3072
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 (bits)
                    • SHA Functions: SHA-256
                • Prerequisite: SHS #4063, HMAC #3320
              1549Lexmark International, Inc.
              740 West New Circle Road
              Lexington, KY 40550
              USA

              Graydon Dodson
              gdodson@lexmark.com
              +1 859 232-6483

              Crypto Module (user)

              3.2


              Lexmark Crypto Module (user)

                • Marvell MV78460-B0 w/ Lexmark Linux v4
              11/22/2017
              • ECDSA SigGen:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1821
              1548Lexmark International, Inc.
              740 West New Circle Road
              Lexington, KY 40550
              USA

              Graydon Dodson
              gdodson@lexmark.com
              +1 859 232-6483

              Crypto Module (user)

              3.2


              Lexmark Crypto Module (user)

                • Marvell MV78460-B0 w/ Lexmark Linux v4
              11/22/2017
              • IKEv1:
                • Methods: Digital Signature, Public Key Encryption
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 (bits)
                    • SHA Functions: SHA-256, SHA-512
                • Prerequisite: SHS #4064, HMAC #3321
              • IKEv2:
                • Derived Keying Material length: 1056-3072
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 (bits)
                    • SHA Functions: SHA-256
                • Prerequisite: SHS #4064, HMAC #3321
              1547Lexmark International, Inc.
              740 West New Circle Road
              Lexington, KY 40550
              USA

              Graydon Dodson
              gdodson@lexmark.com
              +1 859 232-6483

              Crypto Module (user)

              3.2


              Lexmark Crypto Module (user)

                • Marvell 88PA6270C0 w/ Lexmark Linux v4
              11/22/2017
              • ECDSA SigGen:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1820
              1546Bomgar Corporation
              578 Highland Colony Parkway
              Paragon Centre, Suite 300
              Ridgeland, MS 39157
              USA

              Faye Santangelo
              FSantangelo@bomgar.com
              6016078322

              Bomgar CryptoEngine

              2.0.13 (Firmware)


              The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

                • Intel® Xeon E5-2640 v3
              11/22/2017
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3912, HMAC #3180
              1545Cisco Systems, Inc.
              170 W Tasman Dr
              San Jose, CA 95134
              USA

              Clint Winebrenner
              cwinebre@cisco.com
              919.392.6520

              CiscoSSL FIPS Object Module

              6.0 (Firmware)


              The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

                • Apple A10 on iOS 10.x
              11/17/2017
              • IKEv2:
                • Derived Keying Material length: 1056-3072
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-1
                • Prerequisite: SHS #4046, HMAC #3304
              • SNMP:
              • SRTP:
                • AES Key Lengths: 128, 192, 256 (bits)
                • Prerequisite: AES #4956
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4046
              1544Cisco Systems, Inc.
              170 W Tasman Dr
              San Jose, CA 95134
              USA

              Clint Winebrenner
              cwinebre@cisco.com
              919.392.6520

              CiscoSSL FIPS Object Module

              6.0 (Firmware)


              The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

                • Apple A10 on iOS 10.x
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-512
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-512
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: AES #4956, AES #4956, SHS #4046, ECDSA #1265, DRBG #1787, HMAC #3304
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4046, DSA #1305, DRBG #1787
              1543Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Vann (Vanna) Nguyen
              vann@juniper.net
              408-745-2000

              Pradeepa M R
              pradeepam@juniper.net

              Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

              15.1 X49-D110 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • Cavium Octeon III (CN7130)
              11/17/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-384
                • Prerequisite: SHS #4033
              1542Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Vann (Vanna) Nguyen
              vann@juniper.net
              408-745-2000

              Pradeepa M R
              pradeepam@juniper.net

              Junos FIPS Version 15.1X49 - SRX345 - Authentec

              15.1 X49-D110 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • Cavium Octeon III (CN7130)
              11/17/2017
              • IKEv1:
                • Methods: Pre-shared Key, Public Key Encryption
                • Pre-shared Key Length: 8-256
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256, SHA-384
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-256, SHA-384
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-224, SHA-256
                • Prerequisite: SHS #4030, HMAC #3289
              • IKEv2:
                • Derived Keying Material length: 1136-2432
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256, SHA-384
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-256, SHA-384
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4030, HMAC #3289
              1541SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              Strongswan Cryptographic Module

              2.0


              Strongswan is an open-source IPsec implementation for Linux kernel. The module supplies cryptographic support of the IKEv1 and IKEv2 protocols for the SUSE Linux Enterprise Server user space. This test covers the SP800-135 IKEv2 KDF testing.

                • IBM z13 w/ SUSE Linux Enterprise Server 12 SP2
              11/17/2017
              • IKEv2:
                • Derived Keying Material length: 1056-3072
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 8192 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3788, HMAC #3059
              1540Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations

              6.3.9600


              The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
                • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
              11/17/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #489
              1539SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              Strongswan Cryptographic Module

              2.0


              Strongswan is an open-source IPsec implementation for Linux kernel. The module supplies cryptographic support of the IKEv1 and IKEv2 protocols for the SUSE Linux Enterprise Server user space. This test covers the SP800-135 IKEv2 KDF testing.

                • Intel Xeon E5 Family w/ SUSE Linux Enterprise Server 12 SP2
              11/17/2017
              • IKEv2:
                • Derived Keying Material length: 1056-3072
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 8192 (bits)
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3770, HMAC #3044
              1538Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A11 Bionic w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4028, DRBG #1767
              1537Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A11 Bionic w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4028, ECDSA #1262, DRBG #1767, HMAC #3288
              1536Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10X Fusion w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1766
              1535Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple 10X Fusion w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4027, ECDSA #1261, DRBG #1766, HMAC #3287
              1534Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1765
              1533Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4026, ECDSA #1260, DRBG #1765, HMAC #3286
              1532Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 Fusion w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1764
              1531Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 Fusion w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4025, ECDSA #1259, DRBG #1764, HMAC #3285
              1530Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1762
              1529Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4024, ECDSA #1258, DRBG #1762, HMAC #3284
              1528Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9 w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4023, DRBG #1761
              1527Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9 w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4023, ECDSA #1257, DRBG #1761, HMAC #3283
              1526McAfee, Inc.
              2821 Mission College Blvd.
              Santa Clara, CA 95054
              USA

              Mark Hanson
              Mark_Hanson@McAfee.com

              McAfee NSP NS Crypto Lib

              n.a 2.0.5_9.1.17.2 (Firmware)


              Cryptographic services for the McAfee NSP Intrusion Prevention appliance

                • Intel Atom C Family
                • Intel Xeon E5 Family
              11/17/2017
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #3962, HMAC #3221
              1525Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A7 w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1759
              1524Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A7 w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4022, ECDSA #1256, DRBG #1759
              1523Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8 w/ iOS 11
              11/17/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1758
              1522Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8 w/ iOS 11
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4021, ECDSA #1255, DRBG #1758
              1521Cisco Systems, Inc.
              170 West Tasman Dr.
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              Cisco Security Crypto

              F6.2 (Firmware)


              The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

                • Intel Atom C2xxx Family, Intel Xeon 34xx Family
                • Intel Xeon E Family
                • Intel Xeon D Family
              11/17/2017
              • IKEv2:
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4012
              • SSH:
                • SHA Functions: SHA-1
                • Prerequisite: SHS #4012
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4012
              1520Cisco Systems, Inc.
              170 West Tasman Dr.
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              Cisco Security Crypto

              F6.2 (Firmware)


              The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

                • Intel Atom C2xxx Family, Intel Xeon 34xx Family
                • Intel Xeon E Family
                • Intel Xeon D Family
              11/17/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4012, ECDSA #1254, DRBG #1735
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4012, DSA #1304, DRBG #1735
              1519Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub Virtual TPM Implementations

              10.0.15063.674


              The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1518Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

              10.0.16299


              The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1517Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub MsBignum Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • RSADP:
                • Modulus Size: 2048 (bits)
              1516Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub MsBignum Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1515Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub MsBignum Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1732
              1514Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub SymCrypt Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: SHS #4011, DRBG #1732
              1513Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub SymCrypt Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • RSADP:
                • Modulus Size: 2048 (bits)
              1512Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub SymCrypt Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1511Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Surface Hub SymCrypt Cryptographic Implementations

              10.0.15063.674


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
              11/17/2017
              • IKEv1:
                • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
                • Pre-shared Key Length: 64-2048
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-384
                • Prerequisite: SHS #4011, HMAC #3269
              • IKEv2:
                • Derived Keying Material length: 192-1792
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-384
                • Prerequisite: SHS #4011, HMAC #3269
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4011, HMAC #3269
              1510Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

              10.0.15254


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1731
              1509Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

              10.0.15254


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • RSADP:
                • Modulus Size: 2048 (bits)
              1508Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

              10.0.15254


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1507Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

              10.0.15254


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • IKEv1:
                • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
                • Pre-shared Key Length: 64-2048
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-384
                • Prerequisite: SHS #4010, HMAC #3268
              • IKEv2:
                • Derived Keying Material length: 192-1792
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-384
                • Prerequisite: SHS #4010, HMAC #3268
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4010, HMAC #3268
              1506Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

              10.0.15254


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1731
              1505Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

              10.0.15254


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • RSADP:
                • Modulus Size: 2048 (bits)
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1504Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

              10.0.15254


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
                • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1503Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

              10.0.16299


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
              11/17/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1730
              1502Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

              10.0.16299


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
              11/17/2017
              • RSADP:
                • Modulus Size: 2048 (bits)
              1501Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

              10.0.16299


              The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
              11/17/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1500Hewlett-Packard Development Company, L.P.
              11445 Compaq Center Drive W
              Houston, TX 77070
              USA

              Hridya Valakkadavil Thilakan
              hridya-valakkadavil.thilakan@hpe.com

              Aprana Shrivastava
              aprana.shrivastava@hpe.com

              HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

              4.71 (Firmware)


              The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

                • PowerPC 440EPx
              11/9/2017
              • ECC CDH:
                • Primitive
                • Curves: P-224, P-256, P-384, P-521
              1499Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

              10.0.16299


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
              11/9/2017
              • ECDSA SigGen:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1730
              1498Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

              10.0.16299


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
              11/9/2017
              • RSADP:
                • Modulus Size: 2048 (bits)
              1497Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

              10.0.16299


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
              11/9/2017
              • RSASP1:
                • Modulus Size: 2048 (bits)
                • Padding Algorithms: PKCS 1.5
              1496Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Mike Grimm
              FIPS@microsoft.com
              800-Microsoft

              Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

              10.0.16299


              The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
                • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
                • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
                • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
                • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
              11/9/2017
              • IKEv1:
                • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
                • Pre-shared Key Length: 64-2048
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-384
                • Prerequisite: SHS #4009, HMAC #3267
              • IKEv2:
                • Derived Keying Material length: 192-1792
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 256 (bits)
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 (bits)
                    • SHA Functions: SHA-384
                • Prerequisite: SHS #4009, HMAC #3267
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4009, HMAC #3267
              1495Ciena Corporation
              7035 Ridge Road
              Hanover, MD 21076
              USA

              Kevin Meagher
              KMeagher@ciena.com

              Ciena 6500 Packet Optical Family

              12.3


              Ciena's Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

                • PowerQUICC II w/ VxWorks 6.3
                • PowerQUICC II w/ VxWorks 6.1
              11/3/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-512
                • Prerequisite: SHS #3992
              1494Ciena Corporation
              7035 Ridge Road
              Hanover, MD 21076
              USA

              Kevin Meagher
              KMeagher@ciena.com

              Ciena 6500 Packet Optical Family

              12.3


              Ciena's Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

                • PowerQUICC II w/ VxWorks 6.1
                • PowerQUICC II w/ VxWorks 6.3
              11/3/2017
              • KAS ECC:
                • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #3992, ECDSA #1244, DRBG #1706
              • KAS FFC:
                • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3992, DSA #1300, DRBG #1706
              1493SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE OpenSSH

              2.0


              OpenSSH is the standard SSH implementation.

                • IBM z13 w/ SUSE Linux Enterprise Server 12 SP2
              11/3/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3788
              1492SUSE, LLC
              10 Canal Park, Suite 200
              Cambridge, MA 02141
              USA

              Andreas Stieger
              astieger@suse.com
              +49 911 74053 384

              Thomas Biege
              thomas@suse.de
              +49 911 74053 500

              SUSE OpenSSH

              2.0


              OpenSSH is the standard SSH implementation.

                • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
              11/3/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3770
              1491Hewlett Packard Enterprise
              8000 Foothills Blvd.
              Roseville, CA 95747
              USA

              Susan Scotten
              susan.scotten@hpe.com
              1-916-540-1109

              Aruba Campus Switch Series Crypto Library

              16.04 (Firmware)


              Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

                • Dual Core ARM Coretex
                • Freescale P2020 Dual Core
              11/3/2017
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1
                • Prerequisite: SHS #3991
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-512
                • Prerequisite: SHS #3991, HMAC #3249
              1490Hewlett Packard Enterprise
              8000 Foothills Blvd.
              Roseville, CA 95747
              USA

              Susan Scotten
              susan.scotten@hpe.com
              1-916-540-1109

              Aruba Campus Switch Series Crypto Library

              16.04 (Firmware)


              Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

                • Freescale P2020 Dual Core
                • Dual Core ARM Coretex
              11/3/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3991, ECDSA #1243, DRBG #1705
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-384
                • Prerequisite: SHS #3991, DSA #1299, DRBG #1705
              1489Guardtime
              5151 California Ave.
              Suite 210
              Irvine, CA 92617
              USA

              Christian Bravo
              christian.bravo@guardtime.com
              310-227-6558

              Guardtime Cryptographic Support Library (CSL) Direct Extended

              1.0.0 (Firmware)


              Cryptographic library for Guardtime products.

                • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
                • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
              11/3/2017
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3697, HMAC #2979
              1488Guardtime
              5151 California Ave.
              Suite 210
              Irvine, CA 92617
              USA

              Christian Bravo
              christian.bravo@guardtime.com
              310-227-6558

              Guardtime Cryptographic Support Library (CSL) Direct Extended

              1.0.0 (Firmware)


              Cryptographic library for Guardtime products.

                • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
                • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
              11/3/2017
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #3697, ECDSA #1095, DRBG #1472
              1487IBM
              2455 South Rd
              Poughkeepsie, NY 12601
              USA

              Thomas Morris Jr
              tmorrisj@us.ibm.com
              1-845-435-5538

              William Santiago
              wsf1@us.ibm.com
              1-845-435-9265

              Miniboot 1.30 with 00KP899

              Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


              Miniboot implemented algorithms with hardware acceleration

                • IBM PowerPC 405
              11/3/2017
              • ECDSA SigGen:
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1674
              1486IBM
              2455 South Rd
              Poughkeepsie, NY 12601
              USA

              Thomas Morris Jr
              tmorrisj@us.ibm.com
              1-845-435-5538

              William Santiago
              wsf1@us.ibm.com
              1-845-435-9265

              Miniboot 1.30 with 00CW683

              Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


              Miniboot implemented algorithms with hardware acceleration

                • IBM PowerPC 405
              11/3/2017
              • ECDSA SigGen:
                • P-521 SHA: SHA-512
                • Prerequisite: DRBG #1675
              1485Elster
              TBD
              TBD, TBD 307210
              Romania

              VLADIMIR DIATLOV
              VLADIMIR.DIATLOV@Honeywell.com
              +40 374 475 828
              Fax: +40 256 493 737

              SMETS2 AS302P

              1.1 (Firmware)


              The algorithms to be tested are implemented in an Electricity smart meter, for deployment in the UK Smart Metering Implementation Programme.

                • ARM 32-bit Cortex-M3
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256
              1484F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BIGIP vCMP on B4450 OpenSSL Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • SSH:
                • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3983
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3983, HMAC #3242
              1483F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BIGIP vCMP on B4450 OpenSSL Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3983, ECDSA #1238, DRBG #1700
              1481Thales e-Security Inc.
              900 South Pine Island Road
              Suite 710
              Plantation, FL 33324
              USA

              Natalya Robert
              natalya.robert@thalesesec.com
              954-888-6268

              Robert Burns
              robert.burns@thalesesec.con
              954-888-6215

              Vormetric Data Security Manager Module

              6.0.0 (Firmware)


              The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

                • Intel Xeon
              11/3/2017
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3986, HMAC #3245
              1480F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP vCMP on B2250 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3981, HMAC #3240
              1479F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP vCMP on B2250 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3981, ECDSA #1236, DRBG #1698
              1478F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP 10350F TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3980, HMAC #3239
              1477F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP 10350F TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3980, ECDSA #1235, DRBG #1697
              1476F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B4450N TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3979, HMAC #3238
              1475F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B4450N TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3979, ECDSA #1234, DRBG #1696
              1474F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B2250 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3978, HMAC #3237
              1473F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038
              Fax: ~

              BigIP B2250 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3978, ECDSA #1233, DRBG #1695
              1472F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP vCMP on B4450 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3977, HMAC #3236
              1471F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP vCMP on B4450 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3977, ECDSA #1232, DRBG #1694
              1470F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B4000 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3976, HMAC #3235
              1469F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B4000 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3976, ECDSA #1231, DRBG #1693
              1468F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP i7820 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-1650
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3973, HMAC #3232
              1467F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP i7820 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-1650
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3973, ECDSA #1228, DRBG #1690
              1466F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP i5820 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-1630
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3975, HMAC #3234
              1465F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP i5820 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-1630
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              1464F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B7000 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E3-1275
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3974, HMAC #3233
              1463F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP B7000 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E3-1275
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3974, ECDSA #1229, DRBG #1691
              1462F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP i4000 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-1630
              11/3/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3972, HMAC #3231
              1461F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BigIP i4000 TMM Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-1630
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3972, ECDSA #1227, DRBG #1689
              1460F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BIGIP B4450N OpenSSL Software Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • SSH:
                • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3971
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #3971, HMAC #3230
              1459F5 Networks
              401 Elliott Avenue West
              Seattle, WA 98119
              USA

              Maryrita Steinhour
              m.steinhour@f5.com
              206-272-7351

              John Hughes
              j.hughes@f5.com
              206-272-6038

              BIGIP B4450N OpenSSL Software Implementation

              13.1.0 (Firmware)


              F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                • Intel(R) Xeon(R) CPU E5-2658A
              11/3/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS ECC:
                • Functions: Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3971, ECDSA #1226, DRBG #1688
              1458
              10/27/2017
                1457F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP B2250 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-2658
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3970
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3970, HMAC #3229
                1456F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP B2250 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-2658
                10/27/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3970, ECDSA #1225, DRBG #1687
                1455F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP 10350F OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-2658
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3969
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3969, HMAC #3228
                1454F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP 10350F OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-2658
                10/27/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3969, ECDSA #1224, DRBG #1686
                1453F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP vCMP on B2250 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-2658
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3968
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3968, HMAC #3227
                1452F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP vCMP on B2250 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-2658
                10/27/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3968, ECDSA #1223, DRBG #3227
                1451F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP B4000 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3967
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3967, HMAC #3226
                1450F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP B4000 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU
                10/27/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3967, ECDSA #1222, DRBG #1684
                1449F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP i4000 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-1630
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3966
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3966, HMAC #3225
                1448F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP i4000 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-1630
                10/27/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3966, ECDSA #1221, DRBG #1683
                1447F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP i7820 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-1650
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3965
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3965, HMAC #3224
                1446F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP i7820 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-1650
                10/27/2017
                • ECC CDH:
                  • Primitive
                  • Curves: P-256, P-384
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #3965, ECDSA #1220, DRBG #1682
                1445F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP i5820 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-1630
                10/27/2017
                • SSH:
                  • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3964
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #3964, HMAC #3223
                1444F5 Networks
                401 Elliott Avenue West
                Seattle, WA 98119
                USA

                Maryrita Steinhour
                m.steinhour@f5.com
                206-272-7351

                John Hughes
                j.hughes@f5.com
                206-272-6038

                BIGIP i5820 OpenSSL Implementation

                13.1.0 (Firmware)


                F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

                  • Intel(R) Xeon(R) CPU E5-1630
                10/27/2017
                • ECC CDH:
                  • P