Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

Component Validation List

This list identifies implementations that have been validated as conforming to individual components of FIPS approved and NIST recommended cryptographic algorithms, as specified in the associated publications, using tests described in the associated validation system (VS) documents.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of modulus and curve sizes providing less than 112 bits of security strength (modulus size 1024 and curve sizes P-192, K-163, and B-163), and the use of SHA-1 with Digital Signature Generation, is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
2180Apple Inc.
One Apple Park Way
MS: 927-1CPS
Cupertino, CA 95014
USA

Shawn Geddis
geddis@apple.com
(669)227-3579
Fax: (866)315-1954

Stephanie Motre Martin
smotre@apple.com
(408)750-6235
Fax: (866)315-1954

Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, Generic)

9.0


Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

    • Apple A12 Bionic w/ iOS 12
11/9/2018
  • ECDSA SigGen:
    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: DRBG #2449
2179
11/9/2018
    2178SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    (844) 436-2797

    CryptoComply Server Engine

    2.2


    CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

      • Intel Xeon E3 w/ CentOS 7
    11/9/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2177Riverbed Technology
    680 Folsom St
    San Francisco, CA 94107
    USA

    Mike De La Garrigue
    Mike.DeLaGarrigue@riverbed.com
    (805) 262-1655

    Derek Rosen
    Derek.rosen@riverbed.com
    (805) 262-1630

    AOS SSH Module

    XD-Crypto-1.0 (Firmware)


    SSH Component implements Key exchanges between server and client when the FIPS mode is enabled on the device. This provides confidentiality to the messages exchanged.

      • Cavium Octeon 7030
      • Cavium Octeon 7130
    11/9/2018
    • SSH:
      • SHA Functions: SHA-256
      • Prerequisite: SHS #4698
    2176Riverbed Technology
    680 Folsom St
    San Francisco, CA 94107
    USA

    Mike De La Garrigue
    Mike.DeLaGarrigue@riverbed.com
    (805) 262-1655

    Derek Rosen
    Derek.rosen@riverbed.com
    (805) 262-1630

    AOS Crypto Module

    XD-Crypto-1.0 (Firmware)


    Comprehensive module implementing various FIPS approved cryptographic algorithms using modified OpenSSL. This provides necessary crypto functionalities for the user space applications on the access points.

      • Cavium Octeon 7030
      • Cavium Octeon 7130
    11/9/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256
      • Prerequisite: SHS #4698, HMAC #3919
    2175Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS Crypto Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Broadcom BCM47452
    11/9/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2174Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS Crypto Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Broadcom BCM47452
    11/9/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 48-384 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #4697, HMAC #3918
    • IKEv2:
      • Derived Keying Material length: 1120-2688 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #4697, HMAC #3918
    2173RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    François Lamoureux
    francois.lamoureux@rsa.com
    +1 781 515 5025

    Tom Fowler
    tom.fowler@rsa.com
    +61 7 3032 5237

    RSA BSAFE Crypto Module

    1.0


    RSA BSAFE(R) Crypto Module 1.0 is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

      • Intel Core i7 with AES-NI w/ Windows Server 2016
      • Intel Core i7 without AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i5 without AES-NI w/ Windows 7 Enterprise SP1 x86
      • Intel Core i7 with AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i7 without AES-NI w/ Windows Server 2016
      • Intel Core i7 without AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i5 with AES-NI w/ Windows 10 Enterprise x86
      • Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 x86
      • Intel Core i5 without AES-NI w/ Windows 10 Enterprise x86
      • Intel Core i5 without AES-NI w/ Windows 7 Enterprise SP1 x64
      • Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 x64
    11/9/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2172RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    François Lamoureux
    francois.lamoureux@rsa.com
    +1 781 515 5025

    Tom Fowler
    tom.fowler@rsa.com
    +61 7 3032 5237

    RSA BSAFE Crypto Module

    1.0


    RSA BSAFE(R) Crypto Module 1.0 is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

      • Intel Core i7 without AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i5 with AES-NI w/ Windows 10 Enterprise x86
      • Intel Core i7 without AES-NI w/ Windows Server 2016
      • Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 x64
      • Intel Core i7 with AES-NI w/ Windows Server 2016
      • Intel Core i5 without AES-NI w/ Windows 7 Enterprise SP1 x64
      • Intel Core i7 without AES-NI w/ Windows 10 Enterprise x64
      • Intel Core i5 without AES-NI w/ Windows 7 Enterprise SP1 x86
      • Intel Core i5 with AES-NI w/ Windows 7 Enterprise SP1 x86
      • Intel Core i5 without AES-NI w/ Windows 10 Enterprise x86
      • Intel Core i7 with AES-NI w/ Windows 10 Enterprise x64
    11/9/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2171Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module

    1.0.1


    The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE w/ Linux 4.12.0
    11/9/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2170Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module

    1.0.1


    The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE w/ Linux 4.12.0
    11/9/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2169Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module

    1.0.1


    The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE w/ Linux 4.12.0
    11/9/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2493
    2168Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module

    1.0.1


    The Ixia Cryptographic Module is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE w/ Linux 4.12.0
    11/9/2018
    • ANS 9.63:
      • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 bits
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3915
    • SRTP:
      • AES Key Lengths: 128, 192, 256 bits
      • Prerequisite: AES #5940
    • SSH:
      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3915
    2167Ixia, a Keysight Business
    846 Higuera Street, Suite 2
    San Luis Obispo, CA 93401
    United States

    Fred Strelzoff
    fref.strelzoff@keysight.com
    (512) 600-5400

    Ixia Cryptographic Module for OpenSSL

    2.0.16


    The Ixia Cryptographic Module for OpenSSL is integrated into Ixia's network visibility platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Core i7-3555LE without PAA w/ Linux 4.12.0
      • Intel Core i7-3555LE with PAA w/ Linux 4.12.0
    11/9/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2166Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6220 w/ Lexmark Linux (64-bit)
    11/2/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2487
    2165Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6220 w/ Lexmark Linux (64-bit)
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256, SHA-512
      • Prerequisite: SHS #4689, HMAC #3912
    • IKEv2:
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256
      • Prerequisite: SHS #4689, HMAC #3912
    2164Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6270 w/ Lexmark Linux (64-bit)
    11/2/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2486
    2163Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6270 w/ Lexmark Linux (64-bit)
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256, SHA-512
      • Prerequisite: SHS #4688, HMAC #3911
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256
      • Prerequisite: SHS #4688, HMAC #3911
    2162Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6220 w/ Lexmark Linux (32-bit)
    11/2/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2485
    2161Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6220 w/ Lexmark Linux (32-bit)
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256, SHA-512
      • Prerequisite: SHS #4687, HMAC #3910
    • IKEv2:
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256
      • Prerequisite: SHS #4687, HMAC #3910
    2160Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6270 w/ Lexmark Linux (32-bit)
    11/2/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2484
    2159Lexmark International Inc.
    740 West New Circle Road
    Lexington, Kentucky 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Lexmark Crypto Core

    2.1


    Lexmark Crypto Core

      • Marvell 88PA6270 w/ Lexmark Linux (32-bit)
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256, SHA-512
      • Prerequisite: SHS #4686, HMAC #3909
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-256
      • Prerequisite: SHS #4686, HMAC #3909
    2158SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Windows Server 2012 R2
    11/2/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2157SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Red Hat Enterprise Linux 7
    11/2/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2156Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS Crypto Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Qualcomm IPQ8068
    11/2/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2155Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS Crypto Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Qualcomm IPQ4029
      • NXP QorIQ T1024
    11/2/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2154Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS Crypto Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • NXP QorIQ P10XX Series
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 48-384 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #2425, HMAC #1818
    • IKEv2:
      • Derived Keying Material length: 1120-2688 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #2425, HMAC #1818
    2153Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS Crypto Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Broadcom BCM53014A
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 48-384 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #2630, HMAC #2005
    • IKEv2:
      • Derived Keying Material length: 1120-2688 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #2630, HMAC #2005
    2152Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS OpenSSL Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • NXP QorIQ P10XX Series
    11/2/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2151Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS OpenSSL Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Qualcomm IPQ4029
      • NXP QorIQ T1024
    11/2/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2150Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS OpenSSL Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Broadcom BCM47452
    11/2/2018
    • RSASP1:
      • Modulus Size: 2048 bits
      • Padding Algorithms: PKCS 1.5
    2149Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Kevin Micciche
    kevin.micciche@hpe.com
    404-648-0062

    ArubaOS OpenSSL Module

    ArubaOS 8.2 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Broadcom BCM47452
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 48-384 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4682, HMAC #3906
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4682
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4682, HMAC #3906
    2148WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel e3-1225
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4676, HMAC #3900
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4676, HMAC #3900
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4676
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4676, HMAC #3900
    2147WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel i3-6100
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4675, HMAC #3899
    • IKEv2:
      • Derived Keying Material length: 1056-2048 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4675, HMAC #3899
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4675
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4675, HMAC #3899
    2146WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel G4400
    11/2/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4674, HMAC #3898
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4674, HMAC #3898
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4674
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4674, HMAC #3898
    2145WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel G3900
    10/26/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4672, HMAC #3896
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4672, HMAC #3896
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4672
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4672, HMAC #3896
    2144WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel C3558
    10/26/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4671, HMAC #3895
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4671, HMAC #3895
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4671
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4671, HMAC #3895
    2143WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel N3160
    10/26/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4670, HMAC #3894
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4670, HMAC #3894
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4670
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4670, HMAC #3894
    2142WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • Intel N3060
    10/26/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4669, HMAC #3893
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4669, HMAC #3893
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4669
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4669, HMAC #3893
    2141WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • NXP T1024
    10/26/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4668, HMAC #3892
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4668, HMAC #3892
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4668
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4668, HMAC #3892
    2140WatchGuard Technologies, Inc.
    505 Fifth Avenue South, Suite 500
    Seattle, Washington 98104
    USA

    Peter Eng
    Peter.Eng@watchguard.com
    206 613-6608
    Fax: 206 613-0888

    Firebox Cryptographic Module

    12.3 (Firmware)


    WatchGuard Firebox appliances provide security services, from intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches, while also providing secure Virtual Private Network (VPN) connections for remote users.

      • NXP P1010
    10/26/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 8-504 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4667, HMAC #3891
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 3072 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4667, HMAC #3891
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1
      • Prerequisite: SHS #4667
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4667, HMAC #3891
    2139Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC Java Cryptographic Library

    1.0 (Firmware)


    The MC Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center firmware developed specifically for use in the Management Center appliances.

      • Intel E5 2418L
    10/26/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4666
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4666, HMAC #3890
    2138Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC SSH Library

    1.0 (Firmware)


    The MC SSH Library provides the necessary SSH key derivation functionality for use in Management Center.

      • Intel E5 2418L
    10/26/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4665
    2137Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC OS Cryptographic Library

    1.0 (Firmware)


    The MC OS Cryptographic Library provides the necessary cryptographic services for the Management Center firmware developed specifically for use in the Management Center appliances.

      • Intel E5 2418L
    10/26/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4665, HMAC #3889
    2136Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC OS Cryptographic Library

    1.0 (Firmware)


    The MC OS Cryptographic Library provides the necessary cryptographic services for the Management Center firmware developed specifically for use in the Management Center appliances.

      • Intel E5 2418L
    10/26/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4665, DRBG #2469
    • KAS FFC:
      • Functions: Full Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4665, DRBG #2469
    2135Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC VA Java Cryptographic Library

    1.0


    The MC VA Java Cryptographic Library provides the necessary cryptographic services for Java the Management Center software developed specifically for use in the Management Center appliances.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4663
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4663, HMAC #3887
    2134Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    VA MC SSH Library

    1.0


    The VA MC SSH Library provides the necessary SSH key derivation functionality for use in Management Center.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4661
    2133Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC VA OS Cryptographic Library

    1.0


    The MC VA OS Cryptographic Library provides the necessary cryptographic services for the Management Center software developed specifically for use in the Management Center appliances.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4661, HMAC #3885
    2132Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    MC VA OS Cryptographic Library

    1.0


    The MC VA OS Cryptographic Library provides the necessary cryptographic services for the Management Center software developed specifically for use in the Management Center appliances.

      • Intel E5 4620v4 w/ RHEL 6.9 on ESXi 6.0
    10/26/2018
    • KAS ECC:
      • Functions: Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4661, DRBG #2466
    • KAS FFC:
      • Functions: Full Public Key Validation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4661, DRBG #2466
    2131Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (Palo Alto Networks VM-Series and Panorama Virtual Appliances)

    8.1


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-Series and Panorama Virtual Appliances.

      • Intel Multi Core Xeon w/ Azure
      • Intel Multi Core Xeon w/ CentOS 7.2 - KVM
      • Intel Multi Core Xeon w/ AWS EC2
      • Intel Multi Core Xeon w/ Google Cloud Platform
      • Intel Multi Core Xeon w/ VMware ESXi 5.5
      • Intel Multi Core Xeon w/ Hyper-V 2012 r2
    10/22/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2130Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (Palo Alto Networks VM-Series and Panorama Virtual Appliances)

    8.1


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-Series and Panorama Virtual Appliances.

      • Intel Multi Core Xeon w/ VMware ESXi 5.5
      • Intel Multi Core Xeon w/ Hyper-V 2012 r2
      • Intel Multi Core Xeon w/ CentOS 7.2 - KVM
      • Intel Multi Core Xeon w/ Azure
      • Intel Multi Core Xeon w/ AWS EC2
      • Intel Multi Core Xeon w/ Google Cloud Platform
    10/22/2018
    • IKEv1:
      • Methods: Pre-shared Key
      • Pre-shared Key Length: 48-2040 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4658, HMAC #3882
    • IKEv2:
      • Derived Keying Material length: 800-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4658, HMAC #3882
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4658
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4658, HMAC #3882
    2129Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (Palo Alto Networks VM-Series and Panorama Virtual Appliances)

    8.1


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-Series and Panorama Virtual Appliances.

      • Intel Multi Core Xeon w/ VMware ESXi 5.5
      • Intel Multi Core Xeon w/ AWS EC2
      • Intel Multi Core Xeon w/ CentOS 7.2 - KVM
      • Intel Multi Core Xeon w/ Google Cloud Platform
      • Intel Multi Core Xeon w/ Azure
      • Intel Multi Core Xeon w/ Hyper-V 2012 r2
    10/22/2018
    • ECDSA SigGen:
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2464
    2128Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (Palo Alto Networks VM-Series and Panorama Virtual Appliances)

    8.1


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-Series and Panorama Virtual Appliances.

      • Intel Multi Core Xeon w/ AWS EC2
      • Intel Multi Core Xeon w/ Hyper-V 2012 r2
      • Intel Multi Core Xeon w/ Google Cloud Platform
      • Intel Multi Core Xeon w/ CentOS 7.2 - KVM
      • Intel Multi Core Xeon w/ VMware ESXi 5.5
      • Intel Multi Core Xeon w/ Azure
    10/22/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4658, ECDSA #1575, DRBG #2464
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4658, DSA #1497, DRBG #2464
    2127Cisco Systems, Inc.
    170 W. Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Adaptive Security Appliance (ASA)

    9.6


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
    10/22/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-512
            • ED:
              • Curve: P-384
              • SHA: SHA-512
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4435, ECDSA #1485, DRBG #2188
    2126Cisco Systems, Inc.
    170 W. Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Adaptive Security Appliance (ASA) OS

    9.6


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Xeon E5 w/ ESXi 5.5 w/ n/a
    10/22/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #3579, ECDSA #1573, DRBG #1386
    2125Totemo AG
    Freihofstrasse 22
    Kuesnacht, Zuerich 8700
    Switzerland

    Marcel Mock
    marcel.mock@totemo.com
    +41 (0) 44 914 9900

    Totemo Cryptographic Module (TCM)

    3.0


    The Totemo Cryptographic Module supplies the cryptographic services required by the Totemo Security Platform (TSP) and the Totemo products which provides secure email, file transfer, and mobile messaging solutions. These solutions secure all types of communication without any infrastructure prerequisites.

      • Intel Xeon E3-1225v3 w/ Totemo Appliance OS 2.3 with JRE 8.0
    10/19/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2124NETSCOUT Systems, Inc.
    310 Littleton Road
    Westford, MA 01886
    USA

    Steve Swidrak
    Stephen.Swidrak@netscout.com

    NetScout FIPS Object Module

    1.0


    This cryptographic library provides cryptographic services to NETSCOUT products.

      • Intel Xeon Gold w/ Linux 3.10
    10/19/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    • KAS ECC:
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-224
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4656, ECDSA #1571, DRBG #2462
    2123Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Bhanu Parlapalli
    bhanu.parlapalli@gigamon.com

    Gigamon Linux-Based Cryptographic Module

    1.0 (Firmware)


    The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

      • P2041
    10/19/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4457
    2122Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600)

    8.1 (Firmware)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600.

      • Cavium Octeon MIPS64
      • Intel i7
      • Intel Multi Core Xeon
      • Intel Pentium
      • Cavium MIPS64
      • Intel Celeron
    10/19/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2451
    2121Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600)

    8.1 (Firmware)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600.

      • Intel Pentium
      • Intel i7
      • Intel Celeron
      • Cavium Octeon MIPS64
      • Cavium MIPS64
      • Intel Multi Core Xeon
    10/19/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2120Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600)

    8.1 (Firmware)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600.

      • Cavium Octeon MIPS64
      • Cavium MIPS64
      • Intel Pentium
      • Intel i7
      • Intel Multi Core Xeon
      • Intel Celeron
    10/19/2018
    • IKEv1:
      • Methods: Pre-shared Key
      • Pre-shared Key Length: 48-2040 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4641, HMAC #3865
    • IKEv2:
      • Derived Keying Material length: 800-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4641, HMAC #3865
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4641
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4641, HMAC #3865
    2119Palo Alto Networks
    3000 Tannery Way
    Santa Clara, California 95054
    USA

    Amir Shahhosseini
    ashahhosse@paloaltonetworks.com
    408-753-4000

    Jake Bajic
    jbajic@paloaltonetworks.com
    408-753-4000

    Palo Alto Networks Crypto Module (PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600)

    8.1 (Firmware)


    The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-220R, PA-500, PA-800, PA-3000, PA-3200, PA-5000, PA-5200 and PA-7000 Series firewalls, WF-500 and Panorama M-100/M-200/M-500/M-600.

      • Intel i7
      • Intel Multi Core Xeon
      • Intel Pentium
      • Intel Celeron
      • Cavium Octeon MIPS64
      • Cavium MIPS64
    10/19/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4641, ECDSA #1570, DRBG #2451
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4641, DSA #1485, DRBG #2451
    2118GE MDS, LLC
    175 Science Parkway
    Rochester, NY 14620
    USA

    Aaron Wright
    aaron.wright@ge.com
    585-242-8354
    Fax: 585-241-5590

    Alex Charissis
    alex.charissis@ge.com
    585-242-8402
    Fax: 585-241-5590

    Mocana DSF

    5.5-gc64c6d83 (Firmware)


    Cryptographic algorithm API and self-test routines implemented by Mocana, Inc.

      • Freescale IMX 6 (ARM)
    10/19/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256
      • Prerequisite: SHS #4639, HMAC #3864
    2117Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • AMD Ryzen5 w/ Windows 2016 64 bits
    10/12/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2116Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ Windows 10 rs3 32 bits
    10/12/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2115Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for ARM (iOS12, A12 Bionic, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A12 Bionic w/ iOS 12
    10/12/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4638, ECDSA #1567, DRBG #2449, HMAC #3863
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4638, DSA #1481, DRBG #2449
    2114Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    10/12/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4634, HMAC #3860
    2113Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    10/12/2018
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4634, ECDSA #1566, DRBG #2437
    2112Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); MsBignum Cryptographic Implementations

    10.0.17134


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
      • Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
      • Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
    10/12/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2111Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); SymCrypt Cryptographic Implementations

    10.0.17134


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
      • Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
      • Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
      • Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
      • Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
      • Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
    10/5/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2110Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, April 2018 Update and Windows Server, Windows Server Datacenter (version 1803); SymCrypt Cryptographic Implementations

    10.0.17134


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and without SHA Extensions w/ Microsoft Surface Go
      • Windows 10 Home April 2018 Update (x86) w/ Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro LTE
      • Windows 10 Education April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows Server Core on Hyper-V on Windows Server 2016 (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core m5 with AES-NI and without SHA Extensions w/ Dell Latitude 12 Rugged Tablet
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio
      • Windows 10 Enterprise April 2018 Update (x64) w/ Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Pro April 2018 Update (x64)
      • Windows Server Datacenter Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows Server Datacenter Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows Server Standard Core (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290
      • Windows Server Standard Core on Hyper-V on Windows Server (x64) w/ Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT
      • Windows 10 Pro April 2018 Update (x64) w/ Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop
    10/5/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #4633, HMAC #3858
    • IKEv2:
      • Derived Keying Material length: 192-1792 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 256 bits
          • SHA Functions: SHA-256
        • Diffie-Hellman shared secret:
          • Length: 384 bits
          • SHA Functions: SHA-384
      • Prerequisite: SHS #4633, HMAC #3858
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4633, HMAC #3858
    2109Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS Mojave 10.14
    10/5/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2397
    2108Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel CoreM w/ macOS Mojave 10.14
    10/5/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2396
    2107Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i9 w/ macOS Mojave 10.14
    10/5/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2394
    2106Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS Mojave 10.14
    10/5/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2395
    2105Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS Mojave 10.14
    10/5/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2393
    2104Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ Windows 10 rs3 64 bits
    10/5/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2103Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ Mac OS 10.13
    10/5/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2102Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ CentOS 7.4 64 bits
    10/5/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2101Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
    10/5/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2100Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - OpenSSL

    Junos OS 17.4R1-S1


    The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

      • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
    10/5/2018
    • KAS ECC:
      • Functions: Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4263, ECDSA #1390, DRBG #2044
    2099Redpine Signals, Inc.
    2107, North First Street. Suite # 540
    San Jose, CA 95131-2019
    USA

    Mallik Reddy
    mreddy@redpinesignals.com
    +1 408 219 7868
    Fax: +1 408 705 2019

    RSICryptoLib

    Redpine ThreadArch RSICryptoLib_1_0 (Firmware)


    DH routine in RSICryptoLib implements key agreement and key establishment methodology. This routine uses DRBG of RSICryptoLib implementation.

      • ThreadArch RS9113
    10/5/2018
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-256
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #2628, DSA #1474, DRBG #907
    2098Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    securitycertifications@gemalto.com

    Gemalto FIPS Object Module

    2.1.0


    The Gemalto FIPS Object Module is a hardened version of the general purpose OpenSSL FIPS Object module designed to provide FIPS 140-2 validated cryptographic functionality.

      • Qualcomm APQ8064 (ARMv7) w/ Android 4.4
      • Qualcomm MSM8996pro Snapdragon 821 (ARMv8) w/ Android 7.1
      • Apple A6 (ARMv7) w/ IOS 10.3
      • Qualcomm MSM8998 Snapdragon 835 (ARMv8) w/ Android 8.1
      • Apple A11 (ARMv8) w/ IOS 11.4
      • Samsung Exynos7420 (ARMv8) w/ Android 5.1
      • Qualcomm MSM8994 Snapdragon 810(ARMv8) w/ Android 6.0
      • Qualcomm APQ8064 (ARMv7) without PAA w/ Android 4.4
      • Apple A8 (ARMv8) w/ IOS 9.3
    9/28/2018
    • ECC CDH:
      • Primitive
      • Curves: P-224, P-256, P-384, P-521
    2097Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, Xeon, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS Mojave 10.14
    9/28/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4614, ECDSA #1557, DRBG #2397
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4614, DSA #1472, DRBG #2397
    2096Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, CoreM, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel CoreM w/ macOS Mojave 10.14
    9/28/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4613, ECDSA #1556, DRBG #2396
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4613, DSA #1471, DRBG #2396
    2095Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i7, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS Mojave 10.14
    9/28/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4612, ECDSA #1555, DRBG #2395
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4612, DSA #1470, DRBG #2395
    2093Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i9, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i9 w/ macOS Mojave 10.14
    9/28/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4611, ECDSA #1554, DRBG #2394
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4611, DSA #1469, DRBG #2394
    2092Apple Inc.
    One Apple Park Way
    MS: 927-1CPS
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Stephanie Motre Martin
    smotre@apple.com
    (408)750-6235
    Fax: (866)315-1954

    Apple CoreCrypto Module v9.0 for Intel (macOS Mojave 10.14, i5, Generic)

    9.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS Mojave 10.14
    9/28/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4610, ECDSA #1553, DRBG #2393
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4610, DSA #1468, DRBG #2393
    2091Autotalks
    4 Meir Ariel St. Grand Netter, Building, POB 3846
    Netanya 40593
    Israel

    Ron Ioszpe
    ron.ioszpe@auto-talks.com
    +972-9-886-5300
    Fax: +972-9-886-5372

    Guy Fried
    guy.fried@auto-talks.com
    +972-9-886-5300
    Fax: +972-9-886-5327

    PKA

    2.1.2 (Firmware)


    Autotalks Hardware Security Module provide a FIPS 140-2 Level 3 certified, hardened, tamper-resistant environment for secure cryptographic processing needed for Automotive Vehicle-to-Everything communication systems including: ECC Public Key cryptography, Symmetric key cryptography, Key protection, TRNG/DRBG

      • Simulator: Cadence NC-Verilog
    9/28/2018
    • ECDSA SigGen:
      • P-224 SHA: SHA-224
      • P-256 SHA: SHA-256
      • P-384 SHA: SHA-384
      • Prerequisite: DRBG #2390
    2090ICU Medical
    600 N. Field Drive
    Lake Forest, IL 60045
    USA

    Chaitanya Srinivasamurthy
    Chaitanya.srinivasamurthy@icumed.com
    +1 224-706-2518

    Mark Rohlwing
    Mark.Rohlwing@icumed.com
    +1 480-570-2097

    ICU Medical Lifecare PCA Crypto Library

    lifecare-pca-fips-2.0.16-trunk CL# 649181 (Firmware)


    ICU Medical Lifecare PCA Crypto Library provides secure communication for the Lifecare PCA Infusion Pumps.

      • Net Silicon NS7520 ARM7
    9/21/2018
    • RSADP:
      • Modulus Size: 2048 bits
    2089ICU Medical
    600 N. Field Drive
    Lake Forest, IL 60045
    USA

    Chaitanya Srinivasamurthy
    Chaitanya.srinivasamurthy@icumed.com
    +1 224-706-2518

    Mark Rohlwing
    Mark.Rohlwing@icumed.com
    +1 480-570-2097

    ICU Medical Lifecare PCA Crypto Library

    lifecare-pca-fips-2.0.16-trunk CL# 649181 (Firmware)


    ICU Medical Lifecare PCA Crypto Library provides secure communication for the Lifecare PCA Infusion Pumps.

      • Net Silicon NS7520 ARM7
    9/21/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4588, HMAC #3814
    2088ICU Medical
    600 N. Field Drive
    Lake Forest, IL 60045
    USA

    Chaitanya Srinivasamurthy
    Chaitanya.srinivasamurthy@icumed.com
    +1 224-706-2518

    Mark Rohlwing
    Mark.Rohlwing@icumed.com
    +1 480-570-2097

    ICU Medical Lifecare PCA Crypto Library

    lifecare-pca-fips-2.0.16-trunk CL# 649181 (Firmware)


    ICU Medical Lifecare PCA Crypto Library provides secure communication for the Lifecare PCA Infusion Pumps.

      • Net Silicon NS7520 ARM7
    9/21/2018
    • KAS ECC:
      • Functions: Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-512
            • EC:
              • Curve: P-256
              • SHA: SHA-512
            • ED:
              • Curve: P-384
              • SHA: SHA-512
            • EE:
              • Curve: P-521
              • SHA: SHA-512
        • One Pass DH:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EB:
              • Curve: P-224
              • SHA: SHA-512
            • EC:
              • Curve: P-256
              • SHA: SHA-512
            • ED:
              • Curve: P-384
              • SHA: SHA-512
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4588, ECDSA #1550, DRBG #2361
    2087MobileIron, Inc
    410 East Middlefield Road
    Mountain View, CA 94043
    USA

    Anthony Ungerman
    ps-certifications <ps-certifications@mobileiron.co
    +1.877.819.3451
    Fax: +1.650.919.8006

    MobileIron Mobile@Work client for Android

    OpenSSL 1.0.2h, FIPS 2.0.12


    General purpose cryptographic services available for Android used by the Mobile@Work client to provide secure cryptography

      • Qualcomm MSM8996 Snapdragon 820 on Samsung Galaxy S7 w/ Android 7
      • Qualcomm MSM8998 Snapdragon 835 on Samsung Galaxy Note 8 w/ Android 7
      • Qualcomm SDM845 Snapdragon 845 on Samsung Galaxy S9+ w/ Android 8
      • Qualcomm MSM8996 Snapdragon 820 on Samsung Galaxy Tab S3 w/ Android 7
      • Qualcomm MSM8998 Snapdragon 835 on Samsung Galaxy S8 w/ Android 8
    9/21/2018
    • KAS ECC:
      • Functions: Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
            • EE:
              • Curve: P-521
              • SHA: SHA-512
      • Prerequisite: SHS #4570, ECDSA #1549, DRBG #2311
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FB:
              • SHA: SHA-224
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4570, DSA #1466, DRBG #2311
    2086F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    Eric Raisters
    E.Raisters@f5.com
    206-272-7580

    Cryptographic Module for BIG-IP with AES and SHA assembler

    13.1.1


    Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

      • Intel (R) Xeon (R) E5-2697 w/ BIG-IP 13.1.1 on VMware ESXi 6.5
    9/21/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384
    • KAS ECC:
      • Functions: Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4568, ECDSA #1548, DRBG #2309
    2085F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    Eric Raisters
    206-272-7580
    206-272-7580

    Cryptographic Module for BIG-IP with AES and SHA assembler

    13.1.1


    Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

      • Intel (R) Xeon(R) E5-2660 w/ BIG-IP 13.1.1 on Hyper-V 10.0 on Windows Server 2016
    9/21/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384
    • KAS ECC:
      • Functions: Key Pair Generation, Partial Public Key Validation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
            • ED:
              • Curve: P-384
              • SHA: SHA-384
      • Prerequisite: SHS #4566, ECDSA #1547, DRBG #2307
    2084Beijing Sansec Technology Development Co., Ltd
    26F No.3 Building, Triumph Center, No.170 Beiyuan Road
    Chaoyang District
    Beijing, Beijing 100101
    China

    Yongxin Xu
    xuyongxin@sansec.com.cn
    +86 186 6080 5090

    Sansec HSM - CSM Library

    1.0.12 (Firmware)


    The CSM library implements cryptographic algorithms for data encryption, data decryption, signature generation, signature verification, message digest, message authentication code (MAC), and random number generation. The CMS library is part of the Sansec Hardware Security Module (HSM).

      • Intel G3260
    9/21/2018
    • ECDSA SigGen:
      • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: DRBG #2306
    2083Microsec PTE LTD
    83B Rowell Road
    Singapore, Singapore 208015
    Singapore

    Magzhan Ikram
    mikram@usec.io
    69314227

    Vishram Mishra
    Vishram@usec.io
    69314227

    MICROSEC_KeyManagement_Module

    1.00 (Firmware)


    Key agreement system based on ECCDHE is used for key management on a secure ecosystem for IOT and sensor network.

      • ARM Cortex M0 - ATSAMD21g18a
      • AVR - ATMega2560
    9/21/2018
    • KAS ECC:
      • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
      • Schemes:
        • Ephemeral Unified:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • EC:
              • Curve: P-256
              • SHA: SHA-256
      • Prerequisite: SHS #4563, ECDSA #1545, DRBG #2305
    2082Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 Libreswan

    R7-2.0.0


    Oracle Linux 7 Libreswan Cryptographic Module is a framework for providing cryptographic services to other network entities implementing the IKEv1 and IKEv2 protocols.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    9/21/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 256-512 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4535, HMAC #3767
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4535, HMAC #3767
    2081Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 Libreswan

    R6-1.0.0


    Oracle Linux 6 Libreswan Cryptographic Module is a framework for providing cryptographic services to other network entities implementing the IKEv1 and IKEv2 protocols.

      • Intel® Xeon® Silver 4114 w/ Oracle Linux 6.9 64 bit
    9/21/2018
    • IKEv1:
      • Methods: Digital Signature, Pre-shared Key
      • Pre-shared Key Length: 256-512 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4391, HMAC #3628
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 224 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 8192 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4391, HMAC #3628
    2080Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
    312 Kings Way
    South Melbourne, Victoria 3025
    Australia

    John Weston
    john.weston@senetas.com
    +61 3 9868 4555
    Fax: +61 3 9821 4899

    CN6000 Series Common Crypto Library

    5.0.1 (Firmware)


    The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

      • Intel ATOM
    9/21/2018
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4561
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4561, HMAC #3790
    2079Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
    312 Kings Way
    South Melbourne, Victoria 3025
    Australia

    John Weston
    john.weston@senetas.com
    +61 3 9868 4555
    Fax: +61 3 9821 4899

    CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library

    5.0.1 (Firmware)


    The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services.

      • ARM Cortex A9
    9/14/2018
    • SNMP:
    • SSH:
      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4560
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384
      • Prerequisite: SHS #4560, HMAC #3789
    2078Berryville Holdings, LLC
    2465 Centerville Road
    #J17-812
    Herndon, VA 20171
    USA

    Cael Jacobs
    cael@bvhllc.com
    (703) 782-9840

    Chava Jurado
    chava@bvhllc.com
    (703) 782-9840

    Cryptographic Module for Fognigma

    2.0.16


    The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)

      • ARM Cortex-A53 without PAA w/ Raspbian Stretch
      • Intel® Xeon E5 without PAA w/ Ubuntu 16.04
      • ARM Cortex-A53 with PAA w/ Raspbian Stretch
      • Intel® Xeon E5 with PAA w/ Ubuntu 16.04
    9/14/2018
    • ECC CDH:
      • Primitive
      • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
    2077Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 NSS without AES-NI

    R7-2.0.0


    Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    9/14/2018
    • TLS:
      • Supports TLS 1.0/1.1
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4535, HMAC #3767
    2076Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Cavium Octeon CN7240
    9/14/2018
    • IKEv2:
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1
      • Prerequisite: SHS #4555, HMAC #3784
    • SNMP:
    • SRTP:
      • AES Key Lengths: 128, 192, 256 bits
      • Prerequisite: AES #5683
    • SSH:
      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4555
    • TLS:
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4555, HMAC #3784
    2075Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Cavium Octeon CN7240
    9/14/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
    2074Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

      • N/A
    9/14/2018
    • IKEv2:
      • Derived Keying Material length: 1056-3072 bits
      • Diffie-Hellman shared secrets:
        • Diffie-Hellman shared secret:
          • Length: 2048 bits
          • SHA Functions: SHA-1
      • Prerequisite: SHS #4554, HMAC #3783
    • SNMP:
    • SRTP:
      • AES Key Lengths: 128, 192, 256 bits
      • Prerequisite: AES #5682
    • SSH:
      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4554
    • TLS:
      • Supports TLS 1.2:
        • SHA Functions: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4554, HMAC #3783
    2073Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

      • N/A
    9/14/2018
    • ECC CDH:
      • Primitive
      • Curves: P-256, P-384, P-521
    • KAS FFC:
      • Functions: Key Pair Generation
      • Schemes:
        • dhEphem:
          • Key Agreement Roles: Initiator, Responder
          • Parameter Sets:
            • FC:
              • SHA: SHA-256
      • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
    2072Sonus Networks, Inc.
    4 Technology Park Drive
    Westford, MA 01886
    USA

    Adam Elshama
    aelshama@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Keith Conger
    KConger@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Sonus TLS KDF Library

    3.1 (Firmware)


    Sonus Session Border Controller FIPS-validated TLS implementation

      • Intel Xeon (Ivy Bridge)
    9/14/2018
    • TLS:
      • Supports TLS 1.2:
        • SHA Functions: SHA-256
      • Prerequisite: HMAC #3780
    2071Sonus Networks, Inc.
    4 Technology Park Drive
    Westford, MA 01886
    USA

    Adam Elshama
    aelshama@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Keith Conger
    KConger@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Sonus SSH KDF Library

    3.1 (Firmware)


    Sonus Session Border Controller FIPS-validated SSH KDF implementation.

      • Intel Xeon (Ivy Bridge)
    9/14/2018
    • SSH:
      • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4550
    2070Sonus Networks, Inc.
    4 Technology Park Drive
    Westford, MA 01886
    USA

    Adam Elshama
    aelshama@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Keith Conger
    KConger@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Sonus SNMP KDF Library

    3.1 (Firmware)


    Sonus Session Border Controller FIPS-validated SNMP KDF implementation.

      • Intel Xeon (Ivy Bridge)
    9/14/2018
    • SNMP:
    2069
    9/14/2018
      2067Symantec Corporation
      350 Ellis Street
      Mountain View, CA 94043
      USA

      Ian Hall
      ian_hall@symantec.com
      703-598-6876

      Diana Robinson
      diana_robinson@symantec.com
      845-454-6397

      Web Isolation SSH Library

      1.0


      The Web Isolation SSH Library provides the necessary SSH key derivation functionality for use in the Web Isolation Virtual Appliance.

        • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
      9/14/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4551
      2066Symantec Corporation
      350 Ellis Street
      Mountain View, CA 94043
      USA

      Ian Hall
      ian_hall@symantec.com
      703-598-6876

      Diana Robinson
      diana_robinson@symantec.com
      845-454-6397

      Web Isolation Cryptographic Library

      1.0


      The Web Isolation Cryptographic Library provides the necessary cryptographic services specifically for use in the Web Isolation Virtual Appliance.

        • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
      9/14/2018
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4551, HMAC #3781
      2065Symantec Corporation
      350 Ellis Street
      Mountain View, CA 94043
      USA

      Ian Hall
      ian_hall@symantec.com
      703-598-6876

      Diana Robinson
      diana_robinson@symantec.com
      845-454-6397

      Web Isolation Cryptographic Library

      1.0


      The Web Isolation Cryptographic Library provides the necessary cryptographic services specifically for use in the Web Isolation Virtual Appliance.

        • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
      9/14/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4551, DRBG #2296
      • KAS FFC:
        • Functions: Full Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4551, DRBG #2296
      2064Sonus Networks, Inc.
      4 Technology Park Drive
      Westford, MA 01886
      USA

      Adam Elshama
      aelshama@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Keith Conger
      KConger@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Sonus Cryptographic Library

      3.1 (Firmware)


      Sonus Session Border Controller FIPS-validated cryptographic software module

        • Intel Xeon (Ivy Bridge)
      9/14/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      2063Sonus Networks, Inc.
      4 Technology Park Drive
      Westford, MA 01886
      USA

      Adam Elshama
      aelshama@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Keith Conger
      KConger@rbbn.com
      1-855-GO-SONUS
      Fax: 978-614-8101

      Sonus Cryptographic Media Processor

      3.1 (Firmware)


      Sonus Session Border Controller FIPS-validated cryptographic media module

        • Cavium OCTEON II CN6800
      9/14/2018
      • SRTP:
        • AES Key Lengths: 128 bits
        • Prerequisite: AES #5676
      2062Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine using the EYL QRNG

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      9/7/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4478, HMAC #3715
      2061Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      9/7/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4477, HMAC #3714
      2060Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2609
      9/7/2018
      • IKEv2:
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1
        • Prerequisite: SHS #4546, HMAC #3777
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 bits
        • Prerequisite: AES #5675
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4546
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4546, HMAC #3777
      2059Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2609
      9/7/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
      2058Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2680
      9/7/2018
      • IKEv2:
        • Derived Keying Material length: 1056-3072 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1
        • Prerequisite: SHS #4545, HMAC #3776
      • SNMP:
      • SRTP:
        • AES Key Lengths: 128, 192, 256 bits
        • Prerequisite: AES #5674
      • SSH:
        • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4545
      • TLS:
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4545, HMAC #3776
      2057Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      (919) 392-6520

      CiscoSSL FIPS Object Module

      6.2 (Firmware)


      The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

        • Intel Xeon E5-2680
      9/7/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
      2056NETSCOUT Systems, Inc.
      310 Littleton Road
      Westford, MA 01886
      USA

      Steve Swidrak
      Stephen.Swidrak@netscout.com

      NetScout FIPS Object Module

      1.0


      This cryptographic library provides cryptographic services to NETSCOUT products.

        • Intel Xeon X5620 with AES-NI w/ Linux 2.6.39.1
        • Intel Xeon E5 Series with AES-NI w/ Linux 3.7.5
        • Intel Xeon E5-2608L v3 with AES-NI w/ ArbOS 7.0
        • Intel Xeon E5-2697 v3 with AES-NI w/ Linux 3.10
      9/4/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4543, ECDSA #1535, DRBG #2291
      2055Klas Telecom
      1101 30th Street NW, Suite 500
      Washington, DC 20007
      USA

      Toby Stidham
      toby.stidham@klastelecom.com
      352-406-0560

      Cian Masterson
      cian.masterson@klastelecom.com

      OpenSSL 1.0.1h without a FIPS object module

      1.0.1h


      Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

        • Marvell Prestera 98DX8212 w/ Linux 3.10.70
      9/4/2018
      • RSADP:
        • Modulus Size: 2048 bits
      2054Klas Telecom
      1101 30th Street NW, Suite 500
      Washington, DC 20007
      USA

      Toby Stidham
      toby.stidham@klastelecom.com
      352-406-0560

      Cian Masterson
      cian.masterson@klastelecom.com

      OpenSSL 1.0.1h without a FIPS object module

      1.0.1h


      Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

        • Marvell Prestera 98DX8212 w/ Linux 3.10.70
      9/4/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4542
      2053Klas Telecom
      1101 30th Street NW, Suite 500
      Washington, DC 20007
      USA

      Toby Stidham
      toby.stidham@klastelecom.com
      352-406-0560

      Cian Masterson
      cian.masterson@klastelecom.com

      OpenSSL 1.0.1h without a FIPS object module

      1.0.1h


      Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

        • Marvell Prestera 98DX8212 w/ Linux 3.10.70
      9/4/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384
      • KAS ECC:
        • Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4542, ECDSA #1534, DRBG #2290
      • KAS FFC:
        • Functions: Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-256, SHA-384
              • FC:
                • SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4542, DSA #1467, DRBG #2290
      2052SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel i7 w/ Windows Server 2012 R2
        • Intel i7 w/ Red Hat Enterprise Linux 7
      9/4/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
        • Prerequisite: SHS #4531, ECDSA #1524, DRBG #2281
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4531, DSA #1450, DRBG #2281
      2051KeyPair Consulting Inc.
      846 Higuera Street
      Suite 2
      San Luis Obispo, CA 93401
      USA

      Mark Minnoch
      mark@keypair.us
      805-316-5024

      Steve Weymann
      steve@keypair.us
      805-316-5024

      KeyPair Cryptographic Module for OpenSSL

      2.0.16


      The KeyPair Cryptographic Module for OpenSSL expands the list of Tested Configurations (operating system + processor) for the OpenSSL FIPS Object Module v2.0. Please contact KeyPair Consulting to include your desired operating system as a Tested Configuration on a FIPS 140-2 certificate branded in your company's name.

        • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 6
        • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 7
        • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 7
        • Nvidia Tegra X1 with PAA w/ Android 8.1
        • Nvidia Tegra X1 without PAA w/ Android 8.1
        • Intel Xeon E5-2430L (x86) with PAA w/ Ubuntu 16.04
        • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 6
        • Intel Xeon E5-2430L (x86) without PAA w/ Ubuntu 16.04
      9/4/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      2050Extreme Networks
      6480 Via Del Oro
      San Jose, CA 95119
      USA

      Sunil Chitnis
      schitnis@extremenetworks.com
      408-352-2407

      Joey Salanga
      jsalanga@extremenetworks.com
      408-352-2439

      Extreme FIPS Cryptographic Library

      2.1 (Firmware)


      The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

        • Freescale E500mc
      9/4/2018
      • SNMP:
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4540
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4540, HMAC #3771
      2049Extreme Networks
      6480 Via Del Oro
      San Jose, CA 95119
      USA

      Sunil Chitnis
      schitnis@extremenetworks.com
      408-352-2407

      Joey Salanga
      jsalanga@extremenetworks.com
      408-352-2439

      Extreme FIPS Cryptographic Library

      2.1 (Firmware)


      The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

        • Freescale E500mc
      9/4/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      2048Ciena Corporation
      7035 Ridge Road
      Hanover, MD 21076
      USA

      Kevin Meagher
      kmeagher@ciena.com
      1-410-865-8936

      OpenSSL FIPS Object Module

      2.0.12


      Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

        • Cavium OCTEON II CN6xxx w/ SAOS 6.17
      8/27/2018
      • KAS ECC:
        • Functions: Domain Parameter Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4539, ECDSA #1531, DRBG #2287
      2047Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      SafeNet Accelerated Cryptographic Library

      1.0 (Firmware)


      The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

        • Andretta 2.0
      8/27/2018
      • ECDSA SigGen:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4533, DRBG #2283
      2046Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 NSS without AES-NI

      R7-2.0.0


      Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      8/27/2018
      • KAS ECC:
        • Functions: Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4535, ECDSA #1528, DRBG #2284
      • KAS FFC:
        • Functions: Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4535, DSA #1454, DRBG #2284
      2045IBM Corporation
      1701 North Street
      Endicott, NY 13760
      USA

      AIX FIPS Security
      aixfips@in.ibm.com

      AIX FIPS Crypto Module for OpenSSL

      2.0.16


      The AIX FIPS Crypto Module for OpenSSL is supported on AIX for the Power 7, Power 8 and Power 9 platforms.

        • IBM Power9 (PPC) without PAA w/ AIX 7.2 64-bit
        • IBM Power9 (PPC) with PAA w/ AIX 7.2 32-bit
        • IBM Power9 (PPC) with PAA w/ AIX 7.2 64-bit
        • IBM Power9 (PPC) without PAA w/ AIX 7.2 32-bit
      8/17/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      2044Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      SafeNet Cryptographic Library

      1.0 (Firmware)


      The SafeNet Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

        • Andretta 2.0
      8/17/2018
      • RSADP:
        • Modulus Size: 2048 bits
      2043Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      securitycertifications@gemalto.com

      SafeNet Accelerated Cryptographic Library

      1.0 (Firmware)


      The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

        • Andretta 2.0
      8/17/2018
      • RSADP:
        • Modulus Size: 2048 bits
      2042ECI Telecom Ltd
      30 Hasivim Street
      Petach Tikvah 49517
      Israel

      Milind Barve
      milind.barve@ecitele.com
      +91-80-67122000
      Fax: +91-80-67122001

      ECI (OS) Crypto Library

      2.0.16


      ECI (OS) Crypto Library

        • PowerPC w/ Linux
      8/17/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      2041Cambium Networks
      3800 Golf Road
      Suite 360
      Rolling Meadows, IL 60008
      USA

      Mark Thomas
      mark.thomas@cambiumnetworks.com
      +44 1364 655500
      Fax: +44 1364 654625

      Nithin Kotekar
      nithin.kotekar@cambiumnetworks.com
      +91 080 67333162

      PTP700-Net-SNMP

      01.00 (Firmware)


      SNMP Key Derivation is used to derive the shared secret key for SNMP agent.

        • TI TMS320C6657 - Multicore Fixed and Floating-Point DSP
      8/17/2018
      • SNMP:
      2040Cambium Networks
      3800 Golf Road
      Suite 360
      Rolling Meadows, IL 60008
      USA

      Mark Thomas
      mark.thomas@cambiumnetworks.com
      +44 1364 655500
      Fax: +44 1364 654625

      Nithin Kotekar
      nithin.kotekar@cambiumnetworks.com
      +91 080 67333162

      PTP700-MatrixSSL

      01.00 (Firmware)


      MatrixSSL v3.8.1a third party TLS library supports variety of cryptographic algorithm implementations to provide confidentiality, integrity, authentication and data transport security services.

        • TI TMS320C6657 - Multicore Fixed and Floating-Point DSP
      8/17/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4528, HMAC #3761
      2039Blue Cedar
      325 Pacific Avenue
      San Francisco, CA 94111
      USA

      FIPS Admin
      fips@bluecedar.com
      415-329-0401

      Blue Cedar Cryptographic Module

      2.0.16


      The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

        • Nvidia Tegra X1 with PAA w/ Android 8.1
        • Nvidia Tegra X1 without PAA w/ Android 8.1
        • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
        • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
      8/10/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      2038Q Core Medical Ltd.
      29 Yad Harutsim St.
      Netanya 4250529
      Israel

      Nimrod Schweitzer
      nimrod.schweitzer@qcore.com
      +972-73-2388839
      Fax: +972-73-2388800

      Lee Aydelotte
      laydelotte@silexamerica.com
      801-676-8673
      Fax: 714-258-0730

      QCore OpenSSL FIPS Object Module 2.0.9

      2.0.9


      QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

        • NXP i.MX280 ARM w/ Linux 2.6.35
      8/10/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      2037Sony Imaging Products & Solutions Inc.
      1-7-1 Konan
      Minato-ku, Tokyo 108-0075
      JAPAN

      Toshiaki Ouchi
      sips-pssg-b2b-fipsinfo@sony.com
      +81 50 3140 9893

      Hirokazu Morishita
      sips-pssg-b2b-fipsinfo@sony.com
      +81 50 3140 1739

      Sony IMB TLSKDF Core-SH

      1.0.0 (Firmware)


      Sony IMB TLSKDF Core-SH is the firmware module for digital cinema system.

        • Renesas Electronics Corporation SH7724
      8/10/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Prerequisite: SHS #4522, HMAC #3756
      2035Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      66005f41fbc3529ffe8d007708756720529da20d


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 without PAA w/ Ubuntu Linux 18.04
        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
      8/2/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4509, HMAC #3743
      2034Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      66005f41fbc3529ffe8d007708756720529da20d


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • POWER9 without PAA w/ Ubuntu Linux 18.04
      8/2/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2253
      2033Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      66005f41fbc3529ffe8d007708756720529da20d


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • POWER9 without PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      8/2/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4509, ECDSA #1520, DRBG #2253
      2032Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      libreswan (KDF 800-135) - generic CPU

      6.0


      KDF for Intel x86_64 bit for the IKE protocol

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      8/2/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 256-512 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4498, HMAC #3734
      • IKEv2:
        • Derived Keying Material length: 1056-3072 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4498, HMAC #3734
      2031Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 XLP-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Broadcom XLP432
      8/2/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4503, DRBG #2248
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4503, DRBG #2248
      2030Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 QuickSec-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 8-2040 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4503, HMAC #3739
      • IKEv2:
        • Derived Keying Material length: 960-1792 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 256 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384
          • Diffie-Hellman shared secret:
            • Length: 384 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384
        • Prerequisite: SHS #4503, HMAC #3739
      2029Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 OpenSSL-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #402
      2028Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton, Strategic Delivery Director
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Geetha Naik, Certification Program Manager
      ngeetha@juniper.net
      +91-80-61214404

      JUNOS 18.2R1 OpenSSL-MX104

      Junos OS 18.2R1 (Firmware)


      MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

        • Freescale P5021
      8/2/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4502, ECDSA #1516, DRBG #2248
      2027Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4499, HMAC #3735
      2026Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4499, ECDSA #1515, DRBG #2246
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4499, DSA #1442, DRBG #2026
      2025Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4498, HMAC #3734
      2024Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4498, ECDSA #1514, DRBG #2245
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4498, DSA #1441, DRBG #2245
      2023Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      3218c1db82718a54e4d41de493d006eaa3ba445c


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4496, HMAC #3733
      2022Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      3218c1db82718a54e4d41de493d006eaa3ba445c


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      7/27/2018
      • ECDSA SigGen:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2244
      2021Google, Inc.
      1600 Amphitheatre Parkway
      Mountain View, CA 94043
      USA

      Adam Langley
      security@chromium.org

      BoringCrypto

      3218c1db82718a54e4d41de493d006eaa3ba445c


      A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

        • POWER9 with PAA w/ Ubuntu Linux 18.04
        • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
        • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
        • POWER9 without PAA w/ Ubuntu Linux 18.04
      7/27/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4496, ECDSA #1512, DRBG #2244
      2020Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4491, HMAC #3728
      2019Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (64 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4491, ECDSA #1511, DRBG #2236
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4491, DSA #1440, DRBG #2236
      2018Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4490, HMAC #3727
      2017Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4490, ECDSA #1510, DRBG #2235
      2016Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4489, HMAC #3726
      2015Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      Red Hat NSS Softoken (32 bit) - generic CPU

      6.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

        • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4489, ECDSA #1509, DRBG #2234
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4489, DSA #1438, DRBG #2234
      2014Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSH Server/Client - generic CPU

      6.0


      SP 800-135 KDF for Intel x86 64-bit

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4193
      2013Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4488, HMAC #3725
      2011Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4487, HMAC #3724
      2010Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4487, ECDSA #1507, DRBG #2232
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4487, DSA #1436, DRBG #2232
      2009Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4484, HMAC #3721
      2008Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4483, HMAC #3720
      2007Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4480, HMAC #3717
      2006Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      7/27/2018
      • KAS ECC:
        • Functions: Full Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4480, ECDSA #1506, DRBG #2225
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4480, DSA #1435, DRBG #2225
      2005Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine using the EYL QRNG

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      7/27/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-256
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4478, ECDSA #1505, DRBG #2224
      2004Allegro Software Development Corporation
      1740 Massachusetts Avenue
      Boxborough, MA 01719
      USA

      Bob Van Andel
      bva@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Loren Shade
      loren@allegrosoft.com
      978-264-6600
      Fax: 978-266-1375

      Allegro Cryptographic Engine

      6.31


      The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

        • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
        • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      7/27/2018
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-256
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-512
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4477, ECDSA #1504, DRBG #2223
      2003Entrust Datacard Corporation
      Two Lincoln Centre
      5420 LBJ Freeway Suite 300
      Dallas, TX 75240
      USA

      John Gray
      John.Gray@entrustdatacard.com

      John Mahoney
      John.Mahoney@entrustdatacard.com

      Entrust Authority™ Security Toolkit for the Java® Platform RSA 1.0

      1.0


      The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

        • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
      7/20/2018
      • RSADP:
        • Modulus Size: 2048 bits
      2002Entrust Datacard Corporation
      Two Lincoln Centre
      5420 LBJ Freeway Suite 300
      Dallas, TX 75240
      USA

      John Gray
      John.Gray@entrustdatacard.com

      John Mahoney
      John.Mahoney@entrustdatacard.com

      Entrust Authority™ Security Toolkit for the Java® Platform RSA 1.0

      1.0


      The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

        • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
      7/20/2018
      • RSASP1:
        • Modulus Size: 2048 bits
        • Padding Algorithms: PKCS 1.5
      2001Entrust Datacard Corporation
      Two Lincoln Centre
      5420 LBJ Freeway Suite 300
      Dallas, TX 75240
      USA

      John Gray
      John.Gray@entrustdatacard.com

      John Mahoney
      John.Mahoney@entrustdatacard.com

      Entrust Authority™ Security Toolkit for the Java® Platform KDF 1.0

      1.0


      The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

        • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
      7/20/2018
      • ANS 9.63:
        • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4475
      2000Entrust Datacard Corporation
      Two Lincoln Centre
      5420 LBJ Freeway Suite 300
      Dallas, TX 75240
      USA

      John Gray
      John.Gray@entrustdatacard.com

      John Mahoney
      John.Mahoney@entrustdatacard.com

      Entrust Authority™ Security Toolkit for the Java® Platform EC 1.0

      1.0


      The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

        • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
      7/20/2018
      • ECC CDH:
        • Primitive
        • Curves: P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4475, ECDSA #1502
      1999HP Inc.
      11311 Chinden Blvd
      Boise, Idaho 83714-0021
      USA

      Gerardo Colunga
      gerardo.del.colunga@hp.com
      208-333-5607

      Chris Gunning
      chris.gunning@hp.com
      208-333-6785

      HP FutureSmart QuickSec

      5.1 (Firmware)


      HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

        • Arm Cortex-A8
      7/20/2018
      • KAS ECC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4474, ECDSA #1501, DRBG #2220
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-256
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4474, DSA #1432, DRBG #2220
      1998Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSH

      1.0


      The Nutanix Cryptographic Library for OpenSSH provides the KDF for SSH.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • SSH:
        • SHA Functions: SHA-1, SHA-256, SHA-512
        • Prerequisite: SHS #4465
      1997Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSL

      1.0


      The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • RSADP:
        • Modulus Size: 2048 bits
      1996Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSL

      1.0


      The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4465, HMAC #3708
      1995Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSL

      1.0


      The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: DRBG #2216
      1994Nutanix
      1740 Technology Drive, Suite 150
      San Jose, CA 95110
      USA

      Eric Hammersley
      fips@nutanix.com

      Ashutosh Pangasa
      fips@nutanix.com

      Nutanix Cryptographic Library for OpenSSL

      1.0


      The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

        • Intel E5-2620 w/PAA w/ CentOS 7.4
      7/20/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
          • One Pass DH:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4465, ECDSA #1499, DRBG #2216
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4465, DSA #1429, DRBG #2216
      1993Elster GmbH
      Strothweg 1
      Lotte (Buren) 49504
      Germany

      Michael Habermann
      michael.habermann@honeywell.com
      +49-541-1214-215
      Fax: +49-541-1214-595

      Markus Bölter
      markus.boelter@honeywell.com
      +49-541-1214-114
      Fax: +49-541-1214-595

      elster_cv

      02.02.01 (Firmware)


      elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

        • STM32L152RE
      7/20/2018
      • ECDSA SigGen:
        • P-256 SHA: SHA-256
        • Prerequisite: DRBG #2210
      1992Elster GmbH
      Strothweg 1
      Lotte (Buren) 49504
      Germany

      Michael Habermann
      michael.habermann@honeywell.com
      +49-541-1214-215
      Fax: +49-541-1214-595

      Markus Bölter
      markus.boelter@honeywell.com
      +49-541-1214-114
      Fax: +49-541-1214-595

      elster_cv

      02.02.01 (Firmware)


      elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

        • STM32L152RE
      7/20/2018
      • ECC CDH:
        • Primitive
        • Curves: P-256
      1991Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Bhanu Parlapalli
      bhanu.parlapalli@gigamon.com

      Gigamon Linux-Based Cryptographic Module

      1.0 (Firmware)


      The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

        • Intel Atom C Series
        • P2020
        • P2041
      7/13/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4457, ECDSA #1497, DRBG #2209
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4457, DSA #1428, DRBG #2209
      1990International Business Machines
      1702 North Street
      Building 256-3
      Endicott, NY 13760
      USA

      Brian W. Hugenbruch
      bwhugen@us.ibm.com
      607-429-3660

      IBM z/VM System SSL

      V6.4


      z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

        • IBM z13 w/ IBM z/VM V6.4
      7/13/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4456, HMAC #3701
      1989International Business Machines
      1702 North Street
      Building 256-3
      Endicott, NY 13760
      USA

      Brian W. Hugenbruch
      bwhugen@us.ibm.com
      607-429-3660

      IBM z/VM System SSL

      V6.4


      z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

        • IBM z13 w/ IBM z/VM V6.4
      7/13/2018
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
          • dhOneFlow:
            • Key Agreement Roles: Initiator, Responder
          • dhStatic:
            • Key Agreement Roles: Initiator, Responder
        • Prerequisite: SHS #4456, DSA #1427, DRBG #2208
      1988SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Inside Sales
      sales@safelogic.com
      844-436-2797

      CryptoComply Server Engine

      2.1


      SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

        • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
      7/13/2018
      • KAS ECC:
        • Functions: Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
        • Prerequisite: SHS #4455, ECDSA #1496, DRBG #2207
      • KAS FFC:
        • Functions: Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4455, DSA #1426, DRBG #2207
      1987Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat OpenSSL (64bit)

      5.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384
        • Prerequisite: SHS #4450, HMAC #3695
      1986Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat OpenSSL (64bit)

      5.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • KAS ECC:
        • Functions: Full Public Key Validation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4450, ECDSA #1495, DRBG #2199
      • KAS FFC:
        • Functions: Partial Public Key Validation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FB:
                • SHA: SHA-224
              • FC:
                • SHA: SHA-256
        • Prerequisite: SHS #4450, DSA #1425, DRBG #2199
      1985Sierra Nevada Corporation
      444 Salomon Circle
      Sparks, NV 89434
      USA

      Kevin Streander
      Kevin.Streander@sncorp.com
      303-566-9687
      Fax: 775-331-0370

      Red Hat NSS Softoken (64bit)

      5.0


      User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

        • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
      7/13/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4449, HMAC #3694
      1984Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Chunsheng Xie
      chunsheng.xie@gigamon.com

      Cavium OpenSSL Library

      1.0.2d (Firmware)


      The ECC CDH, ECDSA and TLS KDF cryptographic algorithms provided by Cavium OpenSSL Library provide data security across GigaSmart cards in Gigamon HC2 Appliance.

        • Cavium CN6880
      7/13/2018
      • TLS:
        • Supports TLS 1.0/1.1
        • Supports TLS 1.2:
          • SHA Functions: SHA-256
        • Prerequisite: SHS #2023, HMAC #1455
      1983Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Chunsheng Xie
      chunsheng.xie@gigamon.com

      Cavium OpenSSL Library

      1.0.2d (Firmware)


      The ECC CDH, ECDSA and TLS KDF cryptographic algorithms provided by Cavium OpenSSL Library provide data security across GigaSmart cards in Gigamon HC2 Appliance.

        • Cavium CN6880
      7/13/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      1982Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      libreswan (KDF 800-135)

      6.0


      KDF for Intel x86_64 bit for the IKE protocol

        • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
      7/13/2018
      • IKEv1:
        • Methods: Digital Signature, Pre-shared Key
        • Pre-shared Key Length: 256-512 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4300, HMAC #3546
      • IKEv2:
        • Derived Keying Material length: 1056-3072 bits
        • Diffie-Hellman shared secrets:
          • Diffie-Hellman shared secret:
            • Length: 224 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 8192 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Diffie-Hellman shared secret:
            • Length: 2048 bits
            • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4300, HMAC #3546
      1981Gigamon Inc.
      3300 Olcott Street
      Santa Clara, CA 95054
      USA

      Bhanu Parlapalli
      bhanu.parlapalli@gigamon.com

      Gigamon Linux-Based Cryptographic Module

      1.0


      The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

        • P2020 w/ CentOS 5.8
        • P2041 w/ CentOS 5.8
        • Intel Atom C Series w/ CentOS 6.6
      7/13/2018
      • ECC CDH:
        • Primitive
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
      • KAS ECC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • Ephemeral Unified:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • EB:
                • Curve: P-224
                • SHA: SHA-224
              • EC:
                • Curve: P-256
                • SHA: SHA-256
              • ED:
                • Curve: P-384
                • SHA: SHA-384
              • EE:
                • Curve: P-521
                • SHA: SHA-512
        • Prerequisite: SHS #4447, ECDSA #1492, DRBG #2196
      • KAS FFC:
        • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
        • Schemes:
          • dhEphem:
            • Key Agreement Roles: Initiator, Responder
            • Parameter Sets:
              • FC:
                • SHA: SHA-256
          • MQV1:
          • Prerequisite: SHS #4447, DSA #1423, DRBG #2196
        1980Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Allen Ting
        yting@juniper.net
        408-858-5008

        Mounir Hahad
        mhahad@juniper.net

        CryptoCore

        1.0


        Cryptographic module to support the cryptographic functionalities for Juniper products.

          • Intel Core i5 w/ Ubuntu Linux 14.04
          • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
          • Intel Xeon E5 family w/ Ubuntu Linux 14.04
        7/13/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1979Thales e-security
        900 South Pine Island Road
        Suite 710
        Plantation, Florida 33324
        USA

        Natalya Robert
        natalya.robert@thalesesec.com
        954-888-6268

        Robert Burns
        robert.burns@thalesesec.com
        954-888-6215

        Vormetric Data Security Manager Virtual Appliance Module

        6.0.2


        The Vormetric Data Security Manager Virtual Appliance is a multi-chip standalone software cryptographicmodule operating in virtualization environment. The Vormetric Data Security Manager is the central pointof management for the Vormetric Data Security product. It manages keys and policies, and controls VTE.

          • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5
        7/13/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4443, HMAC #3688
        1978Thales e-security
        900 South Pine Island Road
        Suite 710
        Plantation, Florida 33324
        USA

        Natalya Robert
        natalya.robert@thalesesec.com
        954-888-6268

        Robert Burns
        robert.burns@thalesesec.com
        954-888-6215

        Vormetric Data Security Manager Module

        6.0.2 (Firmware)


        Vormetric Data Security Manager Module is a multi-chip standalone software cryptographicmodule operating in virtualization environment. The Vormetric Data Security Manager is the central pointof management for the Vormetric Data Security product. It manages keys and policies, and controls VTE.

          • Intel Xeon
        7/13/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4442, HMAC #3687
        1977Infosec Global Inc.
        2225 Sheppard Avenue East
        Suite 1402
        Toronto, Ontario M2J 5C2
        Canada

        Brian Neill
        brian.neill@infosecglobal.com
        416-492-3333
        Fax: 647-343-6933

        Ian Laidlaw
        ian.laidlaw@infosecglobal.com
        416-492-3333
        Fax: 647-343-6933

        AgileSec FIPS Provider 1.0

        1.0


        AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

          • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
          • Intel Core i5 CPU with AES-NI w/ OSX 10.12
          • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
          • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
          • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
          • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
          • Intel Core i5 CPU without AES-NI w/ OSX 10.12
          • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
          • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
          • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
          • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
        7/13/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1976Accellion, Inc.
        1804 Embarcadero Road
        Suite 200
        Palo Alto, Ca 94303
        USA

        Frank Balonis
        frank.balonis@accellion.com
        650-485-4300

        Sim Han Seah
        hanseah@accellion.com
        +65 6244 5678

        Accellion Cryptographic Module

        2.0.16


        The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

          • Intel Xeon E5 without PAA w/ CentOS 6
          • Intel Xeon E5 with PAA w/ CentOS 6
        7/6/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1975SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Inside Sales
        sales@safelogic.com
        844-436-2797

        CryptoComply for Java

        3.0.1


        SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

          • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
          • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
        7/6/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1974SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Inside Sales
        sales@safelogic.com
        844-436-2797

        CryptoComply for Java

        3.0.1


        SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

          • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
          • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
        7/6/2018
        • ANS 9.63:
          • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4439
        • IKEv2:
          • Derived Keying Material length: 160-8192 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4439, HMAC #3684
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5532
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4439
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4439, HMAC #3684
        1973SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Inside Sales
        sales@safelogic.com
        844-436-2797

        CryptoComply for Java

        3.0.1


        SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

          • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
          • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
        7/6/2018
        • ECDSA SigGen:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4439, DRBG #2190
        1972SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Inside Sales
        sales@safelogic.com
        844-436-2797

        CryptoComply for Java

        3.0.1


        SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

          • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
          • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
        7/6/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1971Virtual Instruments
        2331 Zanker Road
        San Jose, CA 95131
        USA

        Susanta Pattanayak
        Susanta.pattanayak@virtualinstruments.com
        +1 408 579 4000

        Jay Nitikman
        Jay.nitikman@virtualinstruments.com
        +1 408 579 4000

        Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

        v5.7 (Firmware)


        The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

          • Intel Broadwell Xeon without AES-NI
        6/29/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4436, ECDSA #1486, DRBG #2189
        1970Cisco Systems, Inc.
        170 W. Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        Adaptive Security Appliance (ASA)

        9.6


        The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

          • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
        6/29/2018
        • IKEv2:
          • Derived Keying Material length: 800-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4435, HMAC #3680
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4435
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4435, HMAC #3680
        1969Harris Corporation
        1680 University Avenue
        Rochester, NY 14610
        USA

        Chris Wood
        cwood06@harris.com
        585-720-8730
        Fax: 585-241-8459

        Esther Betancourt
        ebetanco@harris.com
        585-242-3635
        Fax: 585-241-8459

        Harris Broadband Ethernet Radio GPP Cryptographic Library

        6.0 (Firmware)


        This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products

          • Broadcom XLS108
        6/29/2018
        • SNMP:
        • SSH:
          • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4434
        • TLS:
          • Supports TLS 1.0/1.1
          • Prerequisite: SHS #4434, HMAC #3679
        1968Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone Controller Java Crypto Library

        1.0


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
          • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
        6/29/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1967Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone Controller Java Crypto Library

        1.0


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
          • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
        6/29/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4433
        1966Information Security Corporation
        1011 Lake St. Suite 425
        Oak Park, IL 60118
        USA

        Jonathan Schulze-Hewett
        schulze-hewett@infoseccorp.com
        708-445-1704
        Fax: 708-445-9705

        Michael Markowitz
        markowitz@infoseccorp.com
        708-445-1704
        Fax: 708-445-9705

        ISC Cryptographic Development Kit (CDK)

        8.0


        The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

          • Intel Core i7 with AES-NI w/ Windows Server 2012 R2/64-bit
        6/29/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384, P-521
        1965Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Ingrid Barker
        ibarker@juniper.net

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        18.1R1 - OpenSSL

        18.1R1 (Firmware)


        The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

          • Intel Xeon E312xx Sandy Bridge
        6/29/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4432
        1964Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Ingrid Barker
        ibarker@juniper.net

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        18.1R1 - OpenSSL

        18.1R1 (Firmware)


        The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

          • Intel Xeon E312xx Sandy Bridge
        6/29/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4432, ECDSA #1484, DRBG #2184
        1963Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 17.4R1 - OpenSSL

        17.4R1 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon III (CN7020)
        6/29/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4431
        1962Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (3305)

        6.4.1.20056.fips.8 (Firmware)


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon E5
        6/29/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 112-224 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4424, HMAC #3669
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4424, HMAC #3669
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4424
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4424, HMAC #3669
        1961Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (3305)

        6.4.1.20056.fips.8 (Firmware)


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon E5
        6/29/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-224
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4424, ECDSA #1482, DRBG #2181
        • KAS FFC:
          • Functions: Full Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4424, DSA #1415, DRBG #2181
        1960Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (2101)

        6.4.1.20056.fips.8 (Firmware)


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon D
        6/29/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 112-224 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4423, HMAC #3668
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4423, HMAC #3668
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4423
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4423, HMAC #3668
        1959Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (2101)

        6.4.1.20056.fips.8 (Firmware)


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon D
        6/29/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Prerequisite: SHS #4423, ECDSA #1481, DRBG #2180
        • KAS FFC:
          • Functions: Full Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4423, DSA #1414, DRBG #2180
        1958Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (1101)

        6.4.1.20056.fips.8 (Firmware)


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Pentium D
        6/29/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 112-2048 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4422, HMAC #3667
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4422, HMAC #3667
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4422
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4422, HMAC #3667
        1957Forcepoint
        10900-A Stonelake Blvd.
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (1101)

        6.4.1.20056.fips.8 (Firmware)


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Pentium D
        6/29/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-224
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4422, ECDSA #1480, DRBG #2179
        • KAS FFC:
          • Functions: Full Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4422, DSA #1413, DRBG #2179
        1956Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        OpenSSL - EX4300

        Junos OS 17.4 R1-S4 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

          • Freescale e500mc
        6/22/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4421
        1955ST Microelectronics (Protonworld)
        Green Square Building B, Lambroekstraat 5
        Diegem/Machelen B-1831
        Belgium

        Olivier COLLART
        olivier.collart@st.com
        +32 272 450 77
        Fax: +32 272 451 43

        Fabien ARRIVE
        fabien.arrive@st.com
        +33 223 470 633
        Fax: +33 223 470 400

        ST33TPHF2EI2C

        49.09 (Firmware)


        ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications.

          • SecureCore SC300
        6/22/2018
        1954Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 18.1R1 RE1800 - OpenSSL

        Junos OS 18.1R1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon (Jasper Forest Family)
        6/22/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4416
        1953Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 18.1R1 RE1800 - OpenSSL

        Junos OS 18.1R1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon (Jasper Forest Family)
        6/22/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4416, ECDSA #1477, DRBG #2173
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4416, DRBG #2173
        1952Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 18.1R1 MX: MS MPC-XLP

        Junos OS 18.1R1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Broadcom XLP832
        6/22/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4415, ECDSA #1476, DRBG #2173
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4415, DRBG #2173
        1951Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 18.1R1 RE1800 - Quicksec

        Junos OS 18.1R1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon (Jasper Forest Family)
        6/22/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-2040 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4414, HMAC #3655
        • IKEv2:
          • Derived Keying Material length: 960-1792 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4414, HMAC #3655
        1950Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 17.4R1-S1 RE1800-Quicksec

        Junos OS 17.4 R1-S1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon (Jasper Forest Family)
        6/15/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-2048 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4411, HMAC #3652
        • IKEv2:
          • Derived Keying Material length: 960-1792 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4411, HMAC #3652
        1949Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 17.4R1-S1 RE1800-OpenSSL

        Junos OS 17.4 R1-S1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

          • Intel Xeon (Jasper Forest Family)
        6/15/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4409
        1948Silvus Technologies
        10990 Wilshire Blvd.
        STE 1500
        Los Angeles, CA 90024
        USA

        Ajit Warrier
        ajit@silvustechnologies.com
        310-479-3333 ext 41
        Fax: 310-479-2225

        Weijun Zhu
        weijun@silvustechnologies.com
        310-479-3333 ext 27
        Fax: 310-479-2225

        Silvus Crypto Module

        3.15.1 (Firmware)


        The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

          • Xilinx Zynq-7000
        6/15/2018
        • SSH:
          • SHA Functions: SHA-512
          • Prerequisite: SHS #4406
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4406, HMAC #3647
        1947CyberArk Software Ltd.
        9 Hapsagot St. Park Ofer 2
        P.O.B. 3143
        Petach-Tikva 4951040
        Israel

        Yariv Oren
        yariv.oren@gmail.com
        +972-3-918-0000x2258
        Fax: +972-3-924-0111

        Elad Moshe
        elad.moshe@cyberark.com
        +972-3-918-0000x2378
        Fax: +972-3-924-0111

        CyberArk Privileged Account Security TLS Library for Windows

        1.0


        The CyberArk Privileged Account Security TLS Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libssl library. It is incorporated into the family of CyberArk applications.

          • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
        6/15/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4404, HMAC #3645
        1946CyberArk Software Ltd.
        9 Hapsagot St. Park Ofer 2
        P.O.B. 3143
        Petach-Tikva 4951040
        Israel

        Yariv Oren
        yariv.oren@gmail.com
        +972-3-918-0000x2258
        Fax: +972-3-924-0111

        Elad Moshe
        elad.moshe@cyberark.com
        +972-3-918-0000x2378
        Fax: +972-3-924-0111

        CyberArk Privileged Account Security Windows SSH Server Cryptographic Module

        1.0


        The CyberArk Privileged Account Security Windows SSH Server is a general purpose SSH server compiled from the source code of the OpenSSH for Windows application. It is incorporated into the CyberArk Privileged Session Manager.

          • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
        6/15/2018
        • SSH:
          • SHA Functions: SHA-256, SHA-512
          • Prerequisite: SHS #4404
        1945CyberArk Software Ltd.
        9 Hapsagot St. Park Ofer 2
        P.O.B. 3143
        Petach-Tikva 4951040
        Israel

        Yariv Oren
        yariv.oren@gmail.com
        +972-3-918-0000x2258
        Fax: +972-3-924-0111

        Elad Moshe
        elad.moshe@cyberark.com
        +972-3-918-0000x2378
        Fax: +972-3-924-0111

        CyberArk Privileged Account Security Cryptographic Library for Windows

        1.0


        The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

          • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
        6/15/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4404, ECDSA #1473, DRBG #2162
        1944CyberArk Software Ltd.
        9 Hapsagot St. Park Ofer 2
        P.O.B. 3143
        Petach-Tikva 4951040
        Israel

        Yariv Oren
        yariv.oren@gmail.com
        +972-3-918-0000x2258
        Fax: +972-3-924-0111

        Elad Moshe
        elad.moshe@cyberark.com
        +972-3-918-0000x2378
        Fax: +972-3-924-0111

        CyberArk Privileged Account Security TLS Library for Linux

        1.0


        The CyberArk Privileged Account Security TLS Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libssl library. It is incorporated into the family of CyberArk applications.

          • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
        6/15/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4403, HMAC #3644
        1943CyberArk Software Ltd.
        9 Hapsagot St. Park Ofer 2
        P.O.B. 3143
        Petach-Tikva 4951040
        Israel

        Yariv Oren
        yariv.oren@gmail.com
        +972-3-918-0000x2258
        Fax: +972-3-924-0111

        Elad Moshe
        elad.moshe@cyberark.com
        +972-3-918-0000x2378
        Fax: +972-3-924-0111

        CyberArk Privileged Account Security Linux SSH Client Cryptographic Module

        1.0


        The CyberArk Privileged Account Security Linux SSH Client is a general purpose SSH client compiled from the source code of the OpenSSH for Linux application. It is incorporated into the Privileged Session Manager SSH Proxy.

          • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
        6/15/2018
        • SSH:
          • SHA Functions: SHA-256, SHA-512
          • Prerequisite: SHS #4403
        1942CyberArk Software Ltd.
        9 Hapsagot St. Park Ofer 2
        P.O.B. 3143
        Petach-Tikva 4951040
        Israel

        Yariv Oren
        yariv.oren@gmail.com
        +972-3-918-0000x2258
        Fax: +972-3-924-0111

        Elad Moshe
        elad.moshe@cyberark.com
        +972-3-918-0000x2378
        Fax: +972-3-924-0111

        CyberArk Privileged Account Security Cryptographic Library for Linux

        1.0


        The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

          • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
        6/15/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4403, ECDSA #1472, DRBG #2161
        1941Securosys SA
        Forrlibuckstrasse 70
        Zurich, Zurich 8005
        Switzerland

        Marcel Dasen
        dasen@securosys.ch
        +41 44 552 31 33

        Robert Rogenmoser
        roro@securosys.ch
        +41 44 552 31 11

        Primus HSM Cryptographic Library

        XC7K160T 2.5.3 (Firmware)


        Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

          • Marvell Armada XP PJ4Bv7
        6/15/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2160
        1940Securosys SA
        Forrlibuckstrasse 70
        Zurich, Zurich 8005
        Switzerland

        Marcel Dasen
        dasen@securosys.ch
        +41 44 552 31 33

        Robert Rogenmoser
        roro@securosys.ch
        +41 44 552 31 11

        Primus HSM Cryptographic Library

        XC7K160T 2.5.3 (Firmware)


        Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

          • Marvell Armada XP PJ4Bv7
        6/15/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1939Securosys SA
        Forrlibuckstrasse 70
        Zurich, Zurich 8005
        Switzerland

        Marcel Dasen
        dasen@securosys.ch
        +41 44 552 31 33

        Robert Rogenmoser
        roro@securosys.ch
        +41 44 552 31 11

        Primus HSM Cryptographic Library

        XC7K160T 2.5.3 (Firmware)


        Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

          • Marvell Armada XP PJ4Bv7
        6/15/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1938Securosys SA
        Forrlibuckstrasse 70
        Zurich, Zurich 8005
        Switzerland

        Marcel Dasen
        dasen@securosys.ch
        +41 44 552 31 33

        Robert Rogenmoser
        roro@securosys.ch
        +41 44 552 31 11

        Primus HSM Cryptographic Library

        XC7K160T 2.5.3 (Firmware)


        Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

          • Marvell Armada XP PJ4Bv7
        6/15/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1937Trend Micro Inc.
        11305 Alterra Parkway
        Austin, TX 78758
        USA

        Paul Tucker
        paul_tucker@trendmicro.com
        512-633-7945

        Trend Micro, TippingPoint Crypto Core OpenSSL

        2.0.13


        The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

          • Intel Core i3 without AES-NI w/ Linux 4.4
          • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
          • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
          • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
          • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
          • Intel Xeon E5 with AES-NI w/ Linux 4.4
        6/15/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-256
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4401, ECDSA #1470, DRBG #2159
        1936ST Microelectronics (Protonworld)
        Green Square Building B, Lambroekstraat 5
        Diegem/Machelen B-1831
        Belgium

        Olivier COLLART
        olivier.collart@st.com
        +32 272 450 77
        Fax: +32 272 451 43

        Fabien ARRIVE
        fabien.arrive@st.com
        +33 223 470 633
        Fax: +33 223 470 400

        ST33TPHF2ESPI

        49.08 (Firmware)


        ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) version 1.2 and version 2.0 specifications.

          • SecureCore SC300
        6/15/2018
        1935Arista Networks Inc.
        5453 Great America Pkwy
        Santa Clara, CA 95054
        USA

        Richard Whitney
        rw@arista.com
        703-627-6092
        Fax: 408-538-8920

        Ethan Rahn
        erahn@arista.com
        408-547-5825

        EOS MACsec Hybrid Firmware v1.0

        1.0 (Firmware)


        The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

          • Intel Pentium B9
          • Intel Xeon D-1500
          • AMD GE Series
          • AMD GX Series
          • Intel Xeon E3
        6/15/2018
        • ECDSA SigGen:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2158
        1934Arista Networks Inc.
        5453 Great America Pkwy
        Santa Clara, CA 95054
        USA

        Richard Whitney
        rw@arista.com
        703-627-6092
        Fax: 408-538-8920

        Ethan Rahn
        erahn@arista.com
        408-547-5825

        EOS MACsec Hybrid Firmware v1.0

        1.0 (Firmware)


        The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

          • AMD GE Series
          • AMD GX Series
          • Intel Xeon D-1500
          • Intel Xeon E3
          • Intel Pentium B9
        6/15/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1933Arista Networks Inc.
        5453 Great America Pkwy
        Santa Clara, CA 95054
        USA

        Richard Whitney
        rw@arista.com
        703-627-6092
        Fax: 408-538-8920

        Ethan Rahn
        erahn@arista.com
        408-547-5825

        EOS MACsec Hybrid Firmware v1.0

        1.0 (Firmware)


        The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

          • Intel Xeon E3
          • AMD GX Series
          • Intel Pentium B9
          • Intel Xeon D-1500
          • AMD GE Series
        6/15/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4399
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4399, HMAC #3636
        1932Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Geetha Naik, Certification Program Manager
        ngeetha@juniper.net
        +91-80-61214404

        JUNOS 18.1R1 MTRE-XLP

        Junos OS 18.1R1 (Firmware)


        Juniper MX and EX9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

          • Broadcom XLP832
        6/15/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4397, ECDSA #1468, DRBG #2147
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4397, DRBG #2147
        1931Taisys Technologies Co. Ltd.
        7F., No.56, Lane 321
        Yangguang St., Neihu Dist.
        Taipei, Taipei 11491
        Taiwan (R.O.C.)

        Joe Wang
        joe.wang@taisys.com
        +886-2-26270927x6699
        Fax: +886-2-26270619

        Kent Horng
        kent.horng@taisys.com
        +886-2-26562185 #206
        Fax: +886-2-26579657

        TAISYS JUISE-S2-COS

        32 53 (Firmware)


        The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

          • SC300
        6/15/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1930ViaSat, Inc.
        6155 El Camino Real
        Carlsbad, CA 92009
        USA

        David Suksumrit
        david.suksumrit@viasat.com
        760-476-2200
        Fax: 760-929-3941

        Lorenzo Page
        lorenzo.page@viasat.com
        760-893-4198

        NetSNMP KDF

        5.7.1 EBEM Patch 2 (Firmware)


        SHA-1 based KDF used by NetSNMP

          • IBM PowerPC 405GPr
        6/15/2018
        • SNMP:
        1929ViaSat, Inc.
        6155 El Camino Real
        Carlsbad, CA 92009
        USA

        David Suksumrit
        david.suksumrit@viasat.com
        760-476-2200
        Fax: 760-929-3941

        Lorenzo Page
        lorenzo.page@viasat.com
        760-893-4198

        OpenSSH Algorithms

        6.1p1 EBEM Patch 1 (Firmware)


        KDF implementation in OpenSSH.

          • IBM PowerPC 405GPr
        6/15/2018
        • SSH:
          • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4394
        1928ViaSat, Inc.
        6155 El Camino Real
        Carlsbad, CA 92009
        USA

        David Suksumrit
        david.suksumrit@viasat.com
        760-476-2200
        Fax: 760-929-3941

        Lorenzo Page
        lorenzo.page@viasat.com
        760-893-4198

        OpenSSH Algorithms

        6.1p1 EBEM Patch 1 (Firmware)


        KDF implementation in OpenSSH.

          • IBM PowerPC 405GPr
        6/15/2018
        • KAS ECC:
          • Functions: Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4394, ECDSA #1467, DRBG #2154
        1927Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        CLint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • PPCe500
          • Intel Xeon w/ ESXI 6.0
        6/8/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-224 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4392, HMAC #3629
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4392, HMAC #3629
        • SNMP:
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5474
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4392
        • TLS:
          • Supports TLS 1.0/1.1
          • Prerequisite: SHS #4392, HMAC #3629
        1926Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        CLint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • PPCe500
          • Intel Xeon w/ ESXI 6.0
        6/8/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4392, ECDSA #1465, DRBG #2153
        • KAS FFC:
          • Functions: Full Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4392, DRBG #2153
        1925Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 6 NSS without AES-NI

        R6-1.0.0


        Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
        6/8/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Prerequisite: SHS #4391, HMAC #3628
        1924Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 6 NSS without AES-NI

        R6-1.0.0


        Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
        6/8/2018
        • KAS ECC:
          • Functions: Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4391, ECDSA #1464, DRBG #2151
        • KAS FFC:
          • Functions: Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4391, DSA #1407, DRBG #2151
        1923Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone Controller Java Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
          • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
        6/8/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1922Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mukunda Chikkeralli
        +91 80 49134180

        Ruckus Smartzone Controller Java Crypto Library

        1.0 (Firmware)


        The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

          • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
          • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
        6/8/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4390, HMAC #3627
        1921Samsung Electronics Co., Ltd
        416 Maetan-3dong, Yeongtong-gu
        Suwon, Gyeonggi 152-848
        South Korea

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Samsung BoringSSL Cryptographic Module

        v1.2.1


        The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

          • Qualcomm MSM8998 w/ Android 8.1
          • Samsung Electronics Exynos 9810 w/ Android 8.1
          • Qualcomm SDM845 w/ Android 8.1
          • Qualcomm SDM450 w/ Android 8.1
        6/8/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1920Samsung Electronics Co., Ltd
        416 Maetan-3dong, Yeongtong-gu
        Suwon, Gyeonggi 152-848
        South Korea

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Samsung BoringSSL Cryptographic Module

        v1.2.1


        The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

          • Qualcomm SDM845 w/ Android 8.1
          • Samsung Electronics Exynos 9810 w/ Android 8.1
          • Qualcomm MSM8998 w/ Android 8.1
          • Qualcomm SDM450 w/ Android 8.1
        6/8/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4389, ECDSA #1463, DRBG #2149
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4389, DSA #1406, DRBG #2149
        1919Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Geetha Naik, Certification Program Manager
        ngeetha@juniper.net
        +91-80-61214404

        JUNOS 18.1R1 MTRE-QuickSec

        Junos OS 18.1R1 (Firmware)


        Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

          • Intel Xeon CPU E5
        6/8/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-2040 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4388, HMAC #3625
        • IKEv2:
          • Derived Keying Material length: 960-1792 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4388, HMAC #3625
        1918Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Geetha Naik, Certification Program Manager
        ngeetha@juniper.net
        +91-80-61214404

        JUNOS 18.1R1 MTRE-OpenSSL

        Junos OS 18.1R1 (Firmware)


        Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

          • Intel Xeon CPU E5
        6/8/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4387
        1917Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Geetha Naik, Certification Program Manager
        ngeetha@juniper.net
        +91-80-61214404

        JUNOS 18.1R1 MTRE-OpenSSL

        Junos OS 18.1R1 (Firmware)


        Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

          • Intel Xeon CPU E5
        6/8/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4387, ECDSA #1462, DRBG #2147
        1916Futurex
        864 Old Boerne Road
        Bulverde, TX 78163
        USA

        Futurex Security Certifications
        certifications@futurex.com
        830-980-9782

        Futurex Cryptographic Engine

        6.2.0.1 (Firmware)


        The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

          • TI AM3352
        6/8/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4384, HMAC #3621
        1915SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5 for TZ, NSA and SuperMassive

        6.5.2 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium Octeon II (CN62XX)
          • Cavium Octeon II (CN66XX)
          • Cavium Octeon II (CN68XX)
          • Cavium Octeon III (CN71XX)
          • Cavium Octeon III (CN70XX)
        6/8/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 176-1024 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 521 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4383, HMAC #3620
        • IKEv2:
          • Derived Keying Material length: 160-512 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 521 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4383, HMAC #3620
        • SNMP:
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4383
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4383, HMAC #3620
        1914SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5 for TZ, NSA and SuperMassive

        6.5.2 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium Octeon II (CN66XX)
          • Cavium Octeon II (CN62XX)
          • Cavium Octeon III (CN70XX)
          • Cavium Octeon III (CN71XX)
          • Cavium Octeon II (CN68XX)
        6/8/2018
        • ECDSA SigGen:
          • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2144
        1913SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5 for TZ, NSA and SuperMassive

        6.5.2 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium Octeon II (CN62XX)
          • Cavium Octeon II (CN66XX)
          • Cavium Octeon II (CN68XX)
          • Cavium Octeon III (CN70XX)
          • Cavium Octeon III (CN71XX)
        6/8/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Full Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4383, ECDSA #1460, DRBG #2144
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhHybrid1:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-512
                • FC:
                  • SHA: SHA-512
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-512
                • FC:
                  • SHA: SHA-512
            • dhHybrid1Flow:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-512
                • FC:
                  • SHA: SHA-512
            • dhOneFlow:
              • Key Agreement Roles: Initiator, Responder
            • dhStatic:
              • Key Agreement Roles: Initiator, Responder
          • Prerequisite: SHS #4383, DSA #1405, DRBG #2144
        1912Taisys Technologies Co. Ltd.
        7F., No.56, Lane 321
        Yangguang St., Neihu Dist.
        Taipei, Taipei 11491
        Taiwan (R.O.C.)

        Joe Wang
        joe.wang@taisys.com
        +886-2-26270927x6699
        Fax: +886-2-26270619

        Kent Horng
        kent.horng@taisys.com
        +886-2-26562185 #206
        Fax: +886-2-26579657

        TAISYS JUISE-S2-COS

        32 53 (Firmware)


        The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

          • SC300
        6/1/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1911Taisys Technologies Co. Ltd.
        7F., No.56, Lane 321
        Yangguang St., Neihu Dist.
        Taipei, Taipei 11491
        Taiwan (R.O.C.)

        Joe Wang
        joe.wang@taisys.com
        +886-2-26270927x6699
        Fax: +886-2-26270619

        Kent Horng
        kent.horng@taisys.com
        +886-2-26562185 #206
        Fax: +886-2-26579657

        TAISYS JUISE-S2-COS

        32 53 (Firmware)


        The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

          • SC300
        6/1/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2134
        1910Taisys Technologies Co. Ltd.
        7F., No.56, Lane 321
        Yangguang St., Neihu Dist.
        Taipei, Taipei 11491
        Taiwan (R.O.C.)

        Joe Wang
        joe.wang@taisys.com
        +886-2-26270927x6699
        Fax: +886-2-26270619

        Kent Horng
        kent.horng@taisys.com
        +886-2-26562185 #206
        Fax: +886-2-26579657

        TAISYS JUISE-S2-COS

        32 53 (Firmware)


        The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

          • SC300
        6/1/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1909Juniper Networks, Inc
        1133 Innovation Way
        Sunnyvale, California 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 18.1R1 QFX10K-OpenSSL

        Junos OS 18.1R1 (Firmware)


        The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

          • Intel Xeon E3
        6/1/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4381
        1908Juniper Networks, Inc
        1133 Innovation Way
        Sunnyvale, California 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos OS 18.1R1 QFX10K-OpenSSL

        Junos OS 18.1R1 (Firmware)


        The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

          • Intel Xeon E3
        6/1/2018
        • KAS ECC:
          • Functions: Full Public Key Validation, Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4381, ECDSA #1458, DRBG #2142
        1907REDCOM Laboratories, Inc
        One REDCOM Center
        Victor, NY 14564-0995
        United States

        Sal Ceravolo
        Sal.ceravolo@redcom.com
        585-905-0451

        Chris Hasenauer
        Chris.hasenauer@redcom.com
        585-905-0451

        REDCOM Encryption 140-2

        3.0.1


        REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
          • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
        6/1/2018
        • ANS 9.63:
          • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4377
        • IKEv2:
          • Derived Keying Material length: 160-8192 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4377, HMAC #3614
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5457
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4377
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4377, HMAC #3614
        1906REDCOM Laboratories, Inc
        One REDCOM Center
        Victor, NY 14564-0995
        United States

        Sal Ceravolo
        Sal.ceravolo@redcom.com
        585-905-0451

        Chris Hasenauer
        Chris.hasenauer@redcom.com
        585-905-0451

        REDCOM Encryption 140-2

        3.0.1


        REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
          • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
        6/1/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1905REDCOM Laboratories, Inc
        One REDCOM Center
        Victor, NY 14564-0995
        United States

        Sal Ceravolo
        Sal.ceravolo@redcom.com
        585-905-0451

        Chris Hasenauer
        Chris.hasenauer@redcom.com
        585-905-0451

        REDCOM Encryption 140-2

        3.0.1


        REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
          • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
        6/1/2018
        • ECDSA SigGen:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2140
        1904REDCOM Laboratories, Inc
        One REDCOM Center
        Victor, NY 14564-0995
        United States

        Sal Ceravolo
        Sal.ceravolo@redcom.com
        585-905-0451

        Chris Hasenauer
        Chris.hasenauer@redcom.com
        585-905-0451

        REDCOM Encryption 140-2

        3.0.1


        REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

          • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
          • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
        6/1/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1903Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2001

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000
        Fax: 408-745-2001

        Junos OS 18.1R1 QuickSec

        Junos OS 18.1R1 (Firmware)


        The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

          • Intel(R) Xeon(R) CPU E5
        5/25/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-256 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4376, HMAC #3613
        • IKEv2:
          • Derived Keying Material length: 1136-2432 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4376, HMAC #3613
        1902Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2001

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000
        Fax: 408-745-2001

        Junos OS 18.1R1 OpenSSH

        Junos OS 18.1R1 (Firmware)


        The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

          • Intel(R) Xeon(R) CPU E5
        5/25/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4375
        1901KeyNexus, Inc.
        205-2657 Wilfert Road
        Victoria, BC V9B6A7
        Canada

        Jason Novecosky
        jason@keynexus.net

        KeyNexus Cryptographic Library

        1.0


        The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

          • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
        5/25/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1900KeyNexus, Inc.
        205-2657 Wilfert Road
        Victoria, BC V9B6A7
        Canada

        Jason Novecosky
        jason@keynexus.net

        KeyNexus Cryptographic Library

        1.0


        The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

          • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
        5/25/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1899KeyNexus, Inc.
        205-2657 Wilfert Road
        Victoria, BC V9B6A7
        Canada

        Jason Novecosky
        jason@keynexus.net

        KeyNexus Cryptographic Library

        1.0


        The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

          • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
        5/25/2018
        • ECDSA SigGen:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2137
        1898KeyNexus, Inc.
        205-2657 Wilfert Road
        Victoria, BC V9B6A7
        Canada

        Jason Novecosky
        jason@keynexus.net

        KeyNexus Cryptographic Library

        1.0


        The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

          • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
        5/25/2018
        • ANS 9.63:
          • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4373
        • IKEv2:
          • Derived Keying Material length: 160-8192 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4373, HMAC #3611
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5453
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4373
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4373, HMAC #3611
        1897Hypersecu Information System Inc
        #206-6191 Westminster Hwy
        Richmond, BC V7C 4V4
        Canada

        James Li
        james@hypersecu.com
        (604) 279-2000
        Fax: (604) 272-1233

        HYP ALG Library

        V1.0 (Firmware)


        The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

          • HSC32K1
        5/25/2018
        • ECDSA SigGen:
          • P-256 SHA: SHA-256
          • Prerequisite: DRBG #2135
        1896Cisco Systems, Inc.
        170 W Tasman Dr
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        tbd

        CiscoSSL FIPS Object Module

        6.0


        The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Apple A10 w/ iOS 11.x
        5/25/2018
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1
          • Prerequisite: SHS #4357, HMAC #3608
        • SNMP:
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5434
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4357
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4357, HMAC #3608
        1895Cisco Systems, Inc.
        170 W Tasman Dr
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        tbd

        CiscoSSL FIPS Object Module

        6.0


        The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Apple A10 w/ iOS 11.x
        5/25/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: AES #5434, SHS #4357, ECDSA #1452, DRBG #2121, HMAC #3608
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4357, DSA #1402, DRBG #2121
        1894DocuSign, Inc.
        221 Main St.
        Suite 1000
        San Francisco, CA 94105
        USA

        Ezer Farhi
        Ezer.Farhi@docusign.com
        972-3-9279529

        DocuSign-SA-TLS

        8.51.9.0 (Firmware)


        DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

          • Intel® Xeon Quad-Core
        5/25/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256
          • Prerequisite: SHS #4368, HMAC #3607
        1893IBM
        2455 South Rd
        Poughkeepsie, NY 12601
        USA

        Thomas Morris Jr
        tmorrisj@us.ibm.com
        845-435-5538

        William Santiago
        wsf1@us.ibm.com
        845-435-9265

        Miniboot 6.63 with 00CW683

        Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


        Miniboot Implemented Algorithms with hardware acceleration

          • IBM PowerPC 405
        5/25/2018
        • ECDSA SigGen:
          • P-521 SHA: SHA-512
          • Prerequisite: DRBG #2130
        1892wolfSSL Inc.
        10016 Edmonds Way
        Suite C-300
        Edmonds, WA 98020
        USA

        Todd Ouska
        todd@wolfssl.com
        503-679-1859

        Larry Stefonic
        larry@wolfssl.com
        206-369-4800

        wolfCrypt

        4.0


        wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        5/25/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1891wolfSSL Inc.
        10016 Edmonds Way
        Suite C-300
        Edmonds, WA 98020
        USA

        Todd Ouska
        todd@wolfssl.com
        503-679-1859

        Larry Stefonic
        larry@wolfssl.com
        206-369-4800

        wolfCrypt

        4.0


        wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
          • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
        5/18/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4365, ECDSA #1451, DRBG #2131
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4365, DSA #1401, DRBG #2131
        1890Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Petra Manche
        +44 1189 245470

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle OpenSSL FIPS Object Module

        OpenSSL_2.0.13_OracleFIPS_1.0


        Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

          • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
          • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
          • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
          • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
          • SPARC S7 with PAA w/ Oracle Solaris 11.4
          • SPARC S7 without PAA w/ Oracle Solaris 11.4
          • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
          • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
          • Intel Xeon E5 with PAA w/ Solaris 11.4
          • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
          • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
        5/18/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1889Unbound Tech
        25 Efal Street
        Petah Tikva
        Israel

        Unbound Tech
        contact@unboundtech.com
        631-316-8114

        UnBound EKM Cryptographic Module

        2.0.1801.21683


        This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

          • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        5/18/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1888Unbound Tech
        25 Efal Street
        Petah Tikva
        Israel

        Unbound Tech
        contact@unboundtech.com
        631-316-8114

        UnBound EKM Cryptographic Module

        2.0.1801.21683


        This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
          • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        5/18/2018
        • ECDSA SigGen:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2126
        1887Unbound Tech
        25 Efal Street
        Petah Tikva
        Israel

        Unbound Tech
        contact@unboundtech.com
        631-316-8114

        UnBound EKM Cryptographic Module

        2.0.1801.21683


        This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
        5/18/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384, P-521
        1886Unbound Tech
        25 Efal Street
        Petah Tikva
        Israel

        Unbound Tech
        contact@unboundtech.com
        631-316-8114

        OpenSSL

        FIPS 2.0.16


        This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        5/18/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2126
        1885Unbound Tech
        25 Efal Street
        Petah Tikva
        Israel

        Unbound Tech
        contact@unboundtech.com
        631-316-8114

        OpenSSL

        FIPS 2.0.16


        This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
        5/18/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4362, HMAC #3600
        1884Unbound Tech
        25 Efal Street
        Petah Tikva
        Israel

        Unbound Tech
        contact@unboundtech.com
        631-316-8114

        OpenSSL

        FIPS 2.0.16


        This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
          • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
        5/18/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4362, ECDSA #1447, DRBG #2126
        1883Splunk, Inc.
        270 Brannan Street
        San Francisco, CA 94107
        USA

        Robert Truesdell
        rtruesdell@splunk.com
        412.913.8242

        Splunk Phantom Cryptographic Library

        1.0


        The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

          • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
          • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
        5/18/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1882Texas Instruments, Inc.
        12500 TI Blvd.
        Dallas, Texas 75243
        USA

        Alon Srednizki
        alons@ti.com
        +972-9-7906059
        Fax: +972-9-7906098

        Barak Cherches
        barakch@ti.com
        +972-9-7906238
        Fax: +972-9-7906098

        TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

        CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


        The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

          • n/a
        5/18/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4360, HMAC #3598
        1881Texas Instruments, Inc.
        12500 TI Blvd.
        Dallas, Texas 75243
        USA

        Alon Srednizki
        alons@ti.com
        +972-9-7906059
        Fax: +972-9-7906098

        Barak Cherches
        barakch@ti.com
        +972-9-7906238
        Fax: +972-9-7906098

        TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

        CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


        The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

          • n/a
        5/18/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4360, ECDSA #1445, DRBG #2124
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4360, DSA #1398, DRBG #2124
        1880Texas Instruments, Inc.
        12500 TI Blvd.
        Dallas, Texas 75243
        USA

        Alon Srednizki
        alons@ti.com
        +972-9-7906059
        Fax: +972-9-7906098

        Barak Cherches
        barakch@ti.com
        +972-9-7906238
        Fax: +972-9-7906098

        TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

        CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


        The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

          • n/a
        5/18/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4359, HMAC #3597
        1879Texas Instruments, Inc.
        12500 TI Blvd.
        Dallas, Texas 75243
        USA

        Alon Srednizki
        alons@ti.com
        +972-9-7906059
        Fax: +972-9-7906098

        Barak Cherches
        barakch@ti.com
        +972-9-7906238
        Fax: +972-9-7906098

        TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

        CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


        The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

          • n/a
        5/18/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4359, ECDSA #1444, DRBG #2123
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4359, DSA #1397, DRBG #21231397
        1878Texas Instruments, Inc.
        12500 TI Blvd.
        Dallas, Texas 75243
        USA

        Alon Srednizki
        alons@ti.com
        +972-9-7906059
        Fax: +972-9-7906098

        Barak Cherches
        barakch@ti.com
        +972-9-7906238
        Fax: +972-9-7906098

        TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

        CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


        The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

          • n/a
        5/18/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4358, HMAC #3596
        1877Texas Instruments, Inc.
        12500 TI Blvd.
        Dallas, Texas 75243
        USA

        Alon Srednizki
        alons@ti.com
        +972-9-7906059
        Fax: +972-9-7906098

        Barak Cherches
        barakch@ti.com
        +972-9-7906238
        Fax: +972-9-7906098

        TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

        CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


        The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

          • n/a
        5/18/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4358, ECDSA #1443, DRBG #2122
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4358, DSA #1396, DRBG #2122
        1876Cohesity, Inc.
        300 Park Ave
        Suite 800
        San Jose, CA 95110
        USA

        Vivek Agarwal
        vivek@cohesity.com
        +1 (415) 690-7805

        Cohesity OpenSSL FIPS Object Module

        1.0.2


        The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

          • Intel Xeon with AES-NI w/ CentOS 7
          • Intel Xeon without AES-NI w/ CentOS 7
        5/10/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1875Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        +1 (628)-400-2043

        SDKMS Crypto Library

        1.0.0 (Firmware)


        Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

          • Intel® Xeon E3-1230v5 4-Core, 3.40GHz with AES-NI
        5/10/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4241, HMAC #3489
        1874Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        +1 (628)-400-2043

        SDKMS Crypto Library

        1.0.0 (Firmware)


        Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

          • Intel® Xeon E3-1230v5 4-Core, 3.40GHz with AES-NI
        5/10/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2115
        1873Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        +1 (628)-400-2043

        SDKMS Crypto Library

        1.0.0 (Firmware)


        Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

          • Intel® Xeon E3-1230v5 4-Core, 3.40GHz with AES-NI
        5/10/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • SHA: SHA-512
          • Prerequisite: ECDSA #1441, DRBG #2115
        1872Ciena Corporation
        7035 Ridge Road
        Hanover, MD 21076
        USA

        Kevin Meagher
        kmeagher@ciena.com
        1-410-865-8936

        OpenSSL FIPS Object Module

        2.0.12


        Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

          • Intel Xeon D-1500 w/ SAOS 8.6.1
          • AARCH64(arm) w/ SAOS 6.17
          • Cavium 52xx w/ SAOS 6.17
          • ARMv7 w/ SAOS 6.17
        5/10/2018
        • KAS ECC:
          • Functions: Domain Parameter Validation, Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4350, ECDSA #1440, DRBG #2114
        1871NIKSUN, Inc.
        457 N. Harrison St.
        3rd Floor
        Princeton, NJ 08540
        USA

        Darryle Merlette
        merlette@niksun.com

        NIKOS FIPS Object Module

        2.0.16


        The NIKOS FIPS Object Module is a software library that provides cryptographic services to a vast array of NIKSUN's networking products.

          • Intel Xeon E5-2680 v2 w/ FreeBSD 11.1
        5/10/2018
        • KAS FFC:
          • Functions: Full Public Key Validation, Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4349, DSA #1394, DRBG #2113
        1870Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 OpenSSH Server & Client

        R7-2.0.0


        Oracle Linux OpenSSH Cryptographic Module is a software module that supplies cryptographic support for the SSH protocol.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
        5/10/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4295, SHS #4312, SHS #4329
        1869LG Electronics, Inc.
        20 Yoido-dong
        Youngdungpo-gu
        Seoul 152-721
        Republic of Korea

        Donghoon Shin
        hoon.shin@lge.com
        82-10-2280-4056

        LG BoringSSL

        3.0


        General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

          • Snapdragon 845 (SDM845) w/ Android 8.0
          • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
          • Snapdragon 835 (MSM8998) w/ Android 8.0
        5/10/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4348, ECDSA #1439, DRBG #2112
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • FB:
                  • SHA: SHA-256
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4348, DSA #1393, DRBG #2112
        1868INFINIDAT
        500 Totten Pond Road
        Waltham, MA 02451
        USA

        David Hebert
        davidh@infinidat.com
        +1 860-214-5666

        Steve Sullivan
        steves@infinidat.com
        +1 781-264-1544

        INFINIDAT Cryptographic Module (libssl)

        1.0.2k


        The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the KDF for TLSv1.2.

          • Intel Xeon E5-2697 w/ InfiniBox OS 4.7
        5/4/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4344, HMAC #3585
        1867Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Gokul Karthik Balaswamy
        gokulk@microsoft.com
        425-706-8583
        Fax: 425-708-0107

        Christine Ahonen
        chrisah@microsoft.com
        425-706-8675
        Fax: 425-936-7329

        Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

        7.00.2883


        The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

          • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
          • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
          • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
          • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
          • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
        5/4/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
          • Pre-shared Key Length: 64-2048 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-256
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-384
          • Prerequisite: SHS #3649, HMAC #2943
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #3649, HMAC #2943
        1866INFINIDAT
        500 Totten Pond Road
        Waltham, MA 02451
        USA

        David Hebert
        davidh@infinidat.com
        +1 860-214-5666

        Steve Sullivan
        steves@infinidat.com
        +1 781-264-1544

        INFINIDAT Cryptographic Module (libcrypto)

        1.0.2k


        The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

          • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
        5/4/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384, P-521
        1865Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiGate-VM FIPS Cryptographic Library v5.4

        5.4


        This document focuses on the software implementation of the Fortinet FortiGate-VM FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

          • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
        5/3/2018
        • ECDSA SigGen:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2102
        1864Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiGate-VM FIPS Cryptographic Library v5.4

        5.4


        This document focuses on the software implementation of the Fortinet FortiGate-VM FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

          • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
        5/3/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
          • Pre-shared Key Length: 128-1016 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 3072 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4339, HMAC #3580
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4339, HMAC #3580
        1863Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiGate-VM SSL Cryptographic Library v5.4

        5.4


        This document focuses on the software implementation of the Fortinet FortiGate-VM SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

          • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
        5/3/2018
        • ECDSA SigGen:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2102
        1862Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiGate-VM SSL Cryptographic Library v5.4

        5.4


        This document focuses on the software implementation of the Fortinet FortiGate-VM SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

          • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
        5/3/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256
          • Prerequisite: HMAC #3579
        1861Mojo Networks, Inc.
        339 N Bernardo Avenue, Suite 200
        Mountain View, CA 94043
        USA

        Hemant Chaskar
        hemant.chaskar@mojonetworks.com
        (650) 961-1111
        Fax: (650) 961-1169

        Crypto Core

        2.0.16-1-01 (Firmware)


        Cryptographic library offering various cryptographic mechanisms in sensor and access point.

          • ARMv7
        5/3/2018
        • KAS ECC:
          • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
          • Prerequisite: SHS #4165, ECDSA #1336, DRBG #1936
        1860Mojo Networks, Inc.
        339 N Bernardo Avenue, Suite 200
        Mountain View, CA 94043
        USA

        Hemant Chaskar
        hemant.chaskar@mojonetworks.com
        (650) 961-1111
        Fax: (650) 961-1169

        Crypto Core

        2.0.16-3-00 (Firmware)


        Cryptographic library offering various cryptographic mechanisms in server.

          • Intel Xeon
        5/3/2018
        • KAS ECC:
          • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4270, ECDSA #1396, DRBG #2049
        1859D'Crypt Pte Ltd
        28 Sin Ming Lane
        #06-133 Midview City
        Singapore, Singapore 573953
        Singapore

        Sales & Marketing
        marketing@d-crypt.com
        (65) 6933-1800
        Fax: (65) 6684-5142

        Quek Gim Chye
        fips@d-crypt.com
        (65) 6933-1823
        Fax: (65) 6684-5142

        D'Crypt Cryptographic Library

        3.8 (Firmware)


        The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

          • ARM Cortex-A
          • Intel x86 64 bit
        5/3/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2094
        1858D'Crypt Pte Ltd
        28 Sin Ming Lane
        #06-133 Midview City
        Singapore, Singapore 573953
        Singapore

        Sales & Marketing
        marketing@d-crypt.com
        (65) 6933-1800
        Fax: (65) 6684-5142

        Quek Gim Chye
        fips@d-crypt.com
        (65) 6933-1823
        Fax: (65) 6684-5142

        D'Crypt Cryptographic Library

        3.8 (Firmware)


        The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

          • Intel x86 64 bit
          • ARM Cortex-A
        5/3/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1857ClevX, LLC
        9306 NE 125th Street
        Kirkland, WA 98034
        USA

        Lev Bolotin
        Lev.Bolotin@clevx.com
        +1.425.820.9929

        Marc Singer
        Marc.Singer@clevx.com
        425.820.9929

        ClevX Datalock Cryptographic Library

        ClevX-Datalock-v2.0 (Firmware)


        ClevX Datalock Cryptographic Firmware Library

          • STM32L071C
        5/3/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256
        1856Nuvoton Technology Corporation
        No. 4, Creation Rd. III
        Hsinchu Science Park 300
        Taiwan, R.O.C.

        Yossi Talmi
        yossi.talmi@nuvoton.com
        +972-9-9702364
        Fax: +972-9-9702001

        Oren Tanami
        oren.tanami@nuvoton.com
        +972-9-9702390
        Fax: +972-9-9702001

        Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

        LAG019


        Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

          • N/A
        5/3/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1855Nuvoton Technology Corporation
        No. 4, Creation Rd. III
        Hsinchu Science Park 300
        Taiwan, R.O.C.

        Yossi Talmi
        yossi.talmi@nuvoton.com
        +972-9-9702364
        Fax: +972-9-9702001

        Oren Tanami
        oren.tanami@nuvoton.com
        +972-9-9702390
        Fax: +972-9-9702001

        Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

        LAG019


        Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

          • N/A
        5/3/2018
        1854Nuvoton Technology Corporation
        No. 4, Creation Rd. III
        Hsinchu Science Park 300
        Taiwan, R.O.C.

        Yossi Talmi
        yossi.talmi@nuvoton.com
        +972-9-9702364
        Fax: +972-9-9702001

        Oren Tanami
        oren.tanami@nuvoton.com
        +972-9-9702390
        Fax: +972-9-9702001

        Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

        LAG019


        Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

          • N/A
        5/3/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256, P-384
        1853Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Vann (Vanna) Nguyen, Certification Program Manager
        vann@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos 18.1R1 - OpenSSL

        18.1R1 (Firmware)


        The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

          • Freescale e500 dual core (PB0BJSSE1PNB)
          • Intel Xeon E31xx (Sandy Bridge)
        5/3/2018
        • KAS ECC:
          • Functions: Full Public Key Validation, Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4324, ECDSA #1424, DRBG #2087
        1852Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Bill Shelton, Strategic Delivery Director
        bshelton@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Vann (Vanna) Nguyen, Certification Program Manager
        vann@juniper.net
        408-745-2000
        Fax: 408-745-2100

        Junos 18.1R1 - OpenSSL

        18.1R1 (Firmware)


        The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

          • Intel Xeon E31xx (Sandy Bridge)
          • Freescale e500 dual core (PB0BJSSE1PNB)
        5/3/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4324
        1851Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
          • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        4/27/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1850Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
          • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
        4/27/2018
        • ANS 9.63:
          • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4321
        1849Certicom Corp.
        4701 Tahoe Blvd, Building A
        5th Floor
        Mississauga, Ontario L4W 0B5
        Canada

        Certicom Support
        support@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Certicom Sales
        sales@certicom.com
        1-905-507-4220
        Fax: 1-905-507-4230

        Security Builder® FIPS Core

        6.3.0


        Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

          • Intel Atom C3558 without AES-NI w/ QNX SDP 7
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
          • Intel Atom C3558 with AES-NI w/ QNX SDP 7
          • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
          • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
          • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
          • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
          • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
          • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
        4/27/2018
        • ECC CDH:
          • Primitive
          • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1848Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 17.4R1 - OpenSSL

        17.4R1 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon II (CN6335)
          • Cavium Octeon III (CN7130)
          • Intel Xeon C5518
        4/27/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #4320
        1847Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mike Jamison
        (678) 473-2907
        Fax: (678) 473-8470

        Cloudpath Cryptographic Library for Java

        1.0


        Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

          • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
          • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
        4/27/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4318, HMAC #3536
        1846Ruckus Networks, An ARRIS company
        350 W Java Drive
        Sunnyvale, CA 94089
        USA

        Abhi Maras
        (650) 265-4200
        Fax: (408) 738-2065

        Mike Jamison
        (678) 473-2907
        Fax: (678) 473-8470

        Cloudpath Cryptographic Library for Java

        1.0


        Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

          • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
          • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
        4/27/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        1845Nuvoton Technology Corporation
        No. 4, Creation Rd. III
        Hsinchu Science Park 300
        Taiwan, R.O.C.

        Yossi Talmi
        yossi.talmi@nuvoton.com
        +972-9-9702364
        Fax: +972-9-9702001

        Oren Tanami
        oren.tanami@nuvoton.com
        +972-9-9702390
        Fax: +972-9-9702001

        Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

        LAG019


        Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16

          • N/A
        4/13/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1844Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        Red Hat NSS Softoken (64 bit)

        6.0


        User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
        4/13/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4314, HMAC #3562
        1843Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        Red Hat NSS Softoken (64 bit)

        6.0


        User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
        4/13/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4314, ECDSA #1420, DRBG #2081
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4314, DSA #1389, DRBG #2081
        1842Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd.
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        ancrypto.dylib

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • ARMv7 w/ iOS 10.3.3
        4/13/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1841Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1(628)400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
        4/13/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4280, ECDSA #1419, DRBG #2073
        1840Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1(628)400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
        4/13/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: ECDSA #1418, DRBG #2072
        1839BiObex, LLC
        11501 Sunset Hills Rd
        Suite 200
        Reston, VA 22190
        USA

        Arthur Joyce
        ajoyce@biobex.com
        571-313-0969

        SAFE-Key device

        1.2.0.0 (Firmware)


        The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

          • STM32F415
        4/13/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1838Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

        R7-2.0.0


        Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
        4/13/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4312, HMAC #3558
        1837Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

        R7-2.0.0


        Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
        4/13/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-224
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4312, ECDSA #1417, DRBG #2079
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4312, DSA #1388, DRBG #2079
        1836IBM Corporation
        1787 Sentry Pkwy West
        Building 18, Suite 200
        Blue Bell, PA 19422
        USA

        Sandeep Singhal
        Sandeep.Singhal1@ibm.com
        215-664-1614

        OpenSSL [1] with the OpenSSL FIPS Object Module [2]

        1.0.2o [1]; 2.0.13 [2]


        The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

          • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
        4/13/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4311, ECDSA #1416, DRBG #2078
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4311, DSA #1387, DRBG #2078
        1835Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 6 OpenSSH Server & Client

        R6-1.0.0


        Oracle Linux OpenSSH Cryptographic Module is a software module which supplies cryptographic support for the SSH protocol

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
        4/13/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4302, SHS #4303, SHS #4304
        1834Allied Telesis
        27 Nazareth Ave
        Christchurch, Canterbury 8024
        New Zealand

        Alex Murray
        Alex.murray@alliedtelesis.co.nz
        +64 3 339 3000
        Fax: +64 3 339 3001

        Catherine Grulla
        securitycertification@alliedtelesis.co.nz
        +64 3 339 3000
        Fax: +64 3 339 3001

        AW+ OpenSSL FIPS Object Module Version 2.0.10

        Openssl-fips-2.0.10 (Firmware)


        AW+ OpenSSL FIPS Object Module is a software library which provides cryptographic support for secure communication and protection of information. The cryptographic services provided by the library include Symmetric Encryption and Decryption, Digital Signature, Cryptographic Hashing and Keyed-Hash Message Authentication

          • Freescale PowerPC P2040
        4/9/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #3228, ECDSA #858, DRBG #1133
        1833VMware, Inc.
        3401 Hillview Ave
        Palo Alto, CA 94303
        USA

        Manoj Maskara
        mmaskara@vmware.com
        650-427-1000
        Fax: 650-475-5001

        VMware BC-FJA (Bouncy Castle FIPS Java API)

        1.0.0


        The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

          • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
        4/9/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1832VMware, Inc.
        3401 Hillview Ave
        Palo Alto, CA 94303
        USA

        Manoj Maskara
        mmaskara@vmware.com
        650-427-1000
        Fax: 650-475-5001

        VMware BC-FJA (Bouncy Castle FIPS Java API)

        1.0.0


        The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

          • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
        4/9/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1831VMware, Inc.
        3401 Hillview Ave
        Palo Alto, CA 94303
        USA

        Manoj Maskara
        mmaskara@vmware.com
        650-427-1000
        Fax: 650-475-5001

        VMware BC-FJA (Bouncy Castle FIPS Java API)

        1.0.0


        The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

          • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
          • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.7
          • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.7
        4/9/2018
        • ANS 9.63:
          • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4307
        • IKEv2:
          • Derived Keying Material length: 160-8192 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 8192 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4307, HMAC #3553
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5365
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4307
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4307, HMAC #3553
        1830Realia Technologies, S.L
        Infanta Mercedes 90, 4th floor
        Madrid, Madrid 28020
        Spain

        Jesus Rodriguez
        jrodriguez@realsec.com
        +34 91 449 03 30
        Fax: +34 91 579 56 06

        Luis Jesus Hernandez
        ljhernandez@realsec.com
        +34 91 449 03 30
        Fax: +34 91 579 56 06

        Cryptosec Dekaton

        1.1


        The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

          • N/A
        4/9/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
          • P-256 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
          • P-384 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
          • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512/224
          • Prerequisite: DRBG #2056
        1829Certes Networks, Inc
        300 Corporate Center Drive
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        Certes Enforcement Point SNMP Library

        1.0 (Firmware)


        The Certes Enforcement Point SNMP Library provides SNMPv3 support for the Certes CEP appliances.

          • Intel Atom Processor C Series
          • Intel Xeon Processor E5 v4 Family
          • Intel Xeon Processor E3 v5 Family
        4/9/2018
        • SNMP:
        1828Certes Networks, Inc
        300 Corporate Center Drive
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        Certes Enforcement Point SSH Library

        1.0 (Firmware)


        The Certes Enforcement Point SSH Library provides SSH support for the Certes CEP appliances.

          • Intel Atom Processor C Series
          • Intel Xeon Processor E5 v4 Family
          • Intel Xeon Processor E3 v5 Family
        4/9/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4289
        1827Certes Networks, Inc
        300 Corporate Center Drive
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        Certes Enforcement Point TLS Library

        1.0 (Firmware)


        The Certes Enforcement Point TLS Library provides TLSv1.2 support for the Certes CEP appliances.

          • Intel Xeon Processor E5 v4 Family
          • Intel Xeon Processor E3 v5 Family
          • Intel Atom Processor C Series
        4/9/2018
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4289, HMAC #3535
        1826wolfSSL Inc.
        10016 Edmonds Way
        Suite C-300
        Edmonds, WA 98020
        USA

        Todd Ouska
        todd@wolfssl.com
        503-679-1859

        Larry Stefonic
        larry@wolfssl.com
        206-369-4800

        wolfCrypt

        3.14.2


        The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

          • Intel x86 w/ NetBSD v6.0.1
        4/9/2018
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256, SHA-384, SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384, SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4306, ECDSA #1414, DRBG #2075
        • KAS FFC:
          • Functions: Key Pair Generation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4306, DSA #1385, DRBG #2075
        1825Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
        4/9/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Domain Parameter Generation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: ECDSA #1412, DRBG #2073
        1824Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
        4/9/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2073
        1823Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
        4/9/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1822Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
        4/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4280, HMAC #3526
        1821Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
        4/9/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
        1820Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
        4/9/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2036
        1819Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
        4/9/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1818Fortanix, Inc.
        444 Castro Street, #702
        Mountain View, CA 94041
        USA

        Ambuj Kumar
        info@fortanix.com
        +1 (628) 400-2043

        Fortanix Crypto Algorithm Library

        2.6.0


        Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

          • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
        4/9/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4281, HMAC #3527
        1817Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

        R6-1.0.0


        Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
        3/30/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4303, HMAC #3549
        1816Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

        R6-1.0.0


        Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

          • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
        3/30/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-224
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4303, ECDSA #1409, DRBG #2070
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-224
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4303, DSA #1383, DRBG #2070
        1815Bivio Networks, Inc.
        4457 Willow Road, Suite 240
        Pleasanton, CA 94588
        USA

        Raj Srinivasan
        raj@bivio.net
        (925) 924-8608
        Fax: (925) 924-8650

        OpenSSL

        1.0.2k-8


        OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

          • Intel Xeon Skylake w/ RHEL 7.4
        3/30/2018
        • RSADP:
          • Modulus Size: 2048 bits
        1814Bivio Networks, Inc.
        4457 Willow Road, Suite 240
        Pleasanton, CA 94588
        USA

        Raj Srinivasan
        raj@bivio.net
        (925) 924-8608
        Fax: (925) 924-8650

        OpenSSL

        1.0.2k-8


        OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

          • Intel Xeon Skylake w/ RHEL 7.4
        3/30/2018
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4301
        1813Bivio Networks, Inc.
        4457 Willow Road, Suite 240
        Pleasanton, CA 94588
        USA

        Raj Srinivasan
        raj@bivio.net
        (925) 924-8608
        Fax: (925) 924-8650

        OpenSSL

        1.0.2k-8


        OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

          • Intel Xeon Skylake w/ RHEL 7.4
        3/30/2018
        • ECC CDH:
          • Primitive
          • Curves: P-256
        • KAS ECC:
          • Functions: Domain Parameter Generation, Key Pair Generation, Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-384
          • Prerequisite: SHS #4301, ECDSA #1408, DRBG #2069, HMAC #3547
        1812Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        Red Hat NSS Softoken (32 bit)

        6.0


        User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
        3/30/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4300, ECDSA #1407, DRBG #2068
        • KAS FFC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
          • Prerequisite: SHS #4300, DSA #1382, DRBG #2068
        1811Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        fips140@redhat.com

        Red Hat NSS Softoken (32 bit)

        6.0


        User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
        3/30/2018
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4300, HMAC #3546
        1810SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.1 for TZ, NSA and SuperMassive

        6.5.1 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium Octeon II (CN68XX)
          • Cavium Octeon III (CN70XX)
          • Cavium Octeon III (CN71XX)
          • Cavium Octeon II (CN62XX)
          • Cavium Octeon II (CN66XX)
        3/30/2018
        • ECDSA SigGen:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2066
        1809SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.1 for TZ, NSA and SuperMassive

        6.5.1 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium Octeon II (CN66XX)
          • Cavium Octeon III (CN70XX)
          • Cavium Octeon II (CN62XX)
          • Cavium Octeon III (CN71XX)
          • Cavium Octeon II (CN68XX)
        3/30/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 176-1024 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 521 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4297, HMAC #3543
        • IKEv2:
          • Derived Keying Material length: 160-512 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 224 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
            • Diffie-Hellman shared secret:
              • Length: 521 bits
              • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4297, HMAC #3543
        • SNMP:
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4297
        • TLS:
          • Supports TLS 1.0/1.1
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4297, HMAC #3543
        1808SonicWALL Inc.
        5455 Great America Parkway
        Santa Clara, CA 95054
        USA

        George Duo
        gduo@sonicwall.com
        (408) 962-7049

        SonicOS 6.5.1 for TZ, NSA and SuperMassive

        6.5.1 (Firmware)


        The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

          • Cavium Octeon II (CN68XX)
          • Cavium Octeon II (CN66XX)
          • Cavium Octeon III (CN70XX)
          • Cavium Octeon II (CN62XX)
          • Cavium Octeon III (CN71XX)
        3/30/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • Full Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • One Pass DH:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
            • Static Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-512
                • EC:
                  • Curve: P-256
                  • SHA: SHA-512
                • ED:
                  • Curve: P-384
                  • SHA: SHA-512
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4297, ECDSA #1406, DRBG #2066
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Public Key Regeneration
          • Schemes:
            • dhHybrid1:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-512
                • FC:
                  • SHA: SHA-512
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-512
                • FC:
                  • SHA: SHA-512
            • dhHybrid1Flow:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FB:
                  • SHA: SHA-512
                • FC:
                  • SHA: SHA-512
            • dhOneFlow:
              • Key Agreement Roles: Initiator, Responder
            • dhStatic:
              • Key Agreement Roles: Initiator, Responder
          • Prerequisite: SHS #4297, DSA #1381, DRBG #2066
        1807Aruba, a Hewlett Packard Enterprise company
        3333 Scott Blvd
        Santa Clara, CA 95054
        USA

        Steve Weingart
        steve.weingart@hpe.com
        512-319-2480

        Aruba Common Cryptographic Module (CCM)

        1.0.0


        The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

          • Intel Core i7 w/ Windows 10 64-bit User Mode
          • Intel Core i5 w/ Windows 10 32-bit User Mode
          • ARMv7 w/ Android 7.1
        3/30/2018
        • RSASP1:
          • Modulus Size: 2048 bits
          • Padding Algorithms: PKCS 1.5
        1806Realia Technologies, S.L
        Infanta Mercedes 90, 4th floor
        Madrid, Madrid 28020
        Spain

        Jesus Rodriguez
        jrodriguez@realsec.com
        +34 91 449 03 30
        Fax: +34 91 579 56 06

        Luis Jesus Hernandez
        ljhernandez@realsec.com
        +34 91 449 03 30
        Fax: +34 91 579 56 06

        Cryptosec Dekaton

        1.1


        The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

          • N/A
        3/30/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4278
        1805ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel Poonathan
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS9900(Intel_Atom_C2518)) - ECDH

        AOS 8.3.1.R01


        This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

          • Intel Atom C2518 w/ AOS 8.3.1.R01
        3/30/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #3526, ECDSA #1082, DRBG #1348
        1804ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel Poonathan
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6900(Freescale_PowerPC_MPC8572)) - ECDH

        AOS 8.3.1.R01


        This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

          • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
        3/30/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #3524, ECDSA #1079, DRBG #1346
        1803ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel Poonathan
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6900(PowerPC_P2040)) - ECDH

        AOS 8.3.1.R01


        This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

          • PowerPC P2040 w/ AOS 8.3.1.R01
        3/30/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #3525, ECDSA #1081, DRBG #1347
        1802ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel Poonathan
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6860) - ECDH

        AOS 8.3.1.R01


        This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

          • Cortex ARM 9 w/ AOS 8.3.1.R01
        3/30/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #3523, ECDSA #1078, DRBG #1345
        1801ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel Poonathan
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS10K) - ECDH

        AOS 8.3.1.R01


        This questionnaire lists the cryptographic algorithms used by the ALE AOS switch when operating in the Common Criteria mode.

          • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
        3/30/2018
        • KAS ECC:
          • Functions: Partial Public Key Validation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #3520, ECDSA #1077, DRBG #1342
        1800Certes Networks, Inc.
        300 Corporate Center Drive
        Suite 140
        Pittsburgh, PA 15108
        USA

        Sean Everson
        sean.everson@certesnetworks.com
        1.412.357.1130
        Fax: 1.412.262.2574

        Gary Brunner
        gary.brunner@certesnetworks.com
        1.412.200.2177
        Fax: 1.412.262.2574

        Certes Enforcement Point Cryptographic Library

        1.0.2l (Firmware)


        The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

          • Intel Xeon Processor E3 v5 Family
          • Intel Atom Processor C Series
          • Intel Xeon Processor E5 v4 Family
        3/30/2018
        • ECC CDH:
          • Primitive
          • Curves: P-224, P-256, P-384, P-521
        1799Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version 17.4R1 - Authentec

        17.4R1 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Cavium Octeon III (CN7020)
          • Broadcom XLP832
          • Cavium Octeon III (CN7130)
          • Cavium Octeon II (CN6335)
        3/30/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-256 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4288, HMAC #3534
        • IKEv2:
          • Derived Keying Material length: 1136-2432 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 256 bits
              • SHA Functions: SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 384 bits
              • SHA Functions: SHA-256, SHA-384
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-256, SHA-384
          • Prerequisite: SHS #4288, HMAC #3534
        1798Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        CLint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • Intel Atom
        3/23/2018
        • IKEv1:
          • Methods: Digital Signature, Pre-shared Key
          • Pre-shared Key Length: 8-224 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4283, HMAC #3529
        • IKEv2:
          • Derived Keying Material length: 1056-3072 bits
          • Diffie-Hellman shared secrets:
            • Diffie-Hellman shared secret:
              • Length: 2048 bits
              • SHA Functions: SHA-1, SHA-256
          • Prerequisite: SHS #4283, HMAC #3529
        • SNMP:
        • SRTP:
          • AES Key Lengths: 128, 192, 256 bits
          • Prerequisite: AES #5333
        • SSH:
          • SHA Functions: SHA-1
          • Prerequisite: SHS #4283
        • TLS:
          • Supports TLS 1.0/1.1
          • Prerequisite: SHS #4283, HMAC #3529
        1797Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        CLint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • Intel Atom
        3/23/2018
        • KAS ECC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
          • Prerequisite: SHS #4283, ECDSA #1401, DRBG #2059
        • KAS FFC:
          • Functions: Full Public Key Validation
          • Schemes:
            • dhEphem:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • FC:
                  • SHA: SHA-256
          • Prerequisite: SHS #4283, DRBG #2059
        1796Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Seyed Safakish
        seyeds@juniper.net
        408-745-2000
        Fax: 408-745-2100

        OpenSSL - EX4300

        Junos OS 17.4 R1 (Firmware)


        Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

          • Freescale e500mc
        3/23/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4282
        1795BeyondTrust
        5090 N. 40th Street
        Suite 400
        Phoenix, AZ 85018
        USA

        David Allen
        dallen@beyondtrust.com
        1-800-234-9072, 9292

        BeyondTrust Cryptographic Library

        2.0.10


        BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

          • Intel Xeon w/ Windows Server 2012 R2 Standard
        3/23/2018
        • SSH:
          • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4279
        • TLS:
          • Supports TLS 1.2:
            • SHA Functions: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #4279, HMAC #3525
        1794BeyondTrust
        5090 N. 40th Street
        Suite 400
        Phoenix, AZ 85018
        USA

        David Allen
        dallen@beyondtrust.com
        1-800-234-9072, 9292

        BeyondTrust Cryptographic Library

        2.0.10


        BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

          • Intel Xeon w/ Windows Server 2012 R2 Standard
        3/23/2018
        • ECC CDH:
          • Primitive
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • KAS ECC:
          • Functions: Key Pair Generation
          • Schemes:
            • Ephemeral Unified:
              • Key Agreement Roles: Initiator, Responder
              • Parameter Sets:
                • EB:
                  • Curve: P-224
                  • SHA: SHA-224
                • EC:
                  • Curve: P-256
                  • SHA: SHA-256
                • ED:
                  • Curve: P-384
                  • SHA: SHA-384
                • EE:
                  • Curve: P-521
                  • SHA: SHA-512
          • Prerequisite: SHS #4279, ECDSA #1399, DRBG #2057
        • KAS FFC:
          • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
          • Prerequisite: SHS #4279, DSA #1377, DRBG #2057
        1793Realia Technologies, S.L
        Infanta Mercedes 90, 4th floor
        Madrid, Madrid 28020
        Spain

        Jesus Rodriguez
        jrodriguez@realsec.com
        +34 91 449 03 30
        Fax: +34 91 579 56 06

        Luis Jesus Hernandez
        ljhernandez@realsec.com
        +34 91 449 03 30
        Fax: +34 91 579 56 06

        Cryptosec Dekaton

        1.1


        The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

          • N/A
        3/23/2018
        • ECDSA SigGen:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: DRBG #2056
        1792
        3/23/2018
          1791
          3/23/2018
            1790Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (650) 265-4200
            Fax: (408) 738-2065

            Mukunda Chikkeralli
            +91 80 49134180

            Ruckus Smartzone SNMP Crypto Library

            1.0


            The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

              • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
              • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
            3/16/2018
            • SNMP:
            1789Digital Guardian, Inc.
            860 Winter Street
            Suite 3
            Waltham, MA 02541
            USA

            Craig Hansen
            201-572-3784

            FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

            1.1


            Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

              • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
            3/16/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1788Digi International, Inc.
            11001 Bren Road East
            Minnetonka, MN 55343
            USA

            Donald Schleede
            Donald.Scleede@digi.com
            952-912-3444

            Digi ConnectCore Security Module

            1.0


            The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

              • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
              • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
            3/16/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1787Fortinet Inc.
            1090 Kifer Road
            Sunnyvale, CA 94086-5301
            USA

            Alan Kaye
            akaye@fortinet.com
            613-225-9381 x7416
            Fax: 613-225-9951

            Fortinet FortiMail SSL Cryptographic Library 6.0

            6.0 (Firmware)


            This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

              • Intel Xeon
            3/16/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4271
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4271, HMAC #3517
            1786Fortinet Inc.
            1090 Kifer Road
            Sunnyvale, CA 94086-5301
            USA

            Alan Kaye
            akaye@fortinet.com
            613-225-9381 x7416
            Fax: 613-225-9951

            Fortinet FortiMail SSL Cryptographic Library 6.0

            6.0 (Firmware)


            This focuses on the firmware implementation of the Fortinet FortiMail SSL Cryptographic Library v6.0 running on Intel x86 compatible processors.

              • Intel Xeon
            3/16/2018
            • KAS ECC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4271, DRBG #2050
            • KAS FFC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4271, DRBG #2050
            1785Evertz Microsystems
            5292 John Lucas Dr.
            Burlington, Ontario L7L 5Z9
            Canada

            Naveed Afzal
            nafzal@evertz.com
            905-335-3700

            EXE OpenSSL Cryptographic Module

            2v0_b1 (Firmware)


            Card for 6RU Shelf loaded with Evertz IPX

              • MPC8377E
            3/16/2018
            • KAS ECC:
              • Functions: Key Pair Generation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4220, ECDSA #1364, DRBG #2004
            1784Mojo Networks, Inc.
            339 N Bernardo Avenue, Suite 200
            Mountain View, CA 94043
            USA

            Hemant Chaskar
            hemant.chaskar@mojonetworks.com
            (650) 961-1111
            Fax: (650) 961-1169

            Crypto Core

            2.0.16-3-00 (Firmware)


            Cryptographic library offering various cryptographic mechanisms in server.

              • Intel Xeon
            3/16/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1783Mojo Networks, Inc.
            339 N Bernardo Avenue, Suite 200
            Mountain View, CA 94043
            USA

            Hemant Chaskar
            hemant.chaskar@mojonetworks.com
            (650) 961-1111
            Fax: (650) 961-1169

            Crypto Core

            2.0.16-3-00 (Firmware)


            Cryptographic library offering various cryptographic mechanisms in server.

              • Intel Xeon
            3/16/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384
            1782Mojo Networks, Inc.
            339 N Bernardo Avenue, Suite 200
            Mountain View, CA 94043
            USA

            Hemant Chaskar
            hemant.chaskar@mojonetworks.com
            (650) 961-1111
            Fax: (650) 961-1169

            Crypto Core

            2.0.16-3-00 (Firmware)


            Cryptographic library offering various cryptographic mechanisms in server.

              • Intel Xeon
            3/16/2018
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #4270
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4270, HMAC #3516
            1781Microchip Technology
            1150 E. Cheyenne Mountain Blvd
            Colorado Springs, CO USA
            80906

            Jim Hallman
            jim.hallman@microchip.com
            (919) 846-3391

            ATECC608A

            ATECC608A rev 6001 (Firmware)


            The device is a member of the Microchip CryptoAuthentication family. It is a cryptographic Co-processor with secure hardware-based key storage used for secure authentication and product validation.

              • n/a
            3/16/2018
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #4268, HMAC #3514
            1780Cisco Systems, Inc
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            (919) 392-6520

            CiscoSSL FIPS Object Module

            7.0


            The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

              • Intel Pentium w/ Linux 3.4
              • Intel Core i5 w/ Windows 10
              • ARMv8 w/ iOS 11.2
              • ARMv8 w/ Android 7.1
              • Intel Core i5 w/ Windows 10 (with AES-NI)
              • Intel Core i7 w/ macOS 10.12 (with AES-NI)
              • Intel Core i7 w/ macOS 10.12 (without AES-NI)
              • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
              • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
              • Cavium Octeon II 68XX w/ Wind River Linux 4
            3/16/2018
            • IKEv2:
              • Derived Keying Material length: 1056-3072 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-1
              • Prerequisite: SHS #4267, HMAC #3513
            • SNMP:
            • SRTP:
              • AES Key Lengths: 128, 192, 256 bits
              • Prerequisite: AES #5310
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4267
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4267, HMAC #3513
            1779Cisco Systems, Inc
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            (919) 392-6520

            CiscoSSL FIPS Object Module

            7.0


            The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

              • ARMv8 w/ Android 7.1
              • Intel Core i5 w/ Windows 10 (with AES-NI)
              • Intel Core i7 w/ macOS 10.12 (with AES-NI)
              • Intel Core i5 w/ Windows 10
              • Intel Pentium w/ Linux 3.4
              • ARMv8 w/ iOS 11.2
              • Intel Core i7 w/ macOS 10.12 (without AES-NI)
              • Cavium Octeon II 68XX w/ Wind River Linux 4
              • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
              • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
            3/16/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: AES #5310, AES #5310, SHS #4267, ECDSA #1395, DRBG #2048, HMAC #3513
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4267, DSA #1374, DRBG #2048
            1778Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (650) 265-4200
            Fax: (408) 738-2065

            Mukunda Chikkeralli
            +91 80 49134180

            Ruckus Smartzone SNMP Crypto Library

            1.0 (Firmware)


            The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

              • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
              • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
            3/16/2018
            • SNMP:
            1777Ruckus Networks, An ARRIS company
            350 W Java Drive
            Sunnyvale, CA 94089
            USA

            Abhi Maras
            (650) 265-4200
            Fax: (408) 738-2065

            Mukunda Chikkeralli
            +91 80 49134180

            Ruckus Access Point SNMP Crypto Library

            1.0 (Firmware)


            The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

              • Qualcomm IPQ8064
              • Qualcomm IPQ8068
              • Qualcomm IPQ8065
            3/16/2018
            • SNMP:
            1776Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

            10.0.15063.728


            The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            3/16/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1775Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

            10.0.15063.728


            The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            3/16/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1774Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Junos OS 17.4R1-S1 - Quicksec

            Junos OS 17.4R1-S1 (Firmware)


            The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E5
            3/16/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 8-256 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4266, HMAC #3512
            • IKEv2:
              • Derived Keying Material length: 1136-2432 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4266, HMAC #3512
            1773Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Junos OS 17.4R1-S1 - Quicksec

            Junos OS 17.4R1-S1 (Firmware)


            The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E3
            3/16/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 8-256 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4265, HMAC #3511
            • IKEv2:
              • Derived Keying Material length: 1136-2432 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4265, HMAC #3511
            1772Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Junos OS 17.4R1-S1 - Quicksec

            Junos OS 17.4R1-S1


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
            3/16/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 8-256 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4264, HMAC #3510
            • IKEv2:
              • Derived Keying Material length: 1136-2432 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4264, HMAC #3510
            1771Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Junos OS 17.4R1-S1 - OpenSSH

            Junos OS 17.4R1-S1


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
            3/16/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #4263
            1770Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Junos OS 17.4R1-S1 - OpenSSH

            Junos OS 17.4R1-S1 (Firmware)


            The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E5
            3/16/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4262
            1769Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Junos OS 17.4R1-S1 - OpenSSH

            Junos OS 17.4R1-S1 (Firmware)


            The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E3
            3/16/2018
            • SSH:
              • SHA Functions: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #4261
            1768Ciena Corporation
            7035 Ridge Road
            Hanover, MD 21076
            USA

            Patrick Scully
            613-670-3207

            Ciena Waveserver

            1.5.1 (Firmware)


            The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

              • Xilinx XC7Z030
            3/9/2018
            • IKEv2:
              • Derived Keying Material length: 1056-2432 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 224 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256, SHA-384
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4254, HMAC #3500
            1767Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

            10.0.15063.728


            The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            3/9/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1766Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

            10.0.15063.728


            The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            3/9/2018
            • ECDSA SigGen:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
              • Prerequisite: DRBG #2037
            1765Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

            10.0.15063.728


            The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            3/9/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1764Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

            10.0.15063.728


            The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            3/9/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
              • Pre-shared Key Length: 64-2048 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4253, HMAC #3499
            • IKEv2:
              • Derived Keying Material length: 192-1792 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4253, HMAC #3499
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4253, HMAC #3499
            1763Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); BcryptPrimitives and NCryptSSLp

            10.0.14393.1770


            The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
              • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
              • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
            3/9/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
              • Pre-shared Key Length: 64-2048 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4250, HMAC #3497
            • IKEv2:
              • Derived Keying Material length: 192-1792 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4250, HMAC #3497
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4250, HMAC #3497
            1762Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); Cryptography Next Generation (CNG) Implementations

            10.0.14393.1770


            The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
              • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
              • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
            3/9/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1761Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

            10.0.14393.1770


            The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
              • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
              • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
            3/9/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1760Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

            10.0.14393.1770


            The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
              • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
              • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
              • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
              • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
              • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
            3/9/2018
            • ECDSA SigGen:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
              • Prerequisite: DRBG #2036
            1759Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

            10.0.10240.17643


            The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

              • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
            3/9/2018
            • ECDSA SigGen:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
              • Prerequisite: DRBG #2035
            1758Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Enterprise LTSB (version 1507); Cryptography Next Generation (CNG) Implementations

            10.0.10240.17643


            The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
            3/9/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1757Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Enterprise LTSB (version 1507); BcryptPrimitives and NCryptSSLp

            10.0.10240.17643


            The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
            3/9/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
              • Pre-shared Key Length: 64-2048 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4248, HMAC #3496
            • IKEv2:
              • Derived Keying Material length: 192-1792 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4248, HMAC #3496
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4248, HMAC #3496
            1756Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

            10.0.10240.17643


            The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
            3/9/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1755Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); Cryptography Next Generation (CNG) Implementations

            10.0.10586.1176


            The Microsoft Windows Kernel Mode Cryptographic Primitives Library -- Cryptography Next Generation (CNG) -- is a general purpose, software-based, cryptographic module which provides FIPS 140-2 Level 1 cryptography.

              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
              • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
              • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
            3/9/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1754Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); BcryptPrimitives and NCryptSSLp

            10.0.10586.1176


            The Microsoft Windows Cryptographic Primitives Library provides IKEv1, IKEv2, and TLS Key Derivation Function (KDF) primitives.

              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
              • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
              • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
              • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
            3/9/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key, Public Key Encryption
              • Pre-shared Key Length: 64-2048 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4246, HMAC #3494
            • IKEv2:
              • Derived Keying Material length: 192-1792 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4246, HMAC #3494
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4246, HMAC #3494
            1753Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Adam Langley
            security@chromium.org

            BoringCrypto

            ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


            A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

              • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
            3/9/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4247, HMAC #3495
            1752Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Adam Langley
            security@chromium.org

            BoringCrypto

            ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


            A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

              • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
            3/9/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #2034
            1751Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Adam Langley
            security@chromium.org

            BoringCrypto

            ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


            A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

              • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
            3/9/2018
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-224
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4247, ECDSA #1382, DRBG #2034
            1750Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

            10.0.10586.1176


            The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
              • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
              • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
              • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
            3/9/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1749Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

            10.0.10586.1176


            The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
              • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
              • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
              • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
              • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
              • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
              • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
              • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
            3/9/2018
            • ECDSA SigGen:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
              • Prerequisite: DRBG #2033
            1748Docker, Inc.
            144 Townsend Street
            San Francisco, California 94107
            USA

            Rahim Ibrahim
            security-team@docker.com
            415-941-0376

            Docker Enterprise Edition Crypto Library v 1.0

            1.0


            The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

              • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
            3/9/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1747Docker, Inc.
            144 Townsend Street
            San Francisco, California 94107
            USA

            Rahim Ibrahim
            security-team@docker.com
            415-941-0376

            Docker Enterprise Edition Crypto Library v 1.0

            1.0


            The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

              • Dual Intel E5-2670v3 w/ CentOS v7.3
            3/9/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1746DocuSign, Inc.
            221 Main St.
            Suite 1000
            San Francisco, CA 94105
            USA

            Ezer Farhi
            Ezer.Farhi@docusign.com
            +972-39279529
            Fax: +972-39230864

            Moshe Harel
            Moshe.Harel@docusign.com
            +972-39279578
            Fax: +972-39230864

            PrivateServer-OpenSSL

            5.0.3 (Firmware)


            PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

              • Intel® E3-1268LV3 Quad-Core
            3/9/2018
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256
              • Prerequisite: SHS #4243, HMAC #3491
            1745DocuSign, Inc.
            221 Main St.
            Suite 1000
            San Francisco, CA 94105
            USA

            Ezer Farhi
            Ezer.Farhi@docusign.com
            +972-39279529
            Fax: +972-39230864

            Moshe Harel
            Moshe.Harel@docusign.com
            +972-39279578
            Fax: +972-39230864

            PrivateServer

            5.0.3 (Firmware)


            PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

              • Intel® E3-1268LV3 Quad-Core
            3/9/2018
            • ECDSA SigGen:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: RNG #2030
            1744Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

            8.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • intel i7 w/ macOS 10.13
            3/2/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #1885
            1743Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            George Guo
            george.guo@oracle.com
            (781) 538-7399

            Chris Marks
            chris.marks@oracle.com
            (650) 506-0391

            Oracle Acme Packet Mocana Cryptographic Library

            ECz 8.0.0 (Firmware)


            The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Atom C2358
              • Intel Xeon D-1548 (Intel Broadwell-DE)
            3/2/2018
            • IKEv1:
              • Methods: Pre-shared Key
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4239, HMAC #3844
            • SSH:
              • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4239
            1742Splunk, Inc.
            270 Brannan Street
            San Francisco, CA 94107
            USA

            Michael Arrowsmith
            415-848-8400

            Splunk Cryptographic Module

            2.0.16


            The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

              • Intel Xeon E5 without PAA w/ Ubuntu 16.04
              • Intel Xeon E5 with PAA w/ Ubuntu 16.04
            2/23/2018
            • ECC CDH:
              • Primitive
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            1741Cisco Systems, Inc.
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            (919) 392-6520

            CiscoSSL with FOM 6.0

            6.0


            The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

              • Intel Xeon w/ ADE-OS v3.0
            2/23/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4237, DSA #1367, DRBG #2018
            1740Cisco Systems, Inc.
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            (919) 392-6520

            CiscoSSL with FOM 6.0

            6.0


            The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

              • Intel Xeon w/ ADE-OS v3.0
            2/23/2018
            • IKEv2:
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-1
              • Prerequisite: SHS #4237, HMAC #3486
            • SNMP:
            • SRTP:
              • AES Key Lengths: 128, 192, 256 bits
              • Prerequisite: AES #5267
            • SSH:
              • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4237
            • TLS:
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4237, HMAC #3486
            1739Aruba, a Hewlett Packard Enterprise company
            3333 Scott Blvd
            Santa Clara, CA 95054
            USA

            Steve Weingart
            steve.weingart@hpe.com
            512-319-2480

            ArubaOS OpenSSL Module

            ArubaOS 6.5.1 (Firmware)


            The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

              • NXP QorIQ T1024
              • Qualcomm IPQ8064
              • Qualcomm IPQ4029
            2/23/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1738Aruba, a Hewlett Packard Enterprise company
            3333 Scott Blvd
            Santa Clara, CA 95054
            USA

            Steve Weingart
            steve.weingart@hpe.com
            512-319-2480

            ArubaOS OpenSSL Module

            ArubaOS 6.5.1 (Firmware)


            The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

              • Qualcomm IPQ8064
              • Qualcomm IPQ4029
              • NXP QorIQ T1024
            2/23/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 48-384 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4236, HMAC #3485
            • SNMP:
            • SSH:
              • SHA Functions: SHA-1
              • Prerequisite: SHS #4236
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #4236, HMAC #3485
            1737Aruba, a Hewlett Packard Enterprise company
            3333 Scott Blvd
            Santa Clara, CA 95054
            USA

            Steve Weingart
            steve.weingart@hpe.com
            512-319-2480

            ArubaOS Crypto Module

            ArubaOS 6.5.1 (Firmware)


            The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

              • NXP QorIQ T1024
              • Qualcomm IPQ8064
              • Qualcomm IPQ4029
            2/23/2018
            • RSASP1:
              • Modulus Size: 2048 bits
              • Padding Algorithms: PKCS 1.5
            1736Aruba, a Hewlett Packard Enterprise company
            3333 Scott Blvd
            Santa Clara, CA 95054
            USA

            Steve Weingart
            steve.weingart@hpe.com
            512-319-2480

            ArubaOS Crypto Module

            ArubaOS 6.5.1 (Firmware)


            The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

              • Qualcomm IPQ4029
              • Qualcomm IPQ8064
              • NXP QorIQ T1024
            2/23/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 48-384 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4235, HMAC #3484
            • IKEv2:
              • Derived Keying Material length: 1120-2688 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 256 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 384 bits
                  • SHA Functions: SHA-256
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-384
              • Prerequisite: SHS #4235, HMAC #3484
            1735IBM Corporation
            1787 Sentry Pkwy West
            Building 18, Suite 200
            Blue Bell, PA 19422
            USA

            Sandeep Singhal
            Sandeep.Singhal1@ibm.com
            215-664-1614

            OpenSSL [1] with the OpenSSL FIPS Object Module [2]

            1.0.2n [1]; 2.0.13 [2]


            The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

              • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
            2/23/2018
            • KAS ECC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4234, ECDSA #1373, DRBG #2016
            • KAS FFC:
              • Functions: Partial Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: DSA #1364, DRBG #2016
            1734Hangzhou Hikvision Digital Technology Co., Ltd.
            No.555 Qianmo Road, Binjiang District
            Hangzhou, Zhejiang 310052
            China

            Jiadong Chen
            chenjiadong@hikvision.com
            +86 136 5663 1443

            HikSSL Library

            1.0.0


            The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

              • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
            2/23/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4233, HMAC #3482
            1733Hangzhou Hikvision Digital Technology Co., Ltd.
            No.555 Qianmo Road, Binjiang District
            Hangzhou, Zhejiang 310052
            China

            Jiadong Chen
            chenjiadong@hikvision.com
            +86 136 5663 1443

            HikSSL Library

            1.0.0


            The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

              • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
            2/23/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4233, ECDSA #1372, DRBG #2015
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4233, DSA #1363, DRBG #2015
            1732Hangzhou Hikvision Digital Technology Co., Ltd.
            No.555 Qianmo Road, Binjiang District
            Hangzhou, Zhejiang 310052
            China

            Jiadong Chen
            chenjiadong@hikvision.com
            +86 136 5663 1443

            HikSSL Library

            1.0.0


            The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

              • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
            2/23/2018
            • TLS:
              • Supports TLS 1.0/1.1
              • Supports TLS 1.2:
                • SHA Functions: SHA-256, SHA-384
              • Prerequisite: SHS #4232, HMAC #3481
            1731Hangzhou Hikvision Digital Technology Co., Ltd.
            No.555 Qianmo Road, Binjiang District
            Hangzhou, Zhejiang 310052
            China

            Jiadong Chen
            chenjiadong@hikvision.com
            +86 136 5663 1443

            HikSSL Library

            1.0.0


            The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

              • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
            2/23/2018
            • ECC CDH:
              • Primitive
              • Curves: P-256, P-384, P-521
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4232, ECDSA #1371, DRBG #2012
            • KAS FFC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-224
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4232, DSA #1362, DRBG #2012
            1730Cisco Systems, Inc
            170 W Tasman Drive
            San Jose, California 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            IOS Common Cryptographic Module (IC2M)

            Rel5 (Firmware)


            The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

              • ARMv8
            2/23/2018
            • IKEv1:
              • Methods: Digital Signature, Pre-shared Key
              • Pre-shared Key Length: 8-224 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4231, HMAC #3480
            • IKEv2:
              • Derived Keying Material length: 1056-3072 bits
              • Diffie-Hellman shared secrets:
                • Diffie-Hellman shared secret:
                  • Length: 2048 bits
                  • SHA Functions: SHA-1, SHA-256
              • Prerequisite: SHS #4231, HMAC #3480
            • SNMP:
            • SRTP:
              • AES Key Lengths: 128, 192, 256 bits
              • Prerequisite: AES #5258
            • SSH:
              • SHA Functions: SHA-1
              • Prerequisite: SHS #4231
            • TLS:
              • Supports TLS 1.0/1.1
              • Prerequisite: SHS #4231, HMAC #3480
            1729Cisco Systems, Inc
            170 W Tasman Drive
            San Jose, California 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            IOS Common Cryptographic Module (IC2M)

            Rel5 (Firmware)


            The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

              • ARMv8
            2/23/2018
            • KAS ECC:
              • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
              • Prerequisite: SHS #4231, ECDSA #1370, DRBG #2011
            • KAS FFC:
              • Functions: Full Public Key Validation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4231, DRBG #2011
            1728Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Chris Marks
            seceval_us@oracle.com
            650-506-0391

            Cavium Nitrox PX1620

            PX1620


            The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

              • N/A
            2/23/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1727Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Chris Marks
            seceval_us@oracle.com
            650-506-0391

            Cavium Octeon CN 6880

            CN 6880


            The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

              • N/A
            2/23/2018
            • SRTP:
              • AES Key Lengths: 128 bits
              • Prerequisite: AES #5256
            1726Samsung Electronics Co., Ltd
            416 Maetan-3dong, Yeongtong-gu
            Suwon, Gyeonggi 152-848
            South Korea

            Jung Ha Paik
            jungha.paik@samsung.com
            +82-10-8861-0858

            Samsung BoringSSL Cryptographic Module

            v1.2


            The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

              • Samsung Electronics Exynos7570 w/ Android 8.0
              • Qualcomm MSM8996 w/ Android 8.0
              • Qualcomm SDM845 w/ Android 8.0
              • Samsung Electronics Exynos9810 w/ Android 8.0
              • Samsung Electronics Exynos8895 w/ Android 8.0
              • Samsung Electronics Exynos8890 w/ Android 8.0
              • Qualcomm MSM8998 w/ Android 8.0
              • Samsung Electronics Exynos7883 w/ Android 8.0
              • Samsung Electronics Exynos7884 w/ Android 8.0
            2/16/2018
            • RSADP:
              • Modulus Size: 2048 bits
            1725Samsung Electronics Co., Ltd
            416 Maetan-3dong, Yeongtong-gu
            Suwon, Gyeonggi 152-848
            South Korea

            Jung Ha Paik
            jungha.paik@samsung.com
            +82-10-8861-0858

            Samsung BoringSSL Cryptographic Module

            v1.2


            The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

              • Samsung Electronics Exynos7883 w/ Android 8.0
              • Qualcomm MSM8998 w/ Android 8.0
              • Qualcomm MSM8996 w/ Android 8.0
              • Qualcomm SDM845 w/ Android 8.0
              • Samsung Electronics Exynos8890 w/ Android 8.0
              • Samsung Electronics Exynos9810 w/ Android 8.0
              • Samsung Electronics Exynos8895 w/ Android 8.0
              • Samsung Electronics Exynos7570 w/ Android 8.0
              • Samsung Electronics Exynos7884 w/ Android 8.0
            2/16/2018
            • ECC CDH:
              • Primitive
              • Curves: P-224, P-256, P-384, P-521
            • KAS ECC:
              • Functions: Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator
                  • Parameter Sets:
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-384
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4230, ECDSA #1369, DRBG #2010
            • KAS FFC:
              • Functions: Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4230, DSA #1361, DRBG #2010
            1724Mocana Corporation
            150 Mathilda Place
            Suite 208
            Sunnyvale, CA 94086
            USA

            Srinivas Kumar
            fips@mocana.com
            1-415-617-0055
            Fax: 1-415-617-0056

            Mocana Cryptographic Library

            6.5.1f


            The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

              • Intel Atom E3800 w/ Wind River Linux 6.0
            2/16/2018
            • ECDSA SigGen:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: DRBG #2009
            1723Mocana Corporation
            150 Mathilda Place
            Suite 208
            Sunnyvale, CA 94086
            USA

            Srinivas Kumar
            fips@mocana.com
            1-415-617-0055
            Fax: 1-415-617-0056

            Mocana Cryptographic Library

            6.5.1f


            The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

              • Intel Atom E3800 w/ Wind River Linux 6.0
            2/16/2018
            • KAS ECC:
              • Functions: Domain Parameter Generation, Key Pair Generation
              • Schemes:
                • Ephemeral Unified:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • EB:
                      • Curve: P-224
                      • SHA: SHA-256
                    • EC:
                      • Curve: P-256
                      • SHA: SHA-256
                    • ED:
                      • Curve: P-384
                      • SHA: SHA-512
                    • EE:
                      • Curve: P-521
                      • SHA: SHA-512
              • Prerequisite: SHS #4229, ECDSA #1368, DRBG #2009
            • KAS FFC:
              • Functions: Domain Parameter Generation, Key Pair Generation
              • Schemes:
                • dhEphem:
                  • Key Agreement Roles: Initiator, Responder
                  • Parameter Sets:
                    • FB:
                      • SHA: SHA-256
                    • FC:
                      • SHA: SHA-256
              • Prerequisite: SHS #4229, DSA #1360, DRBG #2009
            1722
            2/16/2018
              1721Oracle Corporation
              500 Oracle Parkway
              Redwood Shores, CA 94065
              USA

              Chris Marks
              seceval_us@oracle.com
              650-506-0391

              Oracle Acme Packet Mocana Cryptographic Library

              ECz8.0.0 (Firmware)


              The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

                • Intel Core i7
                • Intel Core i3
              2/16/2018
              • IKEv1:
                • Methods: Pre-shared Key
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-1, SHA-256
                • Prerequisite: SHS #4226, HMAC #3475
              • SSH:
                • SHA Functions: SHA-1, SHA-256
                • Prerequisite: SHS #4226
              1720Oracle Corporation
              500 Oracle Parkway
              Redwood Shores, CA 94065
              USA

              Chris Marks
              seceval_us@oracle.com
              650-506-0391

              Oracle Acme Packet Cryptographic Library

              ECz8.0.0 (Firmware)


              The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

                • Intel Core i3
                • Intel Core i7
              2/16/2018
              • SNMP:
              • SRTP:
                • AES Key Lengths: 128 bits
                • Prerequisite: AES #5247
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4225, HMAC #3474
              1719Oracle Communications
              100 Crosby Drive
              Bedford, MA 01730
              USA

              George Guo
              george.guo@oracle.com
              (781) 538-7399

              Chris Marks
              chris.marks@oracle.com
              (650) 506-0391

              Oracle Acme Packet Mocana Cryptographic Library

              ECz 8.0.0


              The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

                • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
              2/16/2018
              • IKEv1:
                • Methods: Pre-shared Key
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-1, SHA-256
                • Prerequisite: SHS #4224, HMAC #3473
              • SSH:
                • SHA Functions: SHA-1, SHA-256
                • Prerequisite: SHS #4224
              1718Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSH Server/Client

              6.0


              SP 800-135 KDF for Intel x86 64-bit

                • Intel(R) Xeon(R) CPU E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
              2/16/2018
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4193
              1717Gemalto
              Avenue du Jujubier
              Z.I Athelia IV
              La Ciotat, 13705
              France

              Frederic Garnier
              Frederic.Garnier@gemalto.com
              +33 442364368
              Fax: +33 442366953

              Didier Bonnet
              Didier.Bonnet@gemalto.com
              +33 442366803
              Fax: +33 442365545

              Gemalto Cryptographic library for IDCore 3130 on SLE78

              Infineon SLE78CLFX400VPHM 1.9 (Firmware)


              IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

                • Infineon SLE78 chip (M7892)
              2/16/2018
              • RSASP1:
                • Modulus Size: 2048 bits
                • Padding Algorithms: PKCS 1.5
              1716Gemalto
              Avenue du Jujubier
              Z.I Athelia IV
              La Ciotat, 13705
              France

              Frederic Garnier
              Frederic.Garnier@gemalto.com
              +33 442364368
              Fax: +33 442366953

              Didier Bonnet
              Didier.Bonnet@gemalto.com
              +33 442366803
              Fax: +33 442365545

              Gemalto Cryptographic library for IDCore 3130 on SLE78

              Infineon SLE78CLFX400VPHM 1.9 (Firmware)


              IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

                • Infineon SLE78 chip (M7892)
              2/16/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1715Gemalto
              Avenue du Jujubier
              Z.I Athelia IV
              La Ciotat, 13705
              France

              Frederic Garnier
              Frederic.Garnier@gemalto.com
              +33 442364368
              Fax: +33 442366953

              Didier Bonnet
              Didier.Bonnet@gemalto.com
              +33 442366803
              Fax: +33 442365545

              Gemalto Cryptographic library for IDCore 3130 on SLE78

              Infineon SLE78CLFX400VPHM 1.9 (Firmware)


              IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

                • Infineon SLE78 chip (M7892)
              2/16/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1714Gemalto
              Avenue du Jujubier
              Z.I Athelia IV
              La Ciotat, 13705
              France

              Frederic Garnier
              Frederic.Garnier@gemalto.com
              +33 442364368
              Fax: +33 442366953

              Didier Bonnet
              Didier.Bonnet@gemalto.com
              +33 442366803
              Fax: +33 442365545

              Gemalto Cryptographic library for IDCore 3130 on SLE78

              Infineon SLE78CLFX400VPHM 1.9 (Firmware)


              IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

                • Infineon SLE78 chip (M7892)
              2/16/2018
              • RSASP1:
                • Modulus Size: 2048 bits
                • Padding Algorithms: PKCS 1.5
              1713Gemalto
              Avenue du Jujubier
              Z.I Athelia IV
              La Ciotat, 13705
              France

              Frederic Garnier
              Frederic.Garnier@gemalto.com
              +33 442364368
              Fax: +33 442366953

              Didier Bonnet
              Didier.Bonnet@gemalto.com
              +33 442366803
              Fax: +33 442365545

              Gemalto Cryptographic library for IDCore 3130 on SLE78

              Infineon SLE78CLFX400VPHM 1.9 (Firmware)


              IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

                • Infineon SLE78 chip (M7892)
              2/16/2018
              • ECC CDH:
                • Primitive
                • Curves: P-224, P-256, P-384, P-521
              1712Gallagher Group
              181 Kahikatea Drive
              Hamilton 3206
              New Zealand

              Andrew Scothern
              andrew.scothern@gallagher.com
              +64-7-838-9800

              Simon Lawrence
              simon.lawrence@gallagher.com
              +64-7-838-9800

              Gallagher OpenSSL Cryptographic Module

              2.0.12


              Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

                • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
              2/9/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1711Silver Spring Networks
              230 W Tasman Drive
              San Jose, CA 95134
              USA

              Andrew Pendray
              support@ssni.com
              +1 669 770 4000
              Fax: +1 886 776 0015

              Silver Spring Networks Endpoint Security Module

              130-0117-03 82136; 1.00 (Firmware)


              Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

                • ESM instruction manager processor
              2/9/2018
              • RSASP1:
                • Modulus Size: 2048 bits
                • Padding Algorithms: PKCS 1.5
              1710Silver Spring Networks
              230 W Tasman Drive
              San Jose, CA 95134
              USA

              Andrew Pendray
              support@ssni.com
              +1 669 770 4000
              Fax: +1 886 776 0015

              Silver Spring Networks Endpoint Security Module

              130-0117-03 82136; 1.00 (Firmware)


              Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

                • ESM instruction manager processor
              2/9/2018
              • ANS 9.63:
                • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4148
              • IKEv1:
                • Methods: Digital Signature
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 256 bits
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 bits
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-256
                • Prerequisite: SHS #4148, HMAC #3402
              • IKEv2:
                • Derived Keying Material length: 160-512 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 256 bits
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 384 bits
                    • SHA Functions: SHA-256
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-256
                • Prerequisite: SHS #4148, HMAC #3402
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4148, HMAC #3402
              1709Silver Spring Networks
              230 W Tasman Drive
              San Jose, CA 95134
              USA

              Andrew Pendray
              support@ssni.com
              +1 669 770 4000
              Fax: +1 886 776 0015

              Silver Spring Networks Endpoint Security Module

              130-0117-03 82136; 1.00 (Firmware)


              Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

                • ESM instruction manager processor
              2/9/2018
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              • KAS FFC:
                • Functions: Key Pair Generation, Public Key Regeneration
                • Schemes:
                  • dhHybrid1:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                  • dhHybrid1Flow:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                  • dhOneFlow:
                    • Key Agreement Roles: Initiator, Responder
                  • dhStatic:
                    • Key Agreement Roles: Initiator, Responder
                • Prerequisite: SHS #4148, DSA #1359, DRBG #1906
              1708Oracle Communications
              100 Crosby Drive
              Bedford, MA 01730
              USA

              George Guo
              george.guo@oracle.com
              (781) 538-7399

              Chris Marks
              chris.marks@oracle.com
              (650) 506-0391

              Oracle Acme Packet Cryptographic Library

              E-CZ 8.0.0


              The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

                • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
              2/9/2018
              • SNMP:
              • SRTP:
                • AES Key Lengths: 128 bits
                • Prerequisite: AES #5236
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4216, HMAC #3468
              1707Oracle Communications
              100 Crosby Drive
              Bedford, MA 01730
              USA

              George Guo
              george.guo@oracle.com
              (781) 538-7399

              Chris Marks
              chris.marks@oracle.com
              (650) 506-0391

              Oracle Acme Packet Cryptographic Library

              E-CZ 8.0.0 (Firmware)


              The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

                • Intel Xeon D-1548 (Intel Broadwell-DE)
                • Intel Atom C2358
              2/9/2018
              • SNMP:
              • SRTP:
                • AES Key Lengths: 128 bits
                • Prerequisite: AES #5235
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4215, HMAC #3467
              1706Certicom Corp.
              4701 Tahoe Blvd, Building A
              5th Floor
              Mississauga, Ontario L4W 0B5
              Canada

              Certicom Support
              support@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Certicom Sales
              sales@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Security Builder® FIPS Core

              6.3.0


              Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

                • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
                • Intel Atom C3558 with AES-NI w/ QNX SDP 7
                • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
                • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
                • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
                • Intel Atom C3558 without AES-NI w/ QNX SDP 7
                • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
              2/9/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1705Certicom Corp.
              4701 Tahoe Blvd, Building A
              5th Floor
              Mississauga, Ontario L4W 0B5
              Canada

              Certicom Support
              support@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Certicom Sales
              sales@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Security Builder® FIPS Core

              6.3.0


              Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

                • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
                • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
                • Intel Atom C3558 with AES-NI w/ QNX SDP 7
                • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
                • Intel Atom C3558 without AES-NI w/ QNX SDP 7
                • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
                • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
              2/9/2018
              • ANS 9.63:
                • SHA Functions: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4210
              1704Certicom Corp.
              4701 Tahoe Blvd, Building A
              5th Floor
              Mississauga, Ontario L4W 0B5
              Canada

              Certicom Support
              support@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Certicom Sales
              sales@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Security Builder® FIPS Core

              6.3.0


              Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

                • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
                • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
                • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
                • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
                • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
                • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
                • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
                • Intel Atom C3558 without AES-NI w/ QNX SDP 7
                • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
                • Intel Atom C3558 with AES-NI w/ QNX SDP 7
              2/9/2018
              • ECC CDH:
                • Primitive
                • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1703IBM Corporation
              222 South Riverside Plaza
              Ste 1700
              Chicago, IL 60606
              USA

              Mark Seaborn
              mseaborn@us.ibm.com
              +1 312 423 6640x2354

              IBM Cloud Object Storage System's™ FIPS Cryptographic Module

              1.1


              The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

                • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
                • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
              2/9/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1702Aruba, a Hewlett Packard Enterprise company
              3333 Scott Blvd
              Santa Clara, CA 95054
              USA

              Steve Weingart
              steve.weingart@hpe.com
              512-319-2480

              libancrypto.so

              1.0.0


              The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

                • Intel Core i7 w/ Linux 2.6 64-bit
              2/9/2018
              • RSASP1:
                • Modulus Size: 2048 bits
                • Padding Algorithms: PKCS 1.5
              1701Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (no AVX2, x86_64, 32-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4207, HMAC #3459
              1700Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (no AVX2, x86_64, 32-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4207, ECDSA #1353, DRBG #1993
              • KAS FFC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4207, DSA #1350, DRBG #1993
              1699Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple S3 w/ watchOS 4
              2/9/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1988
              1698Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple S3 w/ watchOS 4
              2/9/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4204, ECDSA #1352, DRBG #1988, HMAC #3456
              1697Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple S1P w/ watchOS 4
              2/9/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1987
              1696Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple S1P w/ watchOS 4
              2/9/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4703, ECDSA #1351, DRBG #1987, HMAC #3455
              1695Cisco Systems, Inc
              170 W Tasman Drive
              San Jose, California 95134
              USA

              Clint Winebrenner
              cwinebre@cisco.com
              919.392.6250

              IOS Common Cryptographic Module (IC2M)

              Rel 5 (Firmware)


              The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

                • Intel Atom
                • Intel Xeon
                • MIPS64
                • Intel Xeon on ESXi 5.5
              2/9/2018
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #3760, ECDSA #1241, DRBG #1529
              • KAS FFC:
                • Functions: Full Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3760, DRBG #1529
              1694Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (no AVX2, x86_64, 64-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4202, HMAC #3454
              1693Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (no AVX2, x86_64, 64-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • KAS ECC:
                • Functions: Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4202, ECDSA #1350, DRBG #1984
              • KAS FFC:
                • Functions: Partial Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4202, DSA #1349, DRBG #1984
              1692Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4199, HMAC #3451
              1691Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4198, HMAC #3450
              1690Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (Full CPU set, x86_64, 32-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4194, HMAC #3446
              1689Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (Full CPU set, x86_64, 32-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/9/2018
              • KAS ECC:
                • Functions: Full Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4194, ECDSA #1348, DRBG #1976
              • KAS FFC:
                • Functions: Partial Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4194, DSA #1347, DRBG #1976
              1688Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (Full CPU set, x86_64, 64-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/2/2018
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384
                • Prerequisite: SHS #4193, HMAC #3445
              1687Red Hat, Inc.
              100 E. Davie Street
              Raleigh, NC 27601
              USA

              Jaroslav Reznik
              fips140@redhat.com

              OpenSSL (Full CPU set, x86_64, 64-bit library)

              6.0


              The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

                • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
              2/2/2018
              • KAS ECC:
                • Functions: Partial Public Key Validation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4193, ECDSA #1347, DRBG #1975
              • KAS FFC:
                • Functions: Partial Public Key Validation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4193, DSA #1346, DRBG #1975
              1686Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
              2/2/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1972
              1685Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
              2/2/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4191, ECDSA #1346, DRBG #1972, HMAC #3443
              1684Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
              2/2/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1959
              1683Centrify Corporation
              3300 Tannery Way
              Santa Clara, California 95054
              USA

              Kitty Shih
              kitty.shih@centrify.com
              669-444-5238

              Centrify Cryptographic Library

              2.1


              Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

                • Intel Xeon X5650 x86_64 w/ RHEL 7.2
              2/2/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1682Samsung Electronics Co., Ltd
              416 Maetan-3dong, Yeongtong-gu
              Suwon, Gyeonggi 152-848
              South Korea

              Brian Wood
              be.wood@samsung.com
              +1-973-440-9125

              Jung Ha Paik
              jungha.paik@samsung.com
              +82-10-8861-0858

              Samsung SCrypto Library

              v2.2


              Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

                • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
              2/2/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1681Samsung Electronics Co., Ltd
              416 Maetan-3dong, Yeongtong-gu
              Suwon, Gyeonggi 152-848
              South Korea

              Brian Wood
              be.wood@samsung.com
              +1-973-440-9125

              Jung Ha Paik
              jungha.paik@samsung.com
              +82-10-8861-0858

              Samsung SCrypto Library

              v2.2


              Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

                • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
                • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
                • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
              2/2/2018
              • ECC CDH:
                • Primitive
                • Curves: P-224, P-256, P-384, P-521
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4184, ECDSA #1343, DRBG #1955
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4184, DSA #1344, DRBG #1955
              1680Datrium
              385 Moffett Park Dr #205
              Sunnyvale, CA 94089
              USA

              R. Hugo Patterson
              info@datrium.com
              +1 (669) 721-9444

              Datrium FIPS Object Module

              2.0.12


              The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

                • Intel Xeon E5-2618L v4 w/ Linux 3.10
                • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
                • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
              1/26/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1679Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

                • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
              1/26/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1951
              1678Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

                • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
              1/26/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4180, ECDSA #1341, DRBG #1951, HMAC #3432
              1677SafeLogic, Inc.
              530 Lytton Ave
              Suite 200
              Palo Alto, CA 94301
              USA

              SafeLogic Sales
              sales@safelogic.com

              CryptoComply® Server

              2.1


              CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

                • Intel i7 w/ Windows Server 2012 R2
              1/26/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1676Forcepoint
              10900-A Stonelake Blvd.
              Ste. 350
              Austin, TX 78759
              USA

              Klaus Majewski
              legal@forcepoint.com
              1-858-320-8000

              Jorma Levomäki
              legal@forcepoint.com
              1-858-320-8000

              Forcepoint NGFW FIPS Object Module

              2.0.14


              Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

                • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
                • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
                • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
                • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
                • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
              1/26/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4175, ECDSA #1339, DRBG #1946
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4175, DSA #1340, DRBG #1946
              1675Forcepoint
              10900-A Stonelake Blvd.
              Ste. 350
              Austin, TX 78759
              USA

              Klaus Majewski
              legal@forcepoint.com
              1-858-320-8000

              Jorma Levomäki
              legal@forcepoint.com
              1-858-320-8000

              Forcepoint NGFW FIPS Object Module

              2.0.13


              Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

                • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
              1/26/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4174, ECDSA #1338, DRBG #1945
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4174, DSA #1339, DRBG #1945
              1674Forcepoint
              10900-A Stonelake Blvd.
              Ste. 350
              Austin, TX 78759
              USA

              Klaus Majewski
              legal@forcepoint.com
              1-858-320-8000

              Jorma Levomäki
              legal@forcepoint.com
              1-858-320-8000

              Forcepoint NGFW FIPS Java API

              1.0.0


              Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

                • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
              1/26/2018
              • IKEv2:
                • Derived Keying Material length: 1056-3072 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4173, HMAC #3427
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4173
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4173, HMAC #3427
              1673Mojo Networks, Inc.
              339 N Bernardo Avenue, Suite 200
              Mountain View, CA 94043
              USA

              Hemant Chaskar
              hemant.chaskar@mojonetworks.com
              (650) 961-1111
              Fax: (650) 961-1169

              Crypto Core

              2.0.16-1-01 (Firmware)


              Cryptographic library offering various cryptographic mechanisms in sensor and access point.

                • ARMv7
              1/26/2018
              • ECC CDH:
                • Primitive
                • Curves: P-256
              1672Mojo Networks, Inc.
              339 N Bernardo Avenue, Suite 200
              Mountain View, CA 94043
              USA

              Hemant Chaskar
              hemant.chaskar@mojonetworks.com
              (650) 961-1111
              Fax: (650) 961-1169

              Crypto Core

              2.0.16-1-01 (Firmware)


              Cryptographic library offering various cryptographic mechanisms in sensor and access point.

                • ARMv7
              1/26/2018
              • SSH:
                • SHA Functions: SHA-1
                • Prerequisite: SHS #4165
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-384
                • Prerequisite: SHS #4165, HMAC #3419
              1671Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A7 w/ iOS 11 Fusion
              1/26/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1935
              1670Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A7 w/ iOS 11 Fusion
              1/26/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4164, ECDSA #1335, DRBG #1935, HMAC #3418
              1669Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A11 Bionic w/ iOS 11
              1/26/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1934
              1668Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A11 Bionic w/ iOS 11
              1/26/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4163, ECDSA #1334, DRBG #1934, HMAC #3417
              1667Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A10 Fusion w/ iOS 11
              1/26/2018
              • ECDSA SigGen:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1933
              1666Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A10 Fusion w/ iOS 11
              1/26/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4162, ECDSA #1333, DRBG #1933, HMAC #3416
              1665Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A9X w/ iOS 11
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1932
              1664Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A9X w/ iOS 11
              1/19/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4161, ECDSA #1332, DRBG #1932
              1663Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A9 w/ iOS 11
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1931
              1662Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A9 w/ iOS 11
              1/19/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4160, ECDSA #1331, DRBG #1931, HMAC #3414
              1661Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A8X w/ iOS 11
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1930
              1660Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A8X w/ iOS 11
              1/19/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4159, ECDSA #1330, DRBG #1930, HMAC #3413
              1659Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A7 w/ iOS 11
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1929
              1658Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A7 w/ iOS 11
              1/19/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4158, ECDSA #1329, DRBG #1929, HMAC #3412
              1657Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A8 w/ iOS 11
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1928
              1656Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

                • Apple A8 w/ iOS 11
              1/19/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4157, ECDSA #1328, DRBG #1928, HMAC #3411
              1655Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10X w/ tvOS 11 Fusion
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1925
              1654Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10X w/ tvOS 11 Fusion
              1/19/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4155, ECDSA #1327, DRBG #1925, HMAC #3409
              1653Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

                • Apple S3 w/ watchOS 4
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1918
              1652Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

                • Apple S1P w/ watchOS 4
              1/19/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1917
              1651GDC Technology (USA) LLC
              1016 West Magnolia Boulevard
              Burbank, California 91506
              USA

              Pranay Kumar
              pranay@gdc-tech.com
              (852) 2507 9565
              Fax: (852) 2579 1131

              ChernYue Kwok
              Chernyue.kwok@gdc-tech.com
              (852) 2507 9552
              Fax: (852) 2579 1131

              Standalone IMB Cryptographic Module

              2.0.11 (Firmware)


              A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

                • Xilinx Zynq Ultrascale+
              1/19/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1650GDC Technology (USA) LLC
              1016 West Magnolia Boulevard
              Burbank, California 91506
              USA

              Pranay Kumar
              pranay@gdc-tech.com
              (852) 2507 9565
              Fax: (852) 2579 1131

              ChernYue Kwok
              Chernyue.kwok@gdc-tech.com
              (852) 2507 9552
              Fax: (852) 2579 1131

              Standalone IMB Cryptographic Module

              2.0.11 (Firmware)


              A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

                • Xilinx Zynq Ultrascale+
              1/19/2018
              • TLS:
                • Supports TLS 1.0/1.1
              1649Hewlett-Packard Development Company, L.P.
              11445 Compaq Center Drive W
              Houston, TX 77070
              USA

              Timothy McDonough
              timothy.mcdonough@hpe.com

              Hewlett Packard Enterprise SSL Crypto Module

              2.1


              Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

                • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
              1/12/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1648Ruckus Networks, An ARRIS company
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Abhi Maras
              (650) 265-4200
              Fax: (408) 738-2065

              Mukunda Chikkeralli
              +91 80 49134180

              Ruckus Smartzone SSL Crypto Library

              1.0


              The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

                • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
                • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
              1/12/2018
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4146
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4146, HMAC #3400
              1647Ruckus Networks, An ARRIS company
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Abhi Maras
              (650) 265-4200
              Fax: (408) 738-2065

              Mukunda Chikkeralli
              +91 80 49134180

              Ruckus Smartzone SSL Crypto Library

              1.0 (Firmware)


              The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

                • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
                • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
              1/12/2018
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4145
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4145, HMAC #3399
              1646Ruckus Networks, An ARRIS company
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Abhi Maras
              (650) 265-4200
              Fax: (408) 738-2065

              Mukunda Chikkeralli
              +91 80 49134180

              Ruckus Access Point SSL Crypto Library

              1.0 (Firmware)


              The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

                • Qualcomm IPQ8068
                • Qualcomm IPQ8064
                • Qualcomm IPQ8065
              1/12/2018
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4144
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4144, HMAC #3398
              1645Ruckus Wireless, Inc.
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Suneetha Sarala
              Suneetha.Sarala@arris.com
              650-265-4200

              Julie Lu
              Julie.Lu@arris.com
              650-265-4200

              BRCD-IP-CRYPTO-VER-4.0

              BRCD-IP-CRYPTO-VER-4.0 (Firmware)


              Firmware algorithm for the Brocade FastIron Series

                • Freescale P2041
              1/12/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256, SHA-384
                • Prerequisite: SHS #4083, DSA #1320, DRBG #1839
              1644Ruckus Wireless, Inc.
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Suneetha Sarala
              Suneetha.Sarala@arris.com
              650-265-4200

              Julie Lu
              Julie.Lu@arris.com
              650-265-4200

              BRCD-IP-CRYPTO-VER-4.0

              BRCD-IP-CRYPTO-VER-4.0 (Firmware)


              Firmware algorithm for the Brocade FastIron Series

                • ARM Cortex A57
              1/12/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256, SHA-384
                • Prerequisite: SHS #4082, DSA #1319, DRBG #1838
              1643Ruckus Networks, An ARRIS company
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Abhi Maras
              (678) 473-2907
              Fax: (678) 473-8470

              Mike Jamison
              (678) 473-2907
              Fax: (678) 473-8470

              Cloudpath Cryptographic Library

              1.0


              Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

                • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
                • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
              1/12/2018
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4143
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4143, HMAC #3397
              1642Ruckus Networks, An ARRIS company
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Abhi Maras
              (678) 473-2907
              Fax: (678) 473-8470

              Mike Jamison
              (678) 473-2907
              Fax: (678) 473-8470

              Cloudpath Cryptographic Library

              1.0


              Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

                • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
                • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
              1/12/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1641Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Seyed Safakish
              seyeds@juniper.net
              408-745-2000
              Fax: 408-745-2100

              JUNOS 17.3R2 RE1800 - OpenSSL

              17.3R2 (Firmware)


              Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

                • Intel Xeon LC5518
              1/12/2018
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-512
                • Prerequisite: SHS #4138
              1640Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

                • Apple S3 w/ watchOS 4
              1/12/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1893
              1639Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

                • Apple S3 w/ watchOS 4
              1/12/2018
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4137, ECDSA #1318, DRBG #1894, HMAC #3391
              1638Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

                • Apple S1P w/ watchOS 4
              1/12/2018
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1893
              1637Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

                • Apple S1P w/ watchOS 4
              1/12/2018
              • KAS ECC:
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4136, ECDSA #1317, DRBG #1893, HMAC #3390
              1636Motorola Solutions Inc
              1301 East Algonquin Road
              Schaumburg, IL 60196
              USA

              Amalendu Roy
              aroy@motorolasolutions.com
              847-576-5000

              Ken Fuchs
              Ken.Fuchs@motorolasolutions.com
              847-576-5000

              uMACE KDF

              R03.01.07_KDF (Firmware)


              uMACE KDF implementation for the uMace cryptographic processor which is used in security modules embedded in Motorola Solutions security products.

                • Motorola µMace AT58Z04
              1/12/2018
              • SRTP:
                • AES Key Lengths: 256 bits
                • Prerequisite: AES #5077
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-384
                • Prerequisite: SHS #4132, HMAC #3386
              1635Private Machines, Inc
              164 20th Street
              4A-4B
              Brooklyn, NY 11232
              USA

              Sumeet Bajaj
              sumeet@privatemachines.com

              Radu Sion
              sion@privatemachines.com

              Private Machines Enforcer LIBUCL

              L4-1 2.5.13 (Firmware)


              The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

                • MAX32550 Cortex M3
              1/5/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1634Private Machines, Inc
              164 20th Street
              4A-4B
              Brooklyn, NY 11232
              USA

              Sumeet Bajaj
              sumeet@privatemachines.com

              Radu Sion
              sion@privatemachines.com

              Private Machines Enforcer LIBUCL

              L4-1 2.5.13 (Firmware)


              The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

                • MAX32550 Cortex M3
              1/5/2018
              • RSASP1:
                • Modulus Size: 2048 bits
                • Padding Algorithms: PKCS 1.5
              1633Private Machines, Inc
              164 20th Street
              4A-4B
              Brooklyn, NY 11232
              USA

              Sumeet Bajaj
              sumeet@privatemachines.com

              Radu Sion
              sion@privatemachines.com

              Private Machines Enforcer LIBUCL

              L4-1 2.5.13 (Firmware)


              The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

                • MAX32550 Cortex M3
              1/5/2018
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-384
                • Prerequisite: SHS #4132, HMAC #3385
              1632SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sanagala
              usanagala@sonicwall.com
              408-962-6248
              Fax: 408-745-9300

              SonicWall Crypto Library

              SonicOS 6.2.5 (Firmware)


              SonicWall Crypto Library

                • Cavium Octeon
              1/5/2018
              • IKEv1:
                • Methods: Digital Signature, Pre-shared Key
                • Pre-shared Key Length: 176-1024 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4130, HMAC #3384
              • IKEv2:
                • Derived Keying Material length: 160512-0 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4130, HMAC #3384
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1
                • Prerequisite: SHS #4130
              • TLS:
                • Supports TLS 1.0/1.1
                • Prerequisite: SHS #4130, HMAC #3384
              1631SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sanagala
              usanagala@sonicwall.com
              408-962-6248
              Fax: 408-745-9300

              SonicWall Crypto Library

              SonicOS 6.2.5 (Firmware)


              SonicWall Crypto Library

                • Cavium Octeon
              1/5/2018
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
                • Schemes:
                  • Full Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • One Pass Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • Static Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4130, ECDSA #1315, DRBG #1887
              • KAS FFC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation
                • Schemes:
                  • dhHybrid1:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                  • dhHybrid1Flow:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                  • dhOneFlow:
                    • Key Agreement Roles: Initiator, Responder
                  • dhStatic:
                    • Key Agreement Roles: Initiator, Responder
                • Prerequisite: SHS #4130, DSA #1335, DRBG #1887
              1630Infineon Technologies AG
              Alter Postweg 101
              Augsburg, BY 86159
              Germany

              Roland Ebrecht
              Roland.Ebrecht@infineon.com
              +49-821-25851-68
              Fax: +49-821-25851-40

              Thomas Hoffmann
              Thomas.Hoffmann@infineon.com
              +49-821-25851-24
              Fax: +49-821-25851-40

              Trusted Platform Module 2.0 SLB 9670

              SLB 9670 7.83 (Firmware)


              Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

                • Infineon SLB 9670 security controller IC
              1/5/2018
              • RSADP:
                • Modulus Size: 2048 bits
              1629Infineon Technologies AG
              Alter Postweg 101
              Augsburg, BY 86159
              Germany

              Roland Ebrecht
              Roland.Ebrecht@infineon.com
              +49-821-25851-68
              Fax: +49-821-25851-40

              Thomas Hoffmann
              Thomas.Hoffmann@infineon.com
              +49-821-25851-24
              Fax: +49-821-25851-40

              Trusted Platform Module 2.0 SLB 9670

              SLB 9670 7.83 (Firmware)


              Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

                • Infineon SLB 9670 security controller IC
              1/5/2018
              • ECC CDH:
                • Primitive
                • Curves: P-256
              1628Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A11 Bionic w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3428, DSA #1334, DRBG #1283
              1627Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10x Fusion w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3428, DSA #1333, DRBG #1283
              1626Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3425, DSA #1332, DRBG #1280
              1625Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 Fusion w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3428, DSA #1331, DRBG #1283
              1624Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9 w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3426, DSA #1330, DRBG #1281
              1623Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3423, DSA #1329, DRBG #1278
              1621Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669) 227-3579

              Apple iOS CoreCrypto Module

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A7 w/ iOS 11
              1/5/2018
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3421, DSA #1327, DRBG #1276
              1620Huawei Technologies Co., Ltd
              Huawei Industrial Base, Bantian Longgang
              Shenzhen, Guangdong 518129
              China

              SPENCER HE
              heshunbin@huawei.com
              +86-755-28979041

              EulerOS 2.0

              EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

                • Intel Xeon w/ EulerOS 2.0
              1/5/2018
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384, P-521
              • KAS ECC:
                • Functions: Full Public Key Validation, Key Pair Generation, Partial Public Key Validation, Public Key Regeneration
                • Schemes:
                  • Ephemeral Unified:
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4126, ECDSA #1312, DRBG #1884
              1619Silver Peak Systems, Inc.
              2860 De La Cruz Blvd.
              Santa Clara, CA 95050
              USA

              Damon Ennis
              (408) 935-1836

              Anusha Vaidyanathan
              (408) 935 1800
              Fax: (408) 588-1608

              Silver Peak Cryptographic library

              1.0 (Firmware)


              Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

                • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
                • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
              1/5/2018
              • IKEv1:
                • Methods: Pre-shared Key
                • Pre-shared Key Length: 8-224 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 bits
                    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 8192 bits
                    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4125, HMAC #3380
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4125
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4125, HMAC #3380
              1618Silver Peak Systems, Inc.
              2860 De La Cruz Blvd.
              Santa Clara, CA 95050
              USA

              Damon Ennis
              (408) 935-1836

              Anusha Vaidyanathan
              (408) 935 1800
              Fax: (408) 588-1608

              Silver Peak Cryptographic library

              1.0 (Firmware)


              Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

                • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
                • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
              1/5/2018
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1617Hewlett Packard Enterprise
              8 Technology Drive
              Westborough, MA 01581
              USA

              Aftab Alan
              aftab.alan@hpe.com
              917 576-6680

              OmniStack Cryptographic Library

              2.1


              The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

                • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
              12/22/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              1616Hewlett Packard Enterprise
              8 Technology Drive
              Westborough, MA 01581
              USA

              Aftab Alan
              aftab.alan@hpe.com
              917 576-6680

              OmniStack Cryptographic Library

              2.1


              The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

                • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
              12/22/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4124
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4124, HMAC #3379
              1615DocuSign, Inc.
              221 Main St.
              Suite 1000
              San Francisco, CA 94105
              USA

              Ezer.Farhi@docusign.com
              Ezer.Farhi@docusign.com
              972-3-9279529

              DocuSign-SA-TLS

              8.5 (Firmware)


              DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

                • Intel® Xeon Quad-Core
              12/22/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #4123, HMAC #3378
              1614Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • intel Core M w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1874
              1613Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • intel i5 w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1873
              1612Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • intel Xeon w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1872
              1611A10 Networks, Inc.
              3 West Plumeria Drive
              San Jose, CA 95134
              USA

              John Chiong
              +1 408 325-8668

              A10 Networks Data Plane FIPS Library CNN3550

              CNN3550


              The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

                • N/A
              12/22/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384, P-521
              1610A10 Networks, Inc.
              3 West Plumeria Drive
              San Jose, CA 95134
              USA

              John Chiong
              +1 408 325-8668

              A10 Networks Data Plane FIPS Library CNN3530

              CNN3530


              The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

                • N/A
              12/22/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384, P-521
              1609Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i7 w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1871
              1608Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i7 w/ macOS 10.13
              12/22/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4119, ECDSA #1307, DRBG #1871
              1607Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Core M w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1870
              1606Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Core M w/ macOS 10.13
              12/22/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                • Prerequisite: SHS #4118, ECDSA #1306, DRBG #1870
              1605Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Xeon w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1869
              1604Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Xeon w/ macOS 10.13
              12/22/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4117, ECDSA #1305, DRBG #1869
              1603Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i5 w/ macOS 10.13
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1868
              1602Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i5 w/ macOS 10.13
              12/22/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                • Prerequisite: SHS #4116, ECDSA #1304, DRBG #1868
              1601Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Bill Shelton
              bshelton@juniper.net
              408-745-2000

              Vann (Vanna) Nguyen
              vann@juniper.net
              408-745-2000

              JUNOS Version 17.3R2 - OpenSSL

              17.3R2 (Firmware)


              The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

                • Intel Xeon D
              12/22/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4112
              1600Hewlett Packard Enterprise
              8 Technology Drive
              Westborough, MA 01581
              USA

              Aftab Alan
              aftab.alan@hpe.com
              917 576-6680

              OmniStack Cryptographic Library

              2.1


              The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

                • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
              12/22/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              1599Hewlett Packard Enterprise
              8 Technology Drive
              Westborough, MA 01581
              USA

              Aftab Alan
              aftab.alan@hpe.com
              917 576-6680

              OmniStack Cryptographic Library

              2.1


              The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

                • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
              12/22/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4110
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4110, HMAC #3365
              1598SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              George Duo
              gduo@sonicwall.com
              (408) 962-7049

              SonicOS 6.5.0 for TZ, NSA and SuperMassive

              FW Version 6.5.0 (Firmware)


              The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

                • Cavium OCTEON III (CN7XXX)
                • Cavium OCTEON II (CN6XXX)
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #1865
              1597SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              George Duo
              gduo@sonicwall.com
              (408) 962-7049

              SonicOS 6.5.0 for TZ, NSA and SuperMassive

              FW Version 6.5.0 (Firmware)


              The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

                • Cavium OCTEON II (CN6XXX)
                • Cavium OCTEON III (CN7XXX)
              12/22/2017
              • IKEv1:
                • Methods: Digital Signature, Pre-shared Key
                • Pre-shared Key Length: 176-1024 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 bits
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4109, HMAC #3364
              • IKEv2:
                • Derived Keying Material length: 160-512 bits
                • Diffie-Hellman shared secrets:
                  • Diffie-Hellman shared secret:
                    • Length: 224 bits
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Diffie-Hellman shared secret:
                    • Length: 2048 bits
                    • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4109, HMAC #3364
              • SNMP:
              • SSH:
                • SHA Functions: SHA-1
                • Prerequisite: SHS #4109
              • TLS:
                • Supports TLS 1.0/1.1
                • Prerequisite: SHS #4109, HMAC #3364
              1596SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              George Duo
              gduo@sonicwall.com
              (408) 962-7049

              SonicOS 6.5.0 for TZ, NSA and SuperMassive

              FW Version 6.5.0 (Firmware)


              The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

                • Cavium OCTEON III (CN7XXX)
                • Cavium OCTEON II (CN6XXX)
              12/22/2017
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • Full Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256, SHA-384, SHA-512
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256, SHA-384, SHA-512
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384, SHA-512
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256, SHA-384, SHA-512
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256, SHA-384, SHA-512
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384, SHA-512
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • One Pass Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256, SHA-384, SHA-512
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256, SHA-384, SHA-512
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384, SHA-512
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • One Pass DH:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256, SHA-384, SHA-512
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256, SHA-384, SHA-512
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384, SHA-512
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                  • Static Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EB:
                        • Curve: P-224
                        • SHA: SHA-256, SHA-384, SHA-512
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256, SHA-384, SHA-512
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384, SHA-512
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4109, ECDSA #1299, DRBG #1865, HMAC #3364
              • KAS FFC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Partial Public Key Validation
                • Schemes:
                  • dhHybrid1:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256, SHA-384, SHA-512
                      • FC:
                        • SHA: SHA-256, SHA-384, SHA-512
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256, SHA-384, SHA-512
                      • FC:
                        • SHA: SHA-256, SHA-384, SHA-512
                  • dhHybrid1Flow:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256, SHA-384, SHA-512
                      • FC:
                        • SHA: SHA-256, SHA-384, SHA-512
                  • dhOneFlow:
                    • Key Agreement Roles: Initiator, Responder
                  • dhStatic:
                    • Key Agreement Roles: Initiator, Responder
                • Prerequisite: SHS #4109, DSA #1325, DRBG #1865, HMAC #3364
              1595Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              CiscoSSL FIPS Object Module (Assembler)

              6.2


              The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

                • Cavium Octeon MIPS64 w/ Linux 3.10
              12/22/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #3471, ECDSA #1254, DRBG #1317
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #3471, DSA #1130, DRBG #1317
              1594Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

                • Apple A10X Fusion w/ tvOS 11
              12/22/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1861
              1593Oracle Corporation
              500 Oracle Parkway
              Redwood Shores, CA 94065
              USA

              Chris Brych
              chris.brych@oracle.com
              +1 613.216.3078

              Oracle Linux 7 GnuTLS C Implementation

              R7-2.0.0


              GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

                • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
              12/22/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4105, HMAC #3360
              1592Oracle Corporation
              500 Oracle Parkway
              Redwood Shores, CA 94065
              USA

              Chris Brych
              chris.brych@oracle.com
              +1 613.216.3078

              Oracle Linux 7 GnuTLS C Implementation

              R7-2.0.0


              GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

                • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
              12/22/2017
              • KAS ECC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #4105, ECDSA #1297, DRBG #1859
              • KAS FFC:
                • Functions: Domain Parameter Generation, Domain Parameter Validation, Full Public Key Validation, Key Pair Generation, Public Key Regeneration
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-224
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #4105, DSA #1324, DRBG #1859
              1591Extreme Networks
              6480 Via Del Ora
              San Jose, CA 95119
              USA

              Craig J Ficik
              cficik@extremenetworks.com
              603-9525922
              Fax: 404-806-5377

              Extreme Networks Summit Series

              22.3 (Firmware)


              Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

                • Cavium Octeon II
              12/15/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-512
                • Prerequisite: SHS #4104
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-512
                • Prerequisite: SHS #4104, HMAC #3359
              1590Extreme Networks
              6480 Via Del Ora
              San Jose, CA 95119
              USA

              Craig J Ficik
              cficik@extremenetworks.com
              603-952-5922
              Fax: 404-806-5377

              Extreme Networks Summit Series

              22.3 (Firmware)


              Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

                • Intel Atom C series
              12/15/2017
              • SSH:
                • SHA Functions: SHA-1, SHA-256, SHA-512
                • Prerequisite: SHS #4103
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-512
                • Prerequisite: SHS #4103, HMAC #3358
              1589Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A10 Fusion w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1856
              1588Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A11 Bionic w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1855
              1587Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A10X Fusion w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1854
              1586Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A9X w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1853
              1585Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A9 w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1852
              1584Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A8X w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1851
              1583Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A8 w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1850
              1582Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

              8.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

                • Apple A7 w/ iOS 11
              12/15/2017
              • ECDSA SigGen:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1849
              1581SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sangala
              usanagala@SonicWALL.com
              408-962-6248
              Fax: 408-745-9300

              Mike Vache
              mvache@sonicwall.com
              408-962-6760
              Fax: 408-745-9300

              Net-SNMP

              5.6.1 (Firmware)


              Net-snmp-5.6.1 with minor patches

                • Intel Core i5 with AES-NI
                • Intel Xeon with AES-NI
              12/15/2017
              • SNMP:
              1580SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sangala
              usanagala@SonicWALL.com
              408-962-6248
              Fax: 408-745-9300

              Mike Vache
              mvache@sonicwall.com
              408-962-6760
              Fax: 408-745-9300

              OpenSSL

              1.0.2k (Firmware)


              OpenSSL 1.0.2k with minor patches

                • Intel Core i5 with AES-NI
                • Intel Xeon with AES-NI
              12/15/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #4088, HMAC #3343
              1579SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sangala
              usanagala@SonicWALL.com
              408-962-6248
              Fax: 408-745-9300

              Mike Vache
              mvache@sonicwall.com
              408-962-6760
              Fax: 408-745-9300

              OpenSSH

              openssh-7.4p1 (Firmware)


              SSH may generate keys of any size. Default is 2048. Open source version slightly modified to read our CSPs and perform necessary testing and validation.

                • Intel Core i5 with AES-NI
                • Intel Xeon with AES-NI
              12/15/2017
              • SSH:
                • SHA Functions: SHA-256
                • Prerequisite: SHS #4088
              1578OpenSSL Validation Services, Inc.
              1829 Mount Ephraim Road
              Adamstown, MD 21710
              USA

              Steve Marquess
              info@openssl.com
              301-874-2571

              OpenSSL FIPS Object Module

              2.0.16


              The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

                • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
                • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
              12/15/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: B-283, K-283, P-256
                        • SHA: SHA-256, SHA-384, SHA-512
                      • ED:
                        • Curve: B-409, K-409, P-384
                        • SHA: SHA-384, SHA-512
                • Prerequisite: SHS #3681, ECDSA #1091, DRBG #1451
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FC:
                        • SHA: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3681, DSA #1195, DRBG #1451
              1577Gemalto
              20 Colonnade Road, Suite 200
              Ottawa, ON K2E7M6
              Canada

              Security and Certifications Team
              SecurityCertifications@gemalto.com

              Luna IS Cryptographic Library

              6.3.2 (Firmware)


              The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

                • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
              12/15/2017
              • ECDSA SigGen:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: DRBG #1704
              1576McAfee, Inc.
              2821 Mission College Blvd.
              Santa Clara, CA 95054
              USA

              Andy Nissen
              andy.nissen@intel.com
              651-770-6151

              McAfee Advanced Threat Defense

              4.0


              A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

                • Intel Xeon w/ Linux 4.4.27
              12/8/2017
              • KAS ECC:
                • Functions: Key Pair Generation
                • Schemes:
                  • Ephemeral Unified:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • EC:
                        • Curve: P-256
                        • SHA: SHA-256
                      • ED:
                        • Curve: P-384
                        • SHA: SHA-384
                      • EE:
                        • Curve: P-521
                        • SHA: SHA-512
                • Prerequisite: SHS #1801, ECDSA #415, DRBG #822
              • KAS FFC:
                • Functions: Key Pair Generation
                • Schemes:
                  • dhEphem:
                    • Key Agreement Roles: Initiator, Responder
                    • Parameter Sets:
                      • FB:
                        • SHA: SHA-256
                      • FC:
                        • SHA: SHA-256
                • Prerequisite: SHS #1801, DSA #1322, DRBG #822
              1575SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sangala
              usanagala@SonicWALL.com
              408-962-6248
              Fax: 408-745-9300

              Mike Vache
              mvache@sonicwall.com
              408-962-6760
              Fax: 408-745-9300

              OpenJDK

              1.8.0-jdk8u152-b01-20170213 (Firmware)


              CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc..

                • Intel Xeon with AES-NI
                • Intel Core i5 with AES-NI
              12/8/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256
                • Prerequisite: SHS #4089, HMAC #3344
              1574Certes Networks, Inc.
              300 Corporate Center Drive
              Suite 140
              Pittsburgh, PA 15108
              USA

              Sean Everson
              sean.everson@certesnetworks.com
              1.412.357.1130
              Fax: 1.412.262.2574

              Gary Brunner
              gary.brunner@certesnetworks.com
              1.412.200.2177
              Fax: 1.412.262.2574

              CryptoFlow Net Creator Java Crypto Module

              1.0


              The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

                • Intel Xeon E3-1270v5 w/ CentOS 6.7
              12/8/2017
              • ECC CDH:
                • Primitive
                • Curves: P-256, P-384
              1573Certes Networks, Inc.
              300 Corporate Center Drive
              Suite 140
              Pittsburgh, PA 15108
              USA

              Sean Everson
              sean.everson@certesnetworks.com
              1.412.357.1130
              Fax: 1.412.262.2574

              Gary Brunner
              gary.brunner@certesnetworks.com
              1.412.200.2177
              Fax: 1.412.262.2574

              CryptoFlow Net Creator Java Crypto Module

              1.0


              The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

                • Intel Xeon E3-1270v5 w/ CentOS 6.7
              12/8/2017
              • TLS:
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4087, HMAC #3342
              1572RSA Security LLC
              174 Middlesex Turnpike
              Bedford, MA 01730
              USA

              FIPS Program
              fips-program@rsa.com

              RSA BSAFE® Crypto-J JSAFE and JCE Software Module

              6.2.4


              RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

                • Intel Core i5 w/ Windows 10 (64-bit)
                • Intel Xeon w/ CentOS 7.3
                • Qualcomm Snapdragon w/ Android 7.1.2
              12/8/2017
              • RSADP:
                • Modulus Size: 2048 bits
              1571RSA Security LLC
              174 Middlesex Turnpike
              Bedford, MA 01730
              USA

              FIPS Program
              fips-program@rsa.com

              RSA BSAFE® Crypto-J JSAFE and JCE Software Module

              6.2.4


              RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

                • Intel Core i5 w/ Windows 10 (64-bit)
                • Qualcomm Snapdragon w/ Android 7.1.2
                • Intel Xeon w/ CentOS 7.3
              12/8/2017
              • TLS:
                • Supports TLS 1.0/1.1
                • Supports TLS 1.2:
                  • SHA Functions: SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #4085, HMAC #3340
              1570RSA Security LLC
              174 Middlesex Turnpike
              Bedford, MA 01730
              USA

              FIPS Program
              fips-program@rsa.com

              RSA BSAFE® Crypto-J JSAFE and JCE Software Module

              6.2.4


              RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

                • Intel Core i5 w/ Windows 10 (64-bit)
                • Intel Xeon w/ CentOS 7.3
                • Qualcomm Snapdragon w/ Android 7.1.2
              12/8/2017
              • ECC CDH:
                • Primitive
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              1569Ruckus Wireless, Inc.
              350 W Java Drive
              Sunnyvale, CA 94089
              USA

              Suneetha Sarala
              Suneetha.Sarala@arris.com
              650-265-4200

              Julie Lu
              Julie.Lu@arris.com
              650-265-4200

              BRCD-IP-CRYPTO-VER-4.0

              BRCD-IP-CRYPTO-VER-4.0 (Firmware)


              Firmware algorithm for the Brocade FastIron Series

                • Freescale P2041
              12/8/2017
              • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                1568Ruckus Wireless, Inc.
                350 W Java Drive
                Sunnyvale, CA 94089
                USA

                Suneetha Sarala
                Suneetha.Sarala@arris.com
                650-265-4200

                Julie Lu
                Julie.Lu@arris.com
                650-265-4200

                BRCD-IP-CRYPTO-VER-4.0

                BRCD-IP-CRYPTO-VER-4.0 (Firmware)


                Firmware algorithm for the Brocade FastIron Series

                  • ARM Cortex A57
                12/8/2017
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #4082
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #4082, HMAC #3337
                1567Ruckus Wireless, Inc.
                350 W Java Drive
                Sunnyvale, CA 94089
                USA

                Suneetha Sarala
                Suneetha.Sarala@arris.com
                650-265-4200

                Julie Lu
                Julie.Lu@arris.com
                650-265-4200

                BRCD-IP-CRYPTO-VER-4.0

                BRCD-IP-CRYPTO-VER-4.0 (Firmware)


                Firmware algorithm for the Brocade FastIron Series

                  • ARM Cortex A9
                12/8/2017
                • IKEv2:
                  • Derived Keying Material length: 1536-2432 bits
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 256 bits
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 2048 bits
                      • SHA Functions: SHA-256, SHA-384
                    • Diffie-Hellman shared secret:
                      • Length: 384 bits
                      • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #4081, HMAC #3336
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256
                  • Prerequisite: SHS #4081
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #4081, HMAC #3336
                1566Ruckus Wireless, Inc.
                350 W Java Drive
                Sunnyvale, CA 94089
                USA

                Suneetha Sarala
                Suneetha.Sarala@arris.com
                650-265-4200

                Julie Lu
                Julie.Lu@arris.com
                650-265-4200

                BRCD-IP-CRYPTO-VER-4.0

                BRCD-IP-CRYPTO-VER-4.0 (Firmware)


                Firmware algorithm for the Brocade FastIron Series

                  • ARM Cortex A9
                12/8/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #4081, ECDSA #1282, DRBG #1837
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FC:
                          • SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #4081, DSA #1318, DRBG #1837
                1565Gemalto
                20 Colonnade Road, Suite 200
                Ottawa, ON K2E7M6
                Canada

                Security and Certifications Team
                SecurityCertifications@gemalto.com

                Luna K6 Cryptographic Library

                6.24.6 (Firmware)


                The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

                  • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
                12/8/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1704
                1564Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669)227-3579
                Fax: (866)315-1954

                Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

                8.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

                  • Apple A10X w/ tvOS 11 Fusion
                11/30/2017
                • ECDSA SigGen:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1832
                1563Apple Inc.
                1 Infinite Loop
                Cupertino, CA 95014
                USA

                Shawn Geddis
                geddis@apple.com
                (669)227-3579
                Fax: (866)315-1954

                Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

                8.0


                Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

                  • Apple A10X w/ tvOS 11 Fusion
                11/30/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • One Pass DH:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                  • Prerequisite: SHS #4076, ECDSA #1279, HMAC #3331
                1562Gemalto
                20 Colonnade Road, Suite 200
                Ottawa, ON K2E7M6
                Canada

                Security and Certifications Team
                SecurityCertifications@gemalto.com

                Luna G5 Cryptographic Library

                6.24.6 (Firmware)


                The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

                  • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
                11/30/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1704
                1561Cisco Systems, Inc.
                170 West Tasman Drive
                San Jose, CA 95134
                USA

                Global Certification Team
                certteam@cisco.com

                Cisco Security Crypto Virtual

                F6.2


                The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

                  • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
                11/30/2017
                • IKEv2:
                  • Derived Keying Material length: 800-3072 bits
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 2048 bits
                      • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #4074, HMAC #3329
                • SSH:
                  • SHA Functions: SHA-1
                  • Prerequisite: SHS #4074
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384
                  • Prerequisite: SHS #4074, HMAC #3329
                1560Cisco Systems, Inc.
                170 West Tasman Drive
                San Jose, CA 95134
                USA

                Global Certification Team
                certteam@cisco.com

                Cisco Security Crypto Virtual

                F6.2


                The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

                  • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
                11/30/2017
                • KAS ECC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #4074, ECDSA #1277, DRBG #1828
                • KAS FFC:
                  • Functions: Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #4074, DSA #1314, DRBG #1828
                1559Cavium, Inc.
                2315 N 1st Street
                San Jose, CA 95131
                USA

                Tejinder Singh
                Tejinder.Singh@caviumnetworks.com
                408-943-7403
                Fax: 408-577-1992

                Phanikumar Kancharla
                Pkkancharla@caviumnetworks.com
                408-943-7496

                ngfips_ecc

                CN52XX 1.0.1 (Firmware)


                The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

                  • Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX
                11/30/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #32
                1558Brocade Communications Systems LLC
                120 Holger Way
                San Jose, CA 95110
                USA

                Hamid Sabouti
                hamid.sobouti@broadcom.com
                408-333-4150
                Fax: 408-333-3844

                Brocade Fabric OS FIPS Cryptographic Module

                8.2.0


                Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                  • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
                  • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
                11/30/2017
                • SNMP:
                • SSH:
                  • SHA Functions: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #4071
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256
                  • Prerequisite: SHS #4071, HMAC #3328
                1557Brocade Communications Systems LLC
                120 Holger Way
                San Jose, CA 95110
                USA

                Hamid Sabouti
                hamid.sobouti@broadcom.com
                408-333-4150
                Fax: 408-333-3844

                Brocade Fabric OS FIPS Cryptographic Module

                8.2.0


                Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                  • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
                  • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
                11/30/2017
                • KAS ECC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #4071, ECDSA #1275, DRBG #1827
                • KAS FFC:
                  • Functions: Domain Parameter Generation, Domain Parameter Validation, Key Pair Generation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #4071, DSA #2583, DRBG #1827
                1556SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE NSS on x86 with AES-NI

                2.0


                SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                  • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
                11/30/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #4070, HMAC #3327
                1555SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE NSS on x86 with AES-NI

                2.0


                SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                  • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
                11/30/2017
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #4070, ECDSA #1274, DRBG #1826
                • KAS FFC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #4070, DSA #1311, DRBG #1826
                1554SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE NSS on x86 without AES-NI

                2.0


                SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                  • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
                11/30/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #4069, HMAC #3326
                1553SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE NSS on x86 without AES-NI

                2.0


                SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                  • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
                11/30/2017
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #4069, ECDSA #1273, DRBG #1825
                • KAS FFC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #4069, DSA #1310, DRBG #1825
                1552SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE NSS z13

                2.0


                SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                  • z13 w/ SUSE Linux Enterprise Server 12 SP2
                11/30/2017
                • TLS:
                  • Supports TLS 1.0/1.1
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #4068, HMAC #3325
                1551SUSE, LLC
                10 Canal Park, Suite 200
                Cambridge, MA 02141
                USA

                Andreas Stieger
                astieger@suse.com
                +49 911 74053 384

                Thomas Biege
                thomas@suse.de
                +49 911 74053 500

                SUSE NSS z13

                2.0


                SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

                  • z13 w/ SUSE Linux Enterprise Server 12 SP2
                11/30/2017
                • KAS ECC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • Ephemeral Unified:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • EC:
                          • Curve: P-256
                          • SHA: SHA-256
                        • ED:
                          • Curve: P-384
                          • SHA: SHA-384
                        • EE:
                          • Curve: P-521
                          • SHA: SHA-512
                  • Prerequisite: SHS #4068, ECDSA #1272, DRBG #1824
                • KAS FFC:
                  • Functions: Key Pair Generation, Partial Public Key Validation
                  • Schemes:
                    • dhEphem:
                      • Key Agreement Roles: Initiator, Responder
                      • Parameter Sets:
                        • FB:
                          • SHA: SHA-224
                        • FC:
                          • SHA: SHA-256
                  • Prerequisite: SHS #4068, DSA #1309, DRBG #1824
                1550Lexmark International, Inc.
                740 West New Circle Road
                Lexington, KY 40550
                USA

                Graydon Dodson
                gdodson@lexmark.com
                +1 859 232-6483

                Crypto Module (user)

                3.2


                Lexmark Crypto Module (user)

                  • Marvell 88PA6270C0 w/ Lexmark Linux v4
                11/22/2017
                • IKEv1:
                  • Methods: Digital Signature, Public Key Encryption
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 bits
                      • SHA Functions: SHA-256, SHA-512
                  • Prerequisite: SHS #4063, HMAC #3320
                • IKEv2:
                  • Derived Keying Material length: 1056-3072 bits
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 bits
                      • SHA Functions: SHA-256
                  • Prerequisite: SHS #4063, HMAC #3320
                1549Lexmark International, Inc.
                740 West New Circle Road
                Lexington, KY 40550
                USA

                Graydon Dodson
                gdodson@lexmark.com
                +1 859 232-6483

                Crypto Module (user)

                3.2


                Lexmark Crypto Module (user)

                  • Marvell MV78460-B0 w/ Lexmark Linux v4
                11/22/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1821
                1548Lexmark International, Inc.
                740 West New Circle Road
                Lexington, KY 40550
                USA

                Graydon Dodson
                gdodson@lexmark.com
                +1 859 232-6483

                Crypto Module (user)

                3.2


                Lexmark Crypto Module (user)

                  • Marvell MV78460-B0 w/ Lexmark Linux v4
                11/22/2017
                • IKEv1:
                  • Methods: Digital Signature, Public Key Encryption
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 bits
                      • SHA Functions: SHA-256, SHA-512
                  • Prerequisite: SHS #4064, HMAC #3321
                • IKEv2:
                  • Derived Keying Material length: 1056-3072 bits
                  • Diffie-Hellman shared secrets:
                    • Diffie-Hellman shared secret:
                      • Length: 224 bits
                      • SHA Functions: SHA-256
                  • Prerequisite: SHS #4064, HMAC #3321
                1547Lexmark International, Inc.
                740 West New Circle Road
                Lexington, KY 40550
                USA

                Graydon Dodson
                gdodson@lexmark.com
                +1 859 232-6483

                Crypto Module (user)

                3.2


                Lexmark Crypto Module (user)

                  • Marvell 88PA6270C0 w/ Lexmark Linux v4
                11/22/2017
                • ECDSA SigGen:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: DRBG #1820
                1546Bomgar Corporation
                578 Highland Colony Parkway
                Paragon Centre, Suite 300
                Ridgeland, MS 39157
                USA

                Faye Santangelo
                FSantangelo@bomgar.com
                6016078322

                Bomgar CryptoEngine

                2.0.13 (Firmware)


                The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

                  • Intel® Xeon E5-2640 v3
                11/22/2017
                • TLS:
                  • Supports TLS 1.2:
                    • SHA Functions: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3912, HMAC #3180
                1545Cisco Systems, Inc.
                170 W Tasman Dr
                San Jose, CA 95134
                USA

                Clint Winebrenner
                cwinebre@cisco.com
                919.392.6520

                CiscoSSL FIPS Object Module

                6.0 (Firmware)


                The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

                  • Apple A10 on iOS 10.x
                11/17/2017
                • IKEv2:
                  • De