Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

DRBG Validation List

This list identifies implementations that have been validated as conforming to the Deterministic Random Bit Generator (DRBG) Algorithm, as specified in Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, using tests described in the DRBG Validation Suite (DRBGVS).

As of June 2015, in accordance with SP800-90A Revision 1, and November 2015, in accordance with SP800-131A Revision 1, the use of Dual_EC_DRBG is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
2302Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
312 Kings Way
South Melbourne, Victoria 3025
Australia

John Weston
john.weston@senetas.com
+61 3 9868 4555
Fax: +61 3 9821 4899

CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library

5.0.1 (Firmware)


The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services.

    • ARM Cortex A9
9/14/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4560
2301Berryville Holdings, LLC
2465 Centerville Road
#J17-812
Herndon, VA 20171
USA

Cael Jacobs
cael@bvhllc.com
(703) 782-9840

Chava Jurado
chava@bvhllc.com
(703) 782-9840

Cryptographic Module for Fognigma

2.0.16


The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)

    • ARM Cortex-A53 without PAA w/ Raspbian Stretch
    • Intel® Xeon E5 without PAA w/ Ubuntu 16.04
    • ARM Cortex-A53 with PAA w/ Raspbian Stretch
    • Intel® Xeon E5 with PAA w/ Ubuntu 16.04
9/14/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Prerequisite: AES #5687
  • Hash based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4559
  • HMAC based:
    • Prediction Resistance Modes: Enabled, Not Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3788
2300Canon Inc.
30-2
Shimomaruko 3-chome
Ohta-ku, Tokyo 146-8501
Japan

Hiroyuki Takahashi
oipcertg@jp.canon.com
+81-3-3758-2111
Fax: +81-3-3758-1160

DRBG Library on Canon MFP Security Chip

V01L01R02 (Firmware)


The DRBG Library provides cryptographic services for Canon MFP Security Chip.

    • ARM Cortex-M3
9/14/2018
  • Hash based:
    • Prediction Resistance Modes: Not Enabled
    • Modes: SHA-256
    • Prerequisite: SHS #4547
2299Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

6.2 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Cavium Octeon CN7240
9/14/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5683
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4555
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3784
2298Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

    • N/A
9/14/2018
  • Counter:
    • Modes: AES-128, AES-192, AES-256
    • Derivation Function States: Derivation Function not used, Derivation Function used
    • Prediction Resistance Modes: Enabled
    • Prerequisite: AES #5682
  • Hash based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: SHS #4554
  • HMAC based:
    • Prediction Resistance Modes: Enabled
    • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
    • Prerequisite: HMAC #3783
2297
9/14/2018
    2296Symantec Corporation
    350 Ellis Street
    Mountain View, CA 94043
    USA

    Ian Hall
    ian_hall@symantec.com
    703-598-6876

    Diana Robinson
    diana_robinson@symantec.com
    845-454-6397

    Web Isolation Cryptographic Library

    1.0


    The Web Isolation Cryptographic Library provides the necessary cryptographic services specifically for use in the Web Isolation Virtual Appliance.

      • Intel E5 4620v4 w/ Ubuntu 14.04 on ESXi 6.0
    9/14/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5678
    2295Sonus Networks, Inc.
    4 Technology Park Drive
    Westford, MA 01886
    USA

    Adam Elshama
    aelshama@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Keith Conger
    KConger@rbbn.com
    1-855-GO-SONUS
    Fax: 978-614-8101

    Sonus Cryptographic Library

    3.1 (Firmware)


    Sonus Session Border Controller FIPS-validated cryptographic software module

      • Intel Xeon (Ivy Bridge)
    9/14/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5677
    2294Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon E5-2609
    9/7/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5675
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4546
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3777
    2293Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    6.2 (Firmware)


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon E5-2680
    9/7/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5674
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4545
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3776
    2292Dell, Inc
    5450 Great America Parkway
    Santa Clara, CA 95054
    US

    Srihari Mandava
    srihari_mandava@dell.com

    Dell OpenSSL Cryptographic Library

    2.4


    Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell's Data Center hardened Dell Networking OS management and routing features.

      • Intel Atom C2000 w/ Dell EMC Networking OS 9.12(1.0)
    9/7/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5673
    2291NETSCOUT Systems, Inc.
    310 Littleton Road
    Westford, MA 01886
    USA

    Steve Swidrak
    Stephen.Swidrak@netscout.com

    NetScout FIPS Object Module

    1.0


    This cryptographic library provides cryptographic services to NETSCOUT products.

      • Intel Xeon X5620 with AES-NI w/ Linux 2.6.39.1
      • Intel Xeon E5 Series with AES-NI w/ Linux 3.7.5
      • Intel Xeon E5-2608L v3 with AES-NI w/ ArbOS 7.0
      • Intel Xeon E5-2697 v3 with AES-NI w/ Linux 3.10
    9/4/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5669
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4543
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3774
    2290Klas Telecom
    1101 30th Street NW, Suite 500
    Washington, DC 20007
    USA

    Toby Stidham
    toby.stidham@klastelecom.com
    352-406-0560

    Cian Masterson
    cian.masterson@klastelecom.com

    OpenSSL 1.0.1h without a FIPS object module

    1.0.1h


    Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

      • Marvell Prestera 98DX8212 w/ Linux 3.10.70
    9/4/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5668
    2289KeyPair Consulting Inc.
    846 Higuera Street
    Suite 2
    San Luis Obispo, CA 93401
    USA

    Mark Minnoch
    mark@keypair.us
    805-316-5024

    Steve Weymann
    steve@keypair.us
    805-316-5024

    KeyPair Cryptographic Module for OpenSSL

    2.0.16


    The KeyPair Cryptographic Module for OpenSSL expands the list of Tested Configurations (operating system + processor) for the OpenSSL FIPS Object Module v2.0. Please contact KeyPair Consulting to include your desired operating system as a Tested Configuration on a FIPS 140-2 certificate branded in your company's name.

      • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 6
      • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 7
      • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 7
      • Nvidia Tegra X1 with PAA w/ Android 8.1
      • Nvidia Tegra X1 without PAA w/ Android 8.1
      • Intel Xeon E5-2430L (x86) with PAA w/ Ubuntu 16.04
      • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 6
      • Intel Xeon E5-2430L (x86) without PAA w/ Ubuntu 16.04
    9/4/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5667
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4541
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3772
    2288Extreme Networks
    6480 Via Del Oro
    San Jose, CA 95119
    USA

    Sunil Chitnis
    schitnis@extremenetworks.com
    408-352-2407

    Joey Salanga
    jsalanga@extremenetworks.com
    408-352-2439

    Extreme FIPS Cryptographic Library

    2.1 (Firmware)


    The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

      • Freescale E500mc
    9/4/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5666
    2287Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Kevin Meagher
    kmeagher@ciena.com
    1-410-865-8936

    OpenSSL FIPS Object Module

    2.0.12


    Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

      • Cavium OCTEON II CN6xxx w/ SAOS 6.17
    8/27/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5665
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3770
    2286FP InovoLabs GmbH
    Prenzlauer Promenade 28
    Berlin, Berlin 13089
    Germany

    Janos Laube
    j.laube@francotyp.com
    +49 30 220660 397

    Hasbi Kabacaoglu
    h.kabacaoglu@francotyp.com
    +49 30 220660 656

    NpsdCrypto

    N-PSD rev. 04 1.0 (Firmware)


    nRevenector Cryptographic Library

      • Maxim MAX32590
    8/27/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
    2285Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Ahmer Sabri
    ahmer@google.com
    201-341-1408

    Hotplug Cryptographic Module Firmware

    1.0 (Firmware)


    C implementation of AES-ECB encryption, C implementation of NIST SP 800-90A Revision 1 CTR_DRBG

      • NIC Processor, FW runtime environment
    8/27/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5659
    2284Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 NSS without AES-NI

    R7-2.0.0


    Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    8/27/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4535
    2283Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    securitycertifications@gemalto.com

    SafeNet Accelerated Cryptographic Library

    1.0 (Firmware)


    The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

      • Andretta 2.0
    8/17/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5652
    2282ECI Telecom Ltd
    30 Hasivim Street
    Petach Tikvah 49517
    Israel

    Milind Barve
    milind.barve@ecitele.com
    +91-80-67122000
    Fax: +91-80-67122001

    ECI (OS) Crypto Library

    2.0.16


    ECI (OS) Crypto Library

      • PowerPC w/ Linux
    8/17/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5651
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4532
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3765
    2281SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    844-436-2797

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Windows Server 2012 R2
      • Intel i7 w/ Red Hat Enterprise Linux 7
    8/17/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5650
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4531
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3764
    2280IBM Corporation
    1701 North Street
    Endicott, NY 13760
    USA

    AIX FIPS Security
    aixfips@in.ibm.com

    AIX FIPS Crypto Module for OpenSSL

    2.0.16


    The AIX FIPS Crypto Module for OpenSSL is supported on AIX for the Power 7, Power 8 and Power 9 platforms.

      • IBM Power9 (PPC) without PAA w/ AIX 7.2 64-bit
      • IBM Power9 (PPC) with PAA w/ AIX 7.2 32-bit
      • IBM Power9 (PPC) with PAA w/ AIX 7.2 64-bit
      • IBM Power9 (PPC) without PAA w/ AIX 7.2 32-bit
    8/17/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5649
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4530
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3763
    2279Cambium Networks
    3800 Golf Road
    Suite 360
    Rolling Meadows, IL 60008
    USA

    Mark Thomas
    mark.thomas@cambiumnetworks.com
    +44 1364 655500
    Fax: +44 1364 654625

    Nithin Kotekar
    nithin.kotekar@cambiumnetworks.com
    +91 080 67333162

    PTP700-NIST-CTR-DRBG

    01.00 (Firmware)


    NIST_CTR_DRBG follows implementation based on NIST SP 800-90 CTR_DRBG (Random Number Generator) March 2007 Section 10.2.1 and produces deterministic random bits. This is configured to AES 128 bits with Derivation Function based on Section 10.4.2.

      • TI TMS320C6657 - Multicore Fixed and Floating-Point DSP
    8/17/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5648
    2278Konica Minolta, Inc.
    2970, Ishikawa-machi
    Hachioji-shi, Tokyo 192-8505
    Japan

    R&D Administration Division, R&D Headquarters Business Techn

    Konica Minolta PP Crypto Library

    1.2 Rev.1 (Firmware)


    Konica Minolta PP Crypto Library is used in AccurioPress C6100 / C6085 and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generataion/verification, AES, hash function including SHA and HMAC_DRBG.

      • Intel(R) Core(TM) i5-4570S
    8/17/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3760
    2277Blue Cedar
    325 Pacific Avenue
    San Francisco, CA 94111
    USA

    FIPS Admin
    fips@bluecedar.com
    415-329-0401

    Blue Cedar Cryptographic Module

    2.0.16


    The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Nvidia Tegra X1 with PAA w/ Android 8.1
      • Nvidia Tegra X1 without PAA w/ Android 8.1
      • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
      • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5644
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4526
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3759
    2276Q Core Medical Ltd.
    29 Yad Harutsim St.
    Netanya 4250529
    Israel

    Nimrod Schweitzer
    nimrod.schweitzer@qcore.com
    +972-73-2388839
    Fax: +972-73-2388800

    Lee Aydelotte
    laydelotte@silexamerica.com
    801-676-8673
    Fax: 714-258-0730

    QCore OpenSSL FIPS Object Module 2.0.9

    2.0.9


    QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

      • NXP i.MX280 ARM w/ Linux 2.6.35
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5643
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4525
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3758
    2275Sony Imaging Products & Solutions Inc.
    1-7-1 Konan
    Minato-ku, Tokyo 108-0075
    JAPAN

    Toshiaki Ouchi
    sips-pssg-b2b-fipsinfo@sony.com
    +81 50 3140 9893

    Hirokazu Morishita
    sips-pssg-b2b-fipsinfo@sony.com
    +81 50 3140 1739

    Sony IMB DRBG Core-SH

    1.0.0 (Firmware)


    Sony IMB DRBG Core-SH is the firmware module for digital cinema system.

      • Renesas Electronics Corporation SH7724
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4522
    2274Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shassse3 Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4521
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3755
    2273Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shagen Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4520
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3754
    2272Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shaavx2 Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4519
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3753
    2271Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shaavx Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4518
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3752
    2270Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK aesni Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5635
    2269Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK aesgen Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5634
    2268Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK aesasm Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5631
    2267Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK aesni Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5630
    2266Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shassse3 Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4517
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3751
    2265Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shagen Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4516
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3750
    2264Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shaavx2 Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4515
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3749
    2263Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shaavx Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4514
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3748
    2262Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK aesni Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5627
    2261Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK aesgen Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5624
    2260Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK aesasm Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    8/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5621
    2259Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shagen Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/2/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4513
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3747
    2258Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shassse3 Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/2/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4512
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3746
    2257Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shaavx2 Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/2/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4511
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3745
    2256Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK shaavx Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/2/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4510
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3744
    2255Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK aesgen Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5617
    2254Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 UEK aesasm Implementation

    R6-1.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 6.9 64 bit
    8/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5614
    2253Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    66005f41fbc3529ffe8d007708756720529da20d


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • POWER9 with PAA w/ Ubuntu Linux 18.04
      • POWER9 without PAA w/ Ubuntu Linux 18.04
      • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
    8/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5612
    2252Feitian Technologies Co., Ltd.
    Floor 17, Tower B, Huizhi Mansion
    No.9 Xueqing Road
    Haidian, Beijing 100085
    China

    Mr. PENG Jie
    pengjie@ftsafe.com
    +8610 62304466ext419
    Fax: +8610 62304477

    Mr. JU Wensheng
    wensheng@ftsafe.com
    +8610 62304466ext527
    Fax: +8610 62304477

    Feitian-FIPS-COS Hardware Cryptographic Library

    1.0 (Firmware)


    The Feitian-FIPS-COS Hardware Cryptographic Library provides cryptographic algorithm support to the Feitian-FIPS-COS cryptographic module.

      • ST23YT66
    8/2/2018
    • Counter:
      • Modes: 3KeyTDEA
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: TDES #2824
    2251BlackBerry Certicom
    5th Floor, 4701 Tahoe Blvd, Building A
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder GSE-J Crypto Core

    2.9.2


    Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

      • ARMv8 w/ Android 8.1.2 on Venturi K502 Android tablet manufactured by Infomark
    8/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5609
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4506
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-512
      • Prerequisite: HMAC #3742
    2250BlackBerry Certicom
    5th Floor, 4701 Tahoe Blvd, Building A
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder GSE-J Crypto Core

    2.9.2


    Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

      • ARMv8 w/ Android 6.0.1 on BlackBerry Priv
    8/2/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5608
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4505
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-512
      • Prerequisite: HMAC #3741
    2249Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 QuickSec-MX104

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Freescale P5021
    8/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3739
    2248Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 OpenSSL-MX104

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Freescale P5021
    8/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3738
    2247Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.2R1 MX104-Kernel

    Junos OS 18.2R1 (Firmware)


    MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

      • Freescale P5021
    8/2/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3736
    2246Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4499
    2245Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4498
    2244Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    3218c1db82718a54e4d41de493d006eaa3ba445c


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • POWER9 with PAA w/ Ubuntu Linux 18.04
      • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
      • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
      • POWER9 without PAA w/ Ubuntu Linux 18.04
    7/27/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5598
    2243Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shassse3) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4495
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3732
    2242Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shagen) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4494
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3731
    2241Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shaavx2) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4493
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3730
    2240Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shaavx) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4492
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3729
    2239Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (aesni) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5594
    2238Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (aesgen) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5592
    2237Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (aesasm) - generic CPU

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5590
    2236Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4491
    2235Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5586
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4490
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3727
    2234Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit) - generic CPU

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4489
    2233Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5584
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4488
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3725
    2232Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5583
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4487
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3724
    2231Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5582
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4486
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3723
    2230Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5581
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4485
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3722
    2229Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5580
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4484
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3721
    2228Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5579
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4483
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3720
    2227Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5578
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4482
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3719
    2226Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5577
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4481
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3718
    2225Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    7/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5576
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4480
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3717
    2224Allegro Software Development Corporation
    1740 Massachusetts Avenue
    Boxborough, MA 01719
    USA

    Bob Van Andel
    bva@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Loren Shade
    loren@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Allegro Cryptographic Engine using the EYL QRNG

    6.31


    The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

      • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
      • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4478
    2223Allegro Software Development Corporation
    1740 Massachusetts Avenue
    Boxborough, MA 01719
    USA

    Bob Van Andel
    bva@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Loren Shade
    loren@allegrosoft.com
    978-264-6600
    Fax: 978-266-1375

    Allegro Cryptographic Engine

    6.31


    The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

      • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
      • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
    7/27/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4477
    2222Secure-IC
    15 Rue Claude Chappe
    Bât. B ZAC des Champs Blancs
    Cesson-Sévigné, N.A 35510
    France

    karine lorvellec
    karine.lorvellec@secure-ic.com
    +33 2 99 12 18 72

    florent lozach
    florent.lozach@secure-ic.com
    +33 2 99 12 18 72

    Secure-IC's hardware True Random Number Generator

    2.0


    Secure-IC's hardware True Random Number Generator produces a high quality stream of random data. It embeds a fully digital entropy source that provides seeds for an internal DRBG that strictly follows SP800-90A requirements. The whole system delivers random data to be used by various applications, including secure schemes.

      • N/A
    7/27/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5572
    2221Entrust Datacard Corporation
    Two Lincoln Centre
    5420 LBJ Freeway Suite 300
    Dallas, TX 75240
    USA

    John Gray
    John.Gray@entrustdatacard.com

    John Mahoney
    John.Mahoney@entrustdatacard.com

    Entrust Authority™ Security Toolkit for the Java® Platform DRBG 1.0

    1.0


    The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

      • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
    7/20/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4475
    2220HP Inc.
    11311 Chinden Blvd
    Boise, Idaho 83714-0021
    USA

    Gerardo Colunga
    gerardo.del.colunga@hp.com
    208-333-5607

    Chris Gunning
    chris.gunning@hp.com
    208-333-6785

    HP FutureSmart QuickSec

    5.1 (Firmware)


    HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

      • Arm Cortex-A8
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5567
    2219Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ Windows 10 rs3 32 bits
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5566
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3710
    2218Curtiss-Wright Controls, Inc.
    2600 Paramount Place, Suite 200
    Fairborn, OH 45324
    USA

    Paul Davis
    pdavis@curtisswright.com
    937-252-5601 x 1363
    Fax: 937-252-2729

    Rich Langley
    rlangley@curtisswright.com
    937-610-5455
    Fax: 937-252-1465

    Curtiss-Wright Controls SW libgcrypt

    5.0


    The libgcrypt software implementation provides cryptographic functionality supporting the CentOS operating system.

      • Intel Atom E3845 w/ CentOS 7.5
      • Intel Core i5-4402E w/ CentOS 7.5
    7/20/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3709
    2217HP Inc.
    11311 Chinden Blvd
    Boise, Idaho 83714-0021
    USA

    Gerardo Colunga
    gerardo.del.colunga@hp.com
    208-333-5607

    Chris Gunning
    chris.gunning@hp.com
    208-333-6785

    HP FutureSmart OpenSSL FIPS Object Module

    2.0.4 (Firmware)


    HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

      • Arm Cortex-A8
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5563
    2216Nutanix
    1740 Technology Drive, Suite 150
    San Jose, CA 95110
    USA

    Eric Hammersley
    fips@nutanix.com

    Ashutosh Pangasa
    fips@nutanix.com

    Nutanix Cryptographic Library for OpenSSL

    1.0


    The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

      • Intel E5-2620 w/PAA w/ CentOS 7.4
    7/20/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5562
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4465
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3708
    2215Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • AMD Ryzen5 w/ Windows 2016 64 bits
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5560
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3707
    2214Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ Windows 10 rs3 64 bits
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5559
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3706
    2213Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ Mac OS 10.13
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5558
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3705
    2212Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • Intel Core i5 w/ CentOS 7.4 64 bits
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5557
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3704
    2211Trend Micro Inc.
    8F, No. 198, Tun Hua S. Rd., Sec. 2
    Taipei, na 106
    Taiwan

    Phoenix Liau
    Phoenix_Liau@trend.com.tw
    +886-2-23789666

    Harvey Lee
    Harvey_Lee@trend.com.tw

    Trend Micro Cryptographic Module Core Library

    1.0


    Trend Micro Cryptographic Module Core Library provides FIPS 140-2 algorithm services for Trend Micro Endpoint Encryption.

      • AMD A10-7300 RADEON w/ CentOS 7.4 32 bits
    7/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5556
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3703
    2210Elster GmbH
    Strothweg 1
    Lotte (Buren) 49504
    Germany

    Michael Habermann
    michael.habermann@honeywell.com
    +49-541-1214-215
    Fax: +49-541-1214-595

    Markus Bölter
    markus.boelter@honeywell.com
    +49-541-1214-114
    Fax: +49-541-1214-595

    elster_cv

    02.02.01 (Firmware)


    elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

      • STM32L152RE
    7/20/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5555
    2209Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Bhanu Parlapalli
    bhanu.parlapalli@gigamon.com

    Gigamon Linux-Based Cryptographic Module

    1.0 (Firmware)


    The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

      • Intel Atom C Series
      • P2020
      • P2041
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5554
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4457
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3702
    2208International Business Machines
    1702 North Street
    Building 256-3
    Endicott, NY 13760
    USA

    Brian W. Hugenbruch
    bwhugen@us.ibm.com
    607-429-3660

    IBM z/VM System SSL

    V6.4


    z/VM System SSL provides cryptographic functions which allows z/VM to protect data using the SSL/TLS protocols. z/VM System SSL also enables administrators to create and manage X.509 V3 certificates and keys within key database files.

      • IBM z13 w/ IBM z/VM V6.4
    7/13/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4456
    2207SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    844-436-2797

    CryptoComply Server Engine

    2.1


    SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5552
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4455
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3700
    2206Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shassse3)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4454
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3699
    2205Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shagen)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4453
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3698
    2204Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shaavx2)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4452
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3697
    2203Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (shaavx)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4451
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3696
    2202Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (aesni)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5548
    2201Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (aesgen)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5546
    2200Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Linux Kernel crypto API (aesasm)

    6.0


    Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5545
    2199Sierra Nevada Corporation
    444 Salomon Circle
    Sparks, NV 89434
    USA

    Kevin Streander
    Kevin.Streander@sncorp.com
    303-566-9687
    Fax: 775-331-0370

    Red Hat OpenSSL (64bit)

    5.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

      • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5544
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4450
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3695
    2198Sierra Nevada Corporation
    444 Salomon Circle
    Sparks, NV 89434
    USA

    Kevin Streander
    Kevin.Streander@sncorp.com
    303-566-9687
    Fax: 775-331-0370

    Red Hat NSS Softoken (64bit)

    5.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

      • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
    7/13/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4449
    2197Geotab Inc.
    2440 Winston Park Drive
    Oakville, Ontario L6H 7V2
    Canada

    Alex Sukhov
    embeddedsecurity@geotab.com

    Geotab Cryptographic Module

    1.0 (Firmware)


    Geotab Cryptographic Module provides a library of functions to perform general purpose cryptographic services.

      • NXP S32K14X
      • Microchip DSPIC33E
    7/13/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3693
    2196Gigamon Inc.
    3300 Olcott Street
    Santa Clara, CA 95054
    USA

    Bhanu Parlapalli
    bhanu.parlapalli@gigamon.com

    Gigamon Linux-Based Cryptographic Module

    1.0


    The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

      • P2020 w/ CentOS 5.8
      • P2041 w/ CentOS 5.8
      • Intel Atom C Series w/ CentOS 6.6
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5541
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4447
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3692
    2195Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Allen Ting
    yting@juniper.net
    408-858-5008

    Mounir Hahad
    mhahad@juniper.net

    CryptoCore

    1.0


    Cryptographic module to support the cryptographic functionalities for Juniper products.

      • Intel Core i5 w/ Ubuntu Linux 14.04
      • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
      • Intel Xeon E5 family w/ Ubuntu Linux 14.04
    7/13/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5540
    2194BlackBerry Certicom
    5th Floor, 4701 Tahoe Blvd, Building A
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder GSE-J Crypto Core

    2.9.2


    Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

      • Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
      • Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
      • Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
      • Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
    7/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5539
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4445
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-512
      • Prerequisite: HMAC #3690
    2193Konica Minolta, Inc.
    2970, Ishikawa-machi
    Hachioji-shi, Tokyo 192-8505
    Japan

    R&D Administration Division, R&D Headquarters Business Techn

    Konica Minolta PP Crypto Library

    1.1 Rev.1 (Firmware)


    Konica Minolta PP Crypto Library is used in AccurioPress C2060/C2070, AccurioPrint C2060L and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generataion/verification, AES, hash function including SHA and HMAC_DRBG.

      • Intel(R) Core(TM) i5-4570S
      • Intel(R) Pentium G3420
    7/13/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3689
    2192Infosec Global Inc.
    2225 Sheppard Avenue East
    Suite 1402
    Toronto, Ontario M2J 5C2
    Canada

    Brian Neill
    brian.neill@infosecglobal.com
    416-492-3333
    Fax: 647-343-6933

    Ian Laidlaw
    ian.laidlaw@infosecglobal.com
    416-492-3333
    Fax: 647-343-6933

    AgileSec FIPS Provider 1.0

    1.0


    AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

      • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
      • Intel Core i5 CPU with AES-NI w/ OSX 10.12
      • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
      • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
      • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
      • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
      • Intel Core i5 CPU without AES-NI w/ OSX 10.12
      • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
      • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
      • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
      • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
    7/13/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3686
    2191Accellion, Inc.
    1804 Embarcadero Road
    Suite 200
    Palo Alto, Ca 94303
    USA

    Frank Balonis
    frank.balonis@accellion.com
    650-485-4300

    Sim Han Seah
    hanseah@accellion.com
    +65 6244 5678

    Accellion Cryptographic Module

    2.0.16


    The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Xeon E5 without PAA w/ CentOS 6
      • Intel Xeon E5 with PAA w/ CentOS 6
    7/6/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5533
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4440
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3685
    2190SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Inside Sales
    sales@safelogic.com
    844-436-2797

    CryptoComply for Java

    3.0.1


    SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

      • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
      • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
    7/6/2018
    • Counter:
      • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5532, TDES #2785
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4439
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3684
    2189Virtual Instruments
    2331 Zanker Road
    San Jose, CA 95131
    USA

    Susanta Pattanayak
    Susanta.pattanayak@virtualinstruments.com
    +1 408 579 4000

    Jay Nitikman
    Jay.nitikman@virtualinstruments.com
    +1 408 579 4000

    Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

    v5.7 (Firmware)


    The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

      • Intel Broadwell Xeon without AES-NI
    6/29/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5528
    2188Cisco Systems, Inc.
    170 W. Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Adaptive Security Appliance (ASA)

    9.6


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
    6/29/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4435
    2187Harris Corporation
    1680 University Avenue
    Rochester, NY 14610
    USA

    Chris Wood
    cwood06@harris.com
    585-720-8730
    Fax: 585-241-8459

    Esther Betancourt
    ebetanco@harris.com
    585-242-3635
    Fax: 585-241-8459

    Harris Broadband Ethernet Radio GPP Cryptographic Library

    6.0 (Firmware)


    This is a firmware library which executes on a general purpose processor to provide cryptographic functions for Harris' industry leading reliable, secure, and high performance Broadband Ethernet Radio (BER) products

      • Broadcom XLS108
    6/29/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-256
      • Prerequisite: SHS #4434
    2186Broadcom Limited
    1320 Ridder Park Drive
    San Jose, CA 95131
    USA

    Avinash Mahajan
    (408) 433-7461

    Secr_trng_800_90ab_vc1

    1.0 (Firmware)


    Low power hardware implementation of cryptographically secure random number generator. It contains a CTR based DRBG which conforms to SP800-90A and an entropy source with built-in entropy testing which conforms to SP800-90B.

      • Synopsys VCS 2017.03-SP2
    6/29/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #3913
    2185Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone Controller Java Crypto Library

    1.0


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on VMware ESXi 6.5.0
      • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ OpenJDK 1.8.0 on CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
    6/29/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4375
    2184Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Ingrid Barker
    ibarker@juniper.net

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    18.1R1 - OpenSSL

    18.1R1 (Firmware)


    The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

      • Intel Xeon E312xx Sandy Bridge
    6/29/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3677
    2183Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 17.4R1 - OpenSSL

    17.4R1 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7020)
    6/29/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3676
    2182Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Ingrid Barker
    ibarker@juniper.net

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    18.1R1 - Kernel

    18.1R1 (Firmware)


    The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

      • Intel Xeon E312xx Sandy Bridge
    6/29/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3674
    2181Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW Cryptographic Library Module (3305)

    6.4.1.20056.fips.8 (Firmware)


    Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Xeon E5
    6/29/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5513
    2180Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW Cryptographic Library Module (2101)

    6.4.1.20056.fips.8 (Firmware)


    Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Xeon D
    6/29/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5512
    2179Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW Cryptographic Library Module (1101)

    6.4.1.20056.fips.8 (Firmware)


    Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Pentium D
    6/29/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5511
    2178Virtual Instruments
    2331 Zanker Road
    San Jose, CA 95131
    USA

    Susanta Pattanayak
    Susanta.pattanayak@virtualinstruments.com
    +1 408 579 4000

    Jay Nitikman
    Jay.nitikman@virtualinstruments.com
    +1 408 579 4000

    Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

    v5.7 (Firmware)


    The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

      • Intel Broadwell Xeon with AES-NI
    6/22/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5508
    2177Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    OpenSSL - EX4300

    Junos OS 17.4 R1-S4 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

      • Freescale e500mc
    6/22/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3665
    2176Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Kernel - EX4300

    Junos OS 17.4 R1-S4 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

      • Freescale e500mc
    6/22/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3664
    2175Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shaavx Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    6/22/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4418
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3662
    2174Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shamb Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    6/22/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4417
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3661
    2173Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 18.1R1 RE1800 - OpenSSL

    Junos OS 18.1R1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon (Jasper Forest Family)
    6/22/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3657
    2172Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 18.1R1 RE1800 - Quicksec

    Junos OS 18.1R1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon (Jasper Forest Family)
    6/22/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3655
    2171Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 18.1R1 RE1800 - Kernel

    Junos OS 18.1R1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon (Jasper Forest Family)
    6/15/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3653
    2170Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 17.4R1-S1 RE1800-Quicksec

    Junos OS 17.4 R1-S1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon (Jasper Forest Family)
    6/15/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3652
    2169Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 17.4R1-S1 RE1800-OpenSSL

    Junos OS 17.4 R1-S1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon (Jasper Forest Family)
    6/15/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3650
    2168Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 17.4R1-S1 RE1800-Kernel

    Junos OS 17.4 R1-S1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon (Jasper Forest Family)
    6/15/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3648
    2167Silvus Technologies
    10990 Wilshire Blvd.
    STE 1500
    Los Angeles, CA 90024
    USA

    Ajit Warrier
    ajit@silvustechnologies.com
    310-479-3333 ext 41
    Fax: 310-479-2225

    Weijun Zhu
    weijun@silvustechnologies.com
    310-479-3333 ext 27
    Fax: 310-479-2225

    Silvus Crypto Module

    3.15.1 (Firmware)


    The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

      • Xilinx Zynq-7000
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5496
    2166Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shaavx2 Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    6/15/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4405
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3646
    2165Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI aesni Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    6/15/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5492
    2164Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI aesgen Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    6/15/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5490
    2163Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI aesasm Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    6/15/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5488
    2162CyberArk Software Ltd.
    9 Hapsagot St. Park Ofer 2
    P.O.B. 3143
    Petach-Tikva 4951040
    Israel

    Yariv Oren
    yariv.oren@gmail.com
    +972-3-918-0000x2258
    Fax: +972-3-924-0111

    Elad Moshe
    elad.moshe@cyberark.com
    +972-3-918-0000x2378
    Fax: +972-3-924-0111

    CyberArk Privileged Account Security Cryptographic Library for Windows

    1.0


    The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

      • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5487
    2161CyberArk Software Ltd.
    9 Hapsagot St. Park Ofer 2
    P.O.B. 3143
    Petach-Tikva 4951040
    Israel

    Yariv Oren
    yariv.oren@gmail.com
    +972-3-918-0000x2258
    Fax: +972-3-924-0111

    Elad Moshe
    elad.moshe@cyberark.com
    +972-3-918-0000x2378
    Fax: +972-3-924-0111

    CyberArk Privileged Account Security Cryptographic Library for Linux

    1.0


    The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

      • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5486
    2160Securosys SA
    Forrlibuckstrasse 70
    Zurich, Zurich 8005
    Switzerland

    Marcel Dasen
    dasen@securosys.ch
    +41 44 552 31 33

    Robert Rogenmoser
    roro@securosys.ch
    +41 44 552 31 11

    Primus HSM Cryptographic Library

    XC7K160T 2.5.3 (Firmware)


    Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

      • Marvell Armada XP PJ4Bv7
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5485
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-512
      • Prerequisite: HMAC #3643
    2159Trend Micro Inc.
    11305 Alterra Parkway
    Austin, TX 78758
    USA

    Paul Tucker
    paul_tucker@trendmicro.com
    512-633-7945

    Trend Micro, TippingPoint Crypto Core OpenSSL

    2.0.13


    The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

      • Intel Core i3 without AES-NI w/ Linux 4.4
      • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
      • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
      • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
      • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
      • Intel Xeon E5 with AES-NI w/ Linux 4.4
    6/15/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5484
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4401
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3640
    2158Arista Networks Inc.
    5453 Great America Pkwy
    Santa Clara, CA 95054
    USA

    Richard Whitney
    rw@arista.com
    703-627-6092
    Fax: 408-538-8920

    Ethan Rahn
    erahn@arista.com
    408-547-5825

    EOS MACsec Hybrid Firmware v1.0

    1.0 (Firmware)


    The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

      • Intel Xeon E3
      • AMD GX Series
      • Intel Pentium B9
      • Intel Xeon D-1500
      • AMD GE Series
    6/15/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5482
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4399
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3636
    2157Pure Storage, Inc.
    650 Castro Street
    Suite 400
    Mountain View, CA 94041
    USA

    John Fuchigami
    jfuchigami@purestorage.com
    800-379-7873

    Ram Lakshminarayanan
    rlakshminarayanan@purestorage.com
    800-379-7873

    Flash Array Crypto Library

    1.2.0


    Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • Intel Xeon x64 CPU with AES-NI (E5 Family) w/ Purity 5
      • Intel Xeon CPU with AES-NI (Scalable Processor Family: Silver and Gold) w/ Purity 5
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5480
    2156DELL, Inc.
    One Dell Way
    Round Rock, Texas 78682
    USA

    Alaric Silveira
    Alaric.Silveira@dell.com
    TBD

    Dell Crypto Library for Dell iDRAC and Dell CMC

    2.4


    The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

      • SH7758 w/ Linux 3.16.47
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5478
    2155DELL, Inc.
    One Dell Way
    Round Rock, Texas 78682
    USA

    TBD
    TBD
    TBD

    Dell Crypto Library for Dell iDRAC and Dell CMC

    2.4


    The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

      • 440EPX w/ Linux 4.9.31
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5477
    2154ViaSat, Inc.
    6155 El Camino Real
    Carlsbad, CA 92009
    USA

    David Suksumrit
    david.suksumrit@viasat.com
    760-476-2200
    Fax: 760-929-3941

    Lorenzo Page
    lorenzo.page@viasat.com
    760-893-4198

    EbemCrypto

    13 (Firmware)


    Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in Viasat's Enhanced Bandwidth Efficient Modem (EBEM).

      • IBM PowerPC 405GPr
    6/15/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5475
    2153Cisco Systems, Inc
    170 W Tasman Drive
    San Jose, California 95134
    USA

    CLint Winebrenner
    cwinebre@cisco.com
    919.392.6250

    IOS Common Cryptographic Module (IC2M)

    Rel5 (Firmware)


    The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

      • PPCe500
      • Intel Xeon w/ ESXI 6.0
    6/8/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5474
    2152Renesas Electronics America Inc.
    1001 Murphy Ranch Road
    Milpitas, CA 95035
    USA

    Mark Schaeffer
    mark.schaeffer@renesas.com
    408-588-5529

    Nick Mori
    Nick.mori@renesas.com
    408-588-6621

    Synergy HW DRBG for Synergy S5 and S7 series MCU devices

    Secure Crypto Engine 7


    The Secure Crypto Engine provides a variety of cryptographic services with hardware acceleration that is strictly managed within the security enclave.

      • N/A
    6/8/2018
    • Counter:
      • Modes: AES-128
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5384
    2151Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 6 NSS without AES-NI

    R6-1.0.0


    Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    6/8/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4391
    2150Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone Controller Java Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences-at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
      • Intel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
    6/8/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4351
    2149Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Samsung BoringSSL Cryptographic Module

    v1.2.1


    The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

      • Qualcomm SDM845 w/ Android 8.1
      • Samsung Electronics Exynos 9810 w/ Android 8.1
      • Qualcomm MSM8998 w/ Android 8.1
      • Qualcomm SDM450 w/ Android 8.1
    6/8/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5468
    2148Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.1R1 MTRE-QuickSec

    Junos OS 18.1R1 (Firmware)


    Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

      • Intel Xeon CPU E5
    6/8/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3625
    2147Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.1R1 MTRE-OpenSSL

    Junos OS 18.1R1 (Firmware)


    Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

      • Intel Xeon CPU E5
    6/8/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3624
    2146Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Geetha Naik, Certification Program Manager
    ngeetha@juniper.net
    +91-80-61214404

    JUNOS 18.1R1 MTRE-Kernel

    Junos OS 18.1R1 (Firmware)


    Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

      • Intel Xeon CPU E5
    6/8/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3623
    2145Futurex
    864 Old Boerne Road
    Bulverde, TX 78163
    USA

    Futurex Security Certifications
    certifications@futurex.com
    830-980-9782

    Futurex Cryptographic Engine

    6.2.0.1 (Firmware)


    The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

      • TI AM3352
    6/8/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5464
    2144SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    George Duo
    gduo@sonicwall.com
    (408) 962-7049

    SonicOS 6.5 for TZ, NSA and SuperMassive

    6.5.2 (Firmware)


    The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

      • Cavium Octeon II (CN62XX)
      • Cavium Octeon II (CN66XX)
      • Cavium Octeon II (CN68XX)
      • Cavium Octeon III (CN70XX)
      • Cavium Octeon III (CN71XX)
    6/8/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4383
    2143Hitachi, Ltd.
    322-2 Nakazato
    Odawara-shi, Kanagawa-ken 250-0872
    Japan

    Hitachi, Ltd. Block Storage System Development Dept.

    Hitachi Flash Module Drive HDE Encryption Engine

    1CK658 and PM8607B1-F3EI J0J0 (Firmware)


    Hitachi Flash Module Drive HDE Encryption Engine provides the cryptographic functionality found in Hitachi Flash Module Drive HDE.

      • 1CK658 and PM8607B1-F3EI
    6/1/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4382
    2142Juniper Networks, Inc
    1133 Innovation Way
    Sunnyvale, California 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 18.1R1 QFX10K-OpenSSL

    Junos OS 18.1R1 (Firmware)


    The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

      • Intel Xeon E3
    6/1/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3617
    2141Juniper Networks, Inc
    1133 Innovation Way
    Sunnyvale, California 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos OS 18.1R1 QFX10K-Kernel

    Junos OS 18.1R1 (Firmware)


    The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

      • Intel Xeon E3
    6/1/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3615
    2140REDCOM Laboratories, Inc
    One REDCOM Center
    Victor, NY 14564-0995
    United States

    Sal Ceravolo
    Sal.ceravolo@redcom.com
    585-905-0451

    Chris Hasenauer
    Chris.hasenauer@redcom.com
    585-905-0451

    REDCOM Encryption 140-2

    3.0.1


    REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

      • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
      • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
    6/1/2018
    • Counter:
      • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5457, TDES #2744
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4377
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3614
    2139Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2001

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2001

    Junos OS 18.1R1 QuickSec

    Junos OS 18.1R1 (Firmware)


    The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

      • Intel(R) Xeon(R) CPU E5
    5/25/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3613
    2138Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2001

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2001

    Junos OS 18.1R1 OpenSSL

    Junos OS 18.1R1 (Firmware)


    The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

      • Intel(R) Xeon(R) CPU E5
    5/25/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3612
    2137KeyNexus, Inc.
    205-2657 Wilfert Road
    Victoria, BC V9B6A7
    Canada

    Jason Novecosky
    jason@keynexus.net

    KeyNexus Cryptographic Library

    1.0


    The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

      • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
    5/25/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5453
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4373
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3611
    2136Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2001

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2001

    Junos OS 18.1R1 Kernel

    Junos OS 18.1R1 (Firmware)


    The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

      • Intel(R) Xeon(R) CPU E5
    5/25/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3609
    2135Hypersecu Information System Inc
    #206-6191 Westminster Hwy
    Richmond, BC V7C 4V4
    Canada

    James Li
    james@hypersecu.com
    (604) 279-2000
    Fax: (604) 272-1233

    HYP ALG Library

    V1.0 (Firmware)


    The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

      • HSC32K1
    5/25/2018
    • Counter:
      • Modes: 3KeyTDEA
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: TDES #2740
    2134Taisys Technologies Co. Ltd.
    7F., No.56, Lane 321
    Yangguang St., Neihu Dist.
    Taipei, Taipei 11491
    Taiwan (R.O.C.)

    Joe Wang
    joe.wang@taisys.com
    +886-2-26270927x6699
    Fax: +886-2-26270619

    Kent Horng
    kent.horng@taisys.com
    +886-2-26562185 #206
    Fax: +886-2-26579657

    TAISYS JUISE-S2-NESLIB

    32 53 (Firmware)


    The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

      • SC300
    5/25/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4369
    2133DocuSign, Inc.
    221 Main St.
    Suite 1000
    San Francisco, CA 94105
    USA

    Ezer Farhi
    Ezer.Farhi@docusign.com
    972-3-9279529

    DocuSign-SA-Main

    8.51.9.0 (Firmware)


    DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

      • Intel® Xeon Quad-Core
    5/25/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3606
    2132wolfSSL Inc.
    10016 Edmonds Way
    Suite C-300
    Edmonds, WA 98020
    USA

    Todd Ouska
    todd@wolfssl.com
    503-679-1859

    Kaleb Himes
    kaleb@wolfssl.com

    wolfCrypt

    3.14.2


    wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • Intel® Xeon® E5-2650 without AES-NI w/ SUSE Linux Enterprise Server 12 SP3 64-bit on Microsoft Hyper-V 2016 Core Linux Kernel 4.4
      • Intel® Xeon® E5-2403 without AES-NI w/ SUSE Linux Enterprise Server 12 SP3 64-bit on VMWare ESXi 6.5.0 Linux Kernel 4.4
    5/25/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4366
    2121Cisco Systems, Inc.
    170 W Tasman Dr
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    tbd

    CiscoSSL FIPS Object Module

    6.0


    The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

      • Apple A10 w/ iOS 11.x
    5/25/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5434
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4357
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3608
    2131wolfSSL Inc.
    10016 Edmonds Way
    Suite C-300
    Edmonds, WA 98020
    USA

    Todd Ouska
    todd@wolfssl.com
    503-679-1859

    Larry Stefonic
    larry@wolfssl.com
    206-369-4800

    wolfCrypt

    4.0


    wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
      • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
      • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
      • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4365
    2130IBM
    2455 South Rd
    Poughkeepsie, NY 12601
    USA

    Thomas Morris Jr
    tmorrisj@us.ibm.com
    845-435-5538

    William Santiago
    wsf1@us.ibm.com
    845-435-9265

    Miniboot 6.63 with 00CW683

    Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


    Miniboot Implemented Algorithms with hardware acceleration

      • IBM PowerPC 405
    5/18/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #4815
    2129Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Petra Manche
    +44 1189 245470

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle OpenSSL FIPS Object Module

    OpenSSL_2.0.13_OracleFIPS_1.0


    Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

      • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
      • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
      • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
      • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
      • SPARC S7 with PAA w/ Oracle Solaris 11.4
      • SPARC S7 without PAA w/ Oracle Solaris 11.4
      • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
      • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
      • Intel Xeon E5 with PAA w/ Solaris 11.4
      • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
      • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
    5/18/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5445
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4364
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3603
    2128Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shamb Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4363
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3602
    2127Unbound Tech
    25 Efal Street
    Petah Tikva
    Israel

    Unbound Tech
    contact@unboundtech.com
    631-316-8114

    OpenSSL

    FIPS 2.0.16


    This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

      • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
      • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    5/18/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5443
    2126Unbound Tech
    25 Efal Street
    Petah Tikva
    Israel

    Unbound Tech
    contact@unboundtech.com
    631-316-8114

    UnBound EKM DRBG

    2.0.1801.22535


    This component is used for secure random bit generation, as an alternative to the OpenSSL DRBG.

      • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      • Intel Xeon E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
      • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
      • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
      • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    5/18/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5443
    2125Splunk, Inc.
    270 Brannan Street
    San Francisco, CA 94107
    USA

    Robert Truesdell
    rtruesdell@splunk.com
    412.913.8242

    Splunk Phantom Cryptographic Library

    1.0


    The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

      • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
      • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
    5/18/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5442
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4361
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3599
    2124Texas Instruments, Inc.
    12500 TI Blvd.
    Dallas, Texas 75243
    USA

    Alon Srednizki
    alons@ti.com
    +972-9-7906059
    Fax: +972-9-7906098

    Barak Cherches
    barakch@ti.com
    +972-9-7906238
    Fax: +972-9-7906098

    TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

    CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


    The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

      • n/a
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4360
    2123Texas Instruments, Inc.
    12500 TI Blvd.
    Dallas, Texas 75243
    USA

    Alon Srednizki
    alons@ti.com
    +972-9-7906059
    Fax: +972-9-7906098

    Barak Cherches
    barakch@ti.com
    +972-9-7906238
    Fax: +972-9-7906098

    TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

    CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


    The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

      • n/a
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4359
    2122Texas Instruments, Inc.
    12500 TI Blvd.
    Dallas, Texas 75243
    USA

    Alon Srednizki
    alons@ti.com
    +972-9-7906059
    Fax: +972-9-7906098

    Barak Cherches
    barakch@ti.com
    +972-9-7906238
    Fax: +972-9-7906098

    TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

    CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


    The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

      • n/a
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4358
    2120Texas Instruments, Inc.
    12500 TI Blvd.
    Dallas, Texas 75243
    USA

    Alon Srednizki
    alons@ti.com
    +972-9-7906059
    Fax: +972-9-7906098

    Barak Cherches
    barakch@ti.com
    +972-9-7906238
    Fax: +972-9-7906098

    TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

    CC3235S 4.0.0.5 Chip ID 0x311001 (Firmware)


    The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

      • na
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4355
    2119Texas Instruments, Inc.
    12500 TI Blvd.
    Dallas, Texas 75243
    USA

    Alon Srednizki
    alons@ti.com
    +972-9-7906059
    Fax: +972-9-7906098

    Barak Cherches
    barakch@ti.com
    +972-9-7906238
    Fax: +972-9-7906098

    TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

    CC3235SF 4.0.0.5 Chip ID 0x311001 (Firmware)


    The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

      • na
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4356
    2118Texas Instruments, Inc.
    12500 TI Blvd.
    Dallas, Texas 75243
    USA

    Alon Srednizki
    alons@ti.com
    +972-9-7906059
    Fax: +972-9-7906098

    Barak Cherches
    barakch@ti.com
    +972-9-7906238
    Fax: +972-9-7906098

    TI SimpleLink WiFi MCU HW Crypto Engines Module Firmware Component

    CC3135R 4.0.0.5 Chip ID 0x311001 (Firmware)


    The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

      • na
    5/18/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4354
    2117Cohesity, Inc.
    300 Park Ave
    Suite 800
    San Jose, CA 95110
    USA

    Vivek Agarwal
    vivek@cohesity.com
    +1 (415) 690-7805

    Cohesity OpenSSL FIPS Object Module

    1.0.2


    The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

      • Intel Xeon with AES-NI w/ CentOS 7
      • Intel Xeon without AES-NI w/ CentOS 7
    5/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5426
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4353
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3591
    2116Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shaavx Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/10/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4352
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3590
    2115Fortanix, Inc.
    444 Castro Street, #702
    Mountain View, CA 94041
    USA

    Ambuj Kumar
    +1 (628)-400-2043

    SDKMS Crypto Library

    1.0.0 (Firmware)


    Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

      • Intel® Xeon E3-1230v5 4-Core, 3.40GHz
    5/10/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5282
    2114Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Kevin Meagher
    kmeagher@ciena.com
    1-410-865-8936

    OpenSSL FIPS Object Module

    2.0.12


    Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

      • Intel Xeon D-1500 w/ SAOS 8.6.1
      • AARCH64(arm) w/ SAOS 6.17
      • Cavium 52xx w/ SAOS 6.17
      • ARMv7 w/ SAOS 6.17
    5/10/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5419
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3589
    2113NIKSUN, Inc.
    457 N. Harrison St.
    3rd Floor
    Princeton, NJ 08540
    USA

    Darryle Merlette
    merlette@niksun.com

    NIKOS FIPS Object Module

    2.0.16


    The NIKOS FIPS Object Module is a software library that provides cryptographic services to a vast array of NIKSUN's networking products.

      • Intel Xeon E5-2680 v2 w/ FreeBSD 11.1
    5/10/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5418
    2112LG Electronics, Inc.
    20 Yoido-dong
    Youngdungpo-gu
    Seoul 152-721
    Republic of Korea

    Donghoon Shin
    hoon.shin@lge.com
    82-10-2280-4056

    LG BoringSSL

    3.0


    General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

      • Snapdragon 845 (SDM845) w/ Android 8.0
      • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
      • Snapdragon 835 (MSM8998) w/ Android 8.0
    5/10/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5417
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4348
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3587
    2111Unisys Corporation
    3199 Pilot Knob Road
    Eagan, MN 55121
    USA

    James Heit
    james.heit@unisys.com
    651-635-7739

    Brian Wegleitner
    brian.wegleitner@unisys.com
    651-635-7548

    OS 2200 Cryptographic Library

    2.0


    General purpose cryptographic software library.

      • Unisys 2200 w/ OS 2200 Operating System
    5/4/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-512
      • Prerequisite: SHS #4347
    2110Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shassse3 Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/4/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4346
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-512
      • Prerequisite: HMAC #3586
    2109INFINIDAT
    500 Totten Pond Road
    Waltham, MA 02451
    USA

    David Hebert
    davidh@infinidat.com
    +1 860-214-5666

    Steve Sullivan
    steves@infinidat.com
    +1 781-264-1544

    INFINIDAT Cryptographic Module (libcrypto)

    1.0.2k


    The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

      • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
    5/4/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5414
    2108Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux OpenSSL VPAES and SHA1 SSSE3

    R6-1.0.0


    Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    5/4/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5351
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4302
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: HMAC #3548
    2107Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shagen Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4342
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3583
    2106Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI shaavx2 Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4341
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3582
    2105Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI aesni Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5409
    2104Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI aesgen Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5408
    2103Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 KCAPI aesasm Implementation

    R7-2.0.0


    Oracle Linux Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5407
    2102Fortinet Inc.
    1090 Kifer Road
    Sunnyvale, CA 94086-5301
    USA

    Alan Kaye
    akaye@fortinet.com
    613-225-9381 x7416
    Fax: 613-225-9951

    Fortinet FortiGate-VM RBG Cryptographic Library v5.4

    5.4


    This document focuses on the software implementation of the Fortinet FortiGate-VM RBG Cryptographic Library v5.4 running on Intel x86 compatible processors.

      • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
    5/3/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
    2101Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK aesni Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5402
    2100Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK aesgen Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5401
    2099Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK aesasm Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5400
    2098Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shassse3 Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4337
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3578
    2097Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shagen Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4336
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3577
    2096Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    QTI Random Number Generator (version 2.3.1)

    Snapdragon 636


    Snapdragon 636 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

      • N/A
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4334
    2095Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    QTI Random Number Generator (version 2.3.1)

    Snapdragon 660


    Snapdragon 660 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

      • N/A
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4333
    2094D'Crypt Pte Ltd
    28 Sin Ming Lane
    #06-133 Midview City
    Singapore, Singapore 573953
    Singapore

    Sales & Marketing
    marketing@d-crypt.com
    (65) 6933-1800
    Fax: (65) 6684-5142

    Quek Gim Chye
    fips@d-crypt.com
    (65) 6933-1823
    Fax: (65) 6684-5142

    D'Crypt Cryptographic Library

    3.8 (Firmware)


    The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

      • Intel x86 64 bit
      • ARM Cortex-A
    5/3/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5399
    2093Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shaavx2 Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel. l.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4331
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3575
    2092Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 UEK shaavx Implementation

    R7-2.0.0


    Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module provides general-purpose cryptographic services to the remainder of the Linux kernel.

      • Intel® Xeon® Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4330
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3574
    2091Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux OpenSSL with AES and SHA1 assembler

    R7-2.0.0


    Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    5/3/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5396
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4329
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: HMAC #3573
    2090Nationz Technologies Inc.
    5F, Building A, IER of Huazhong University of Science and Technology
    #9 Yuexing Ave. 3, Nanshan District
    Shenzhen, Guangdong 518057
    P.R.China

    Max Jiang
    jiang.zhaolai@nationz.com.cn
    +86 185 7675 1645

    Nationz Secure IC

    v1.1 (Firmware)


    The Z32HUB II secure chip is based on the 32bit CPU. Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc.

      • Z32HUB II secure IC, V1.0
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4327
    2089Nationz Technologies Inc.
    5F, Building A, IER of Huazhong University of Science and Technology
    #9 Yuexing Ave. 3, Nanshan District
    Shenzhen, Guangdong 518057
    P.R.China

    Max Jiang
    jiang.zhaolai@nationz.com.cn
    +86 185 7675 1645

    Nationz Z32H330TC TPM 2.0 Cryptographic Engine TCE01

    v1.1 (Firmware)


    Nationz Z32H330TC TPM 2.0 (Trusted Platform Module), Security processor with embedded firmware compliant with TPM Family 2.0 level 00, revision 1.16 Errata Version 1.5.

      • Z32H330TC secure IC, V1.0
    5/3/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4326
    2088Nuvoton Technology Corporation
    No. 4, Creation Rd. III
    Hsinchu Science Park 300
    Taiwan, R.O.C.

    Yossi Talmi
    yossi.talmi@nuvoton.com
    +972-9-9702364
    Fax: +972-9-9702001

    Oren Tanami
    oren.tanami@nuvoton.com
    +972-9-9702390
    Fax: +972-9-9702001

    Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

    LAG019


    Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

      • N/A
    5/3/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5390
    2087Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Vann (Vanna) Nguyen, Certification Program Manager
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos 18.1R1 - OpenSSL

    18.1R1 (Firmware)


    The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

      • Intel Xeon E31xx (Sandy Bridge)
      • Freescale e500 dual core (PB0BJSSE1PNB)
    5/3/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3571
    2086Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton, Strategic Delivery Director
    bshelton@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Vann (Vanna) Nguyen, Certification Program Manager
    vann@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Junos 18.1R1 - Kernel

    18.1R1 (Firmware)


    The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

      • Intel Xeon E31xx (Sandy Bridge)
      • Freescale e500 dual core (PB0BJSSE1PNB)
    4/27/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3569
    2085Certicom Corp.
    4701 Tahoe Blvd, Building A
    5th Floor
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder® FIPS Core

    6.3.0


    Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

      • Intel Atom C3558 without AES-NI w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
      • Intel Atom C3558 with AES-NI w/ QNX SDP 7
      • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
      • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
      • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
      • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
    4/27/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5387
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4321
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3568
    2084Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 17.4R1 - OpenSSL

    17.4R1 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon II (CN6335)
      • Cavium Octeon III (CN7130)
      • Intel Xeon C5518
    4/27/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3567
    2083Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mike Jamison
    (678) 473-2907
    Fax: (678) 473-8470

    Cloudpath Cryptographic Library for Java

    1.0


    Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

      • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
      • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
    4/27/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5382
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4318
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3565
    2082VMware AirWatch
    1155 Perimeter Center West
    Suite 100
    Atlanta, GA 30338
    USA

    Gary Sturdivant
    sturdivant@vmware.com
    1-650-427-1911
    Fax: 1-650-427-5001

    OpenSSL

    2.0.16


    "Airwatch OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms. The algorithms are implemented by OpenSSL which is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/"

      • Qualcomm MSM8998 w/ Android 7.1
    4/20/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5377
    2081Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (64 bit)

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    4/13/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4314
    2080BiObex, LLC
    11501 Sunset Hills Rd
    Suite 200
    Reston, VA 22190
    USA

    Arthur Joyce
    ajoyce@biobex.com
    571-313-0969

    SAFE-Key device

    1.2.0.0 (Firmware)


    The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

      • STM32F415
    4/13/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4313
    2079Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

    R7-2.0.0


    Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    4/13/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5370
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4312
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3558
    2078IBM Corporation
    1787 Sentry Pkwy West
    Building 18, Suite 200
    Blue Bell, PA 19422
    USA

    Sandeep Singhal
    Sandeep.Singhal1@ibm.com
    215-664-1614

    OpenSSL [1] with the OpenSSL FIPS Object Module [2]

    1.0.2o [1]; 2.0.13 [2]


    The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

      • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
    4/13/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5369
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4311
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384
      • Prerequisite: HMAC #3557
    2077ClevX, LLC
    9306 NE 125th Street
    Kirkland, WA 98034
    USA

    Lev Bolotin
    Lev.Bolotin@clevx.com
    +1.425.820.9929

    Marc Singer
    Marc.Singer@clevx.com
    425.820.9929

    ClevX Datalock Cryptographic Library

    ClevX-Datalock-v2.0 (Firmware)


    ClevX Datalock Cryptographic Firmware Library

      • STM32L071C
    4/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5366
    2076VMware, Inc.
    3401 Hillview Ave
    Palo Alto, CA 94303
    USA

    Manoj Maskara
    mmaskara@vmware.com
    650-427-1000
    Fax: 650-475-5001

    VMware BC-FJA (Bouncy Castle FIPS Java API)

    1.0.0


    The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

      • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
      • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
    4/9/2018
    • Counter:
      • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5365, TDES #2709
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4307
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3553
    2075wolfSSL Inc.
    10016 Edmonds Way
    Suite C-300
    Edmonds, WA 98020
    USA

    Todd Ouska
    todd@wolfssl.com
    503-679-1859

    Larry Stefonic
    larry@wolfssl.com
    206-369-4800

    wolfCrypt

    3.14.2


    The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

      • Intel x86 w/ NetBSD v6.0.1
    4/9/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4306
    2074Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd.
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    ancrypto.dylib

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • ARMv7 w/ iOS 10.3.3
    4/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5363
    2073Fortanix, Inc.
    444 Castro Street, #702
    Mountain View, CA 94041
    USA

    Ambuj Kumar
    info@fortanix.com
    +1 (628) 400-2043

    Fortanix Crypto Algorithm Library

    2.6.0


    Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

      • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
    4/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5328
    2072Fortanix, Inc.
    444 Castro Street, #702
    Mountain View, CA 94041
    USA

    Ambuj Kumar
    info@fortanix.com
    +1 (628) 400-2043

    Fortanix Crypto Algorithm Library

    2.6.0


    Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

      • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
    4/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5329
    2071Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux OpenSSL with AES and SHA1 assembler

    R6-1.0.0


    Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5353
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4304
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: HMAC #3550
    2070Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

    R6-1.0.0


    Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5352
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4303
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3549
    2069Bivio Networks, Inc.
    4457 Willow Road, Suite 240
    Pleasanton, CA 94588
    USA

    Raj Srinivasan
    raj@bivio.net
    (925) 924-8608
    Fax: (925) 924-8650

    OpenSSL

    1.0.2k-8


    OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

      • Intel Xeon Skylake w/ RHEL 7.4
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5349
    2068Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    Red Hat NSS Softoken (32 bit)

    6.0


    User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

      • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
    3/30/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4300
    2067Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 17.4R1 - Kernel

    17.4R1 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
      • Cavium Octeon II (CN6335)
      • Intel Xeon C5518
      • Cavium Octeon III (CN7020)
    3/30/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3545
    2066SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    George Duo
    gduo@sonicwall.com
    (408) 962-7049

    SonicOS 6.5.1 for TZ, NSA and SuperMassive

    6.5.1 (Firmware)


    The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

      • Cavium Octeon II (CN68XX)
      • Cavium Octeon II (CN66XX)
      • Cavium Octeon III (CN70XX)
      • Cavium Octeon II (CN62XX)
      • Cavium Octeon III (CN71XX)
    3/30/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4297
    2065Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    Aruba Common Cryptographic Module (CCM)

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Windows 10 64-bit User Mode
      • Intel Core i5 w/ Windows 10 32-bit User Mode
      • ARMv7 w/ Android 7.1
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5345
    2064Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux OpenSSL VPAES and SHA1 SSSE3

    R7-2.0.0


    Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

      • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5344
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: SHS #4295
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1
      • Prerequisite: HMAC #3541
    2063BlackBerry Certicom
    5th Floor, 4701 Tahoe Blvd, Building A
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder GSE-J Crypto Core

    2.9.1


    Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

      • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5343
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4294
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-512
      • Prerequisite: HMAC #3540
    2062BlackBerry Certicom
    5th Floor, 4701 Tahoe Blvd, Building A
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder GSE-J Crypto Core

    2.9.1


    Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

      • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
    3/30/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5342
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4293
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-512
      • Prerequisite: HMAC #3539
    2061Certes Networks, Inc.
    300 Corporate Center Drive
    Suite 140
    Pittsburgh, PA 15108
    USA

    Sean Everson
    sean.everson@certesnetworks.com
    1.412.357.1130
    Fax: 1.412.262.2574

    Gary Brunner
    gary.brunner@certesnetworks.com
    1.412.200.2177
    Fax: 1.412.262.2574

    Certes Enforcement Point Cryptographic Library

    1.0.2l (Firmware)


    The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

      • Intel Xeon Processor E3 v5 Family
      • Intel Atom Processor C Series
      • Intel Xeon Processor E5 v4 Family
    3/30/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5338
    2060Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 17.4R1 - Authentec

    17.4R1 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7020)
      • Broadcom XLP832
      • Cavium Octeon III (CN7130)
      • Cavium Octeon II (CN6335)
    3/30/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3534
    2059Cisco Systems, Inc
    170 W Tasman Drive
    San Jose, California 95134
    USA

    CLint Winebrenner
    cwinebre@cisco.com
    919.392.6250

    IOS Common Cryptographic Module (IC2M)

    Rel5 (Firmware)


    The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

      • Intel Atom
    3/23/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5333
    2058Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    OpenSSL - EX4300

    Junos OS 17.4 R1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

      • Freescale e500mc
    3/23/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3528
    2057BeyondTrust
    5090 N. 40th Street
    Suite 400
    Phoenix, AZ 85018
    USA

    David Allen
    dallen@beyondtrust.com
    1-800-234-9072, 9292

    BeyondTrust Cryptographic Library

    2.0.10


    BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

      • Intel Xeon w/ Windows Server 2012 R2 Standard
    3/23/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5327
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4279
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3525
    2056Realia Technologies, S.L
    Infanta Mercedes 90, 4th floor
    Madrid, Madrid 28020
    Spain

    Jesus Rodriguez
    jrodriguez@realsec.com
    +34 91 449 03 30
    Fax: +34 91 579 56 06

    Luis Jesus Hernandez
    ljhernandez@realsec.com
    +34 91 449 03 30
    Fax: +34 91 579 56 06

    Cryptosec Dekaton

    1.1


    The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

      • N/A
    3/23/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5326
    2055wolfSSL Inc
    10016 Edmonds Way
    Suite C-300
    Edmonds, WA 98020
    USA

    Todd Ouska
    todd@wolfssl.com
    503-679-1859

    Kaleb Himes
    kaleb@wolfssl.com

    wolfCrypt

    3.12.6


    wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

      • NS9210 w/ NET+OS v7.6
    3/23/2018
    • Hash based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4277
    2054Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    JUNOS 17.3R2 - Kernel

    17.3R2 (Firmware)


    The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

      • Intel Xeon D
    3/23/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3522
    2053Digi International, Inc.
    11001 Bren Road East
    Minnetonka, MN 55343
    USA

    Donald Schleede
    Donald.Scleede@digi.com
    952-912-3444

    Digi ConnectCore Security Module

    1.0


    The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

      • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
      • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
    3/16/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5323
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4275
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3521
    2052Digital Guardian, Inc.
    860 Winter Street
    Suite 3
    Waltham, MA 02541
    USA

    Craig Hansen
    201-572-3784

    FIPS Kernel Mode Cryptographic Module (VSEC.SYS)

    1.1


    Previously called: Digital Guardian Security Kernel v1.1. VSEC.SYS is a Windows kernel mode export driver that provides FIPS Approved cryptographic services to Verdasys applications such as Digital Guardian.

      • Intel i7 Dual Core w/ Microsoft Windows 10 (64-bit)
    3/16/2018
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: SHS #4274
    2051Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    Kernel - EX4300

    Junos OS 17.4 R1 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

      • Freescale e500mc
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3518
    2050Fortinet Inc.
    1090 Kifer Road
    Sunnyvale, CA 94086-5301
    USA

    Alan Kaye
    akaye@fortinet.com
    613-225-9381 x7416
    Fax: 613-225-9951

    Fortinet FortiMail RNG Cryptographic Library 6.0

    6.0 (Firmware)


    This focuses on the firmware implementation of the Fortinet FortiMail RNG Cryptographic Library v6.0 running on Intel x86 compatible processors.

      • Intel Xeon
    3/16/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5321
    2049Mojo Networks, Inc.
    339 N Bernardo Avenue, Suite 200
    Mountain View, CA 94043
    USA

    Hemant Chaskar
    hemant.chaskar@mojonetworks.com
    (650) 961-1111
    Fax: (650) 961-1169

    Crypto Core

    2.0.16-3-00 (Firmware)


    Cryptographic library offering various cryptographic mechanisms in server.

      • Intel Xeon
    3/16/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5318
    2048Cisco Systems, Inc
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL FIPS Object Module

    7.0


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

      • ARMv8 w/ Android 7.1
      • Intel Core i5 w/ Windows 10 (with AES-NI)
      • Intel Core i7 w/ macOS 10.12 (with AES-NI)
      • Intel Core i5 w/ Windows 10
      • Intel Pentium w/ Linux 3.4
      • ARMv8 w/ iOS 11.2
      • Intel Core i7 w/ macOS 10.12 (without AES-NI)
      • Cavium Octeon II 68XX w/ Wind River Linux 4
      • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
      • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
    3/16/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5310
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4267
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3513
    2047Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - Quicksec

    Junos OS 17.4R1-S1 (Firmware)


    The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

      • Intel Xeon E5
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3512
    2046Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - Quicksec

    Junos OS 17.4R1-S1 (Firmware)


    The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

      • Intel Xeon E3
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3511
    2045Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - Quicksec

    Junos OS 17.4R1-S1


    The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

      • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3510
    2044Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - OpenSSL

    Junos OS 17.4R1-S1


    The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

      • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3509
    2043Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - OpenSSL

    Junos OS 17.4R1-S1 (Firmware)


    The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

      • Intel Xeon E5
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3508
    2042Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - OpenSSL

    Junos OS 17.4R1-S1 (Firmware)


    The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

      • Intel Xeon E3
    3/16/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3507
    2041Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - Kernel

    Junos OS 17.4R1-S1 (Firmware)


    The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

      • Intel Xeon E5
    3/9/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3503
    2040Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - Kernel

    Junos OS 17.4R1-S1


    The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

      • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
    3/9/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3502
    2039Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Pradeepa M R
    pradeepam@juniper.net

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Junos OS 17.4R1-S1 - Kernel

    Junos OS 17.4R1-S1 (Firmware)


    The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

      • Intel Xeon E3
    3/9/2018
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3501
    2038Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Patrick Scully
    613-670-3207

    Ciena Waveserver

    1.5.1 (Firmware)


    The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

      • Xilinx XC7Z030
    3/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5302
    2037Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

    10.0.15063.728


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
    3/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5300
    2036Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); SymCrypt Cryptographic Implementations

    10.0.14393.1770


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
      • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
      • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
      • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
      • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
      • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
      • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
      • AMD A4 with AES-NI w/ Windows Server 2016 Standard Edition (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
      • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
      • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
      • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
      • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    3/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5295
    2035Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Enterprise LTSB (version 1507); SymCrypt Cryptographic Implementations

    10.0.10240.17643


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
      • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
      • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
      • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
    3/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5291
    2034Google, Inc.
    1600 Amphitheatre Parkway
    Mountain View, CA 94043
    USA

    Adam Langley
    security@chromium.org

    BoringCrypto

    ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


    A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

      • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
    3/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5288
    2033Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); SymCrypt Cryptographic Implementations

    10.0.10586.1176


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, AES DRBG, HMAC, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
      • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
      • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
      • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
      • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
      • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
      • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/Windows 10 Mobile November Update (ARMv7)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
      • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
      • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
      • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
    3/9/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5287
    2032Docker, Inc.
    144 Townsend Street
    San Francisco, California 94107
    USA

    Rahim Ibrahim
    security-team@docker.com
    415-941-0376

    Docker Enterprise Edition Crypto Library v 1.0

    1.0


    The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

      • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
    3/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5286
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4245
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3493
    2031Docker, Inc.
    144 Townsend Street
    San Francisco, California 94107
    USA

    Rahim Ibrahim
    security-team@docker.com
    415-941-0376

    Docker Enterprise Edition Crypto Library v 1.0

    1.0


    The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

      • Dual Intel E5-2670v3 w/ CentOS v7.3
    3/9/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5285
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4244
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3492
    2030DocuSign, Inc.
    221 Main St.
    Suite 1000
    San Francisco, CA 94105
    USA

    Ezer Farhi
    Ezer.Farhi@docusign.com
    +972-39279529
    Fax: +972-39230864

    Moshe Harel
    Moshe.Harel@docusign.com
    +972-39279578
    Fax: +972-39230864

    PrivateServer

    5.0.3 (Firmware)


    PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

      • Intel® E3-1268LV3 Quad-Core
    3/9/2018
    • HMAC based:
      • Prediction Resistance Modes: Not Enabled
      • Modes: SHA-256
      • Prerequisite: HMAC #3490
    2029Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Hardware DRBG (Apple T2 - iBridge2,1)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple Apple T2 (iBridge2,1) SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5279
    2028Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple S3)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple S3 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5278
    2027Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A10X)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG for tvOS 4.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5277
    2026Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple S1P)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple S1P SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5276
    2025Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A9)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A9 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5275
    2024Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A10X)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5274
    2023Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A10)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A10 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5273
    2022Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A9X)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A9X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5272
    2021Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A8X)

    1.2


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A8X SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5271
    2020Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A8)

    1.2


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A8 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    3/2/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5270
    2019Splunk, Inc.
    270 Brannan Street
    San Francisco, CA 94107
    USA

    Michael Arrowsmith
    415-848-8400

    Splunk Cryptographic Module

    2.0.16


    The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

      • Intel Xeon E5 without PAA w/ Ubuntu 16.04
      • Intel Xeon E5 with PAA w/ Ubuntu 16.04
    2/23/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5268
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4238
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3487
    2018Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    (919) 392-6520

    CiscoSSL with FOM 6.0

    6.0


    The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

      • Intel Xeon w/ ADE-OS v3.0
    2/23/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5267
    • Hash based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4237
    • HMAC based:
      • Prediction Resistance Modes: Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3486
    2017Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    ArubaOS OpenSSL Module

    ArubaOS 6.5.1 (Firmware)


    The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

      • Qualcomm IPQ8064
      • Qualcomm IPQ4029
      • NXP QorIQ T1024
    2/23/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5266
    2016IBM Corporation
    1787 Sentry Pkwy West
    Building 18, Suite 200
    Blue Bell, PA 19422
    USA

    Sandeep Singhal
    Sandeep.Singhal1@ibm.com
    215-664-1614

    OpenSSL [1] with the OpenSSL FIPS Object Module [2]

    1.0.2n [1]; 2.0.13 [2]


    The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

      • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
    2/23/2018
    • Counter:
      • Modes: AES-128, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5263
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4234
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-256, SHA-384
      • Prerequisite: HMAC #3483
    2015Hangzhou Hikvision Digital Technology Co., Ltd.
    No.555 Qianmo Road, Binjiang District
    Hangzhou, Zhejiang 310052
    China

    Jiadong Chen
    chenjiadong@hikvision.com
    +86 136 5663 1443

    HikSSL Library

    1.0.0


    The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

      • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
    2/23/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5262
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4233
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3482
    2014Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A11)

    2.0


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A11 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    2/23/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5261
    2013Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Enclave Processor Hardware DRBG (Apple A7)

    1.2


    Apple Secure Enclave Processor Hardware DRBG is a sub-chip cryptographic hardware implementation embedded in the Apple A7 SoC, offering various cryptographic mechanisms to Apple Secure Key Store's DRBG.

      • N/A
    2/23/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled
      • Prerequisite: AES #5260
    2012Hangzhou Hikvision Digital Technology Co., Ltd.
    No.555 Qianmo Road, Binjiang District
    Hangzhou, Zhejiang 310052
    China

    Jiadong Chen
    chenjiadong@hikvision.com
    +86 136 5663 1443

    HikSSL Library

    1.0.0


    The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

      • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
    2/23/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5259
    • Hash based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4232
    • HMAC based:
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: HMAC #3481
    2011Cisco Systems, Inc
    170 W Tasman Drive
    San Jose, California 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6250

    IOS Common Cryptographic Module (IC2M)

    Rel5 (Firmware)


    The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

      • ARMv8
    2/23/2018
    • Counter:
      • Modes: AES-256
      • Derivation Function States: Derivation Function used
      • Prediction Resistance Modes: Not Enabled
      • Prerequisite: AES #5258
    2010Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung BoringSSL Cryptographic Module

    v1.2


    The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

      • Samsung Electronics Exynos7883 w/ Android 8.0
      • Qualcomm MSM8998 w/ Android 8.0
      • Qualcomm MSM8996 w/ Android 8.0
      • Qualcomm SDM845 w/ Android 8.0
      • Samsung Electronics Exynos8890 w/ Android 8.0
      • Samsung Electronics Exynos9810 w/ Android 8.0
      • Samsung Electronics Exynos8895 w/ Android 8.0
      • Samsung Electronics Exynos7570 w/ Android 8.0
      • Samsung Electronics Exynos7884 w/ Android 8.0
    2/16/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used, Derivation Function used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5255
    2009Mocana Corporation
    150 Mathilda Place
    Suite 208
    Sunnyvale, CA 94086
    USA

    Srinivas Kumar
    fips@mocana.com
    1-415-617-0055
    Fax: 1-415-617-0056

    Mocana Cryptographic Library

    6.5.1f


    The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

      • Intel Atom E3800 w/ Wind River Linux 6.0
    2/16/2018
    • Counter:
      • Modes: AES-128, AES-192, AES-256
      • Derivation Function States: Derivation Function not used
      • Prediction Resistance Modes: Enabled, Not Enabled
      • Prerequisite: AES #5252
    2008
    2/16/2018
      2007Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Marks
      seceval_us@oracle.com
      650-506-0391

      Oracle Acme Packet Cryptographic Library

      ECz8.0.0 (Firmware)


      The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

        • Intel Core i3
        • Intel Core i7
      2/16/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5247
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4225
      2006wolfSSL Inc
      10016 Edmonds Way
      Suite C-300
      Edmonds, WA 98020
      USA

      Todd Ouska
      todd@wolfssl.com
      503-679-1859

      Kaleb Himes
      kaleb@wolfssl.com

      wolfCrypt

      3.12.4


      wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

        • Intel(R) Core(TM) i5 w/ Windows 10 Pro
        • Intel(R) Xeon(R) E3-1270 w/ Debian 8.7.0
      2/16/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4222
      2005Gemalto
      Avenue du Jujubier
      Z.I Athelia IV
      La Ciotat, 13705
      France

      Frederic Garnier
      Frederic.Garnier@gemalto.com
      +33 442364368
      Fax: +33 442366953

      Didier Bonnet
      Didier.Bonnet@gemalto.com
      +33 442366803
      Fax: +33 442365545

      Gemalto Cryptographic library for IDCore 3130 on SLE78

      Infineon SLE78CLFX400VPHM 1.9 (Firmware)


      IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

        • Infineon SLE78 chip (M7892)
      2/16/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5243
      2004Evertz Microsystems
      5292 John Lucas Dr.
      Burlington, Ontario L7L 5Z9
      Canada

      Naveed Afzal
      nafzal@evertz.com
      905-335-3700

      EXE OpenSSL Cryptographic Module

      2v0_b1 (Firmware)


      Card for 6RU Shelf loaded with Evertz IPX

        • MPC8377E
      2/16/2018
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5242
      2003Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 libgcrypt

      R7-2.0.0


      The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

        • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5237
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4217
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3469
      2002Oracle Communications
      100 Crosby Drive
      Bedford, MA 01730
      USA

      George Guo
      george.guo@oracle.com
      (781) 538-7399

      Chris Marks
      chris.marks@oracle.com
      (650) 506-0391

      Oracle Acme Packet Cryptographic Library

      E-CZ 8.0.0


      The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

        • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
      2/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5236
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4216
      2001Oracle Communications
      100 Crosby Drive
      Bedford, MA 01730
      USA

      George Guo
      george.guo@oracle.com
      (781) 538-7399

      Chris Marks
      chris.marks@oracle.com
      (650) 506-0391

      Oracle Acme Packet Cryptographic Library

      E-CZ 8.0.0 (Firmware)


      The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

        • Intel Xeon D-1548 (Intel Broadwell-DE)
        • Intel Atom C2358
      2/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5235
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1
        • Prerequisite: SHS #4215
      2000Hewlett-Packard Development Company, L.P.
      11445 Compaq Center Drive W
      Houston, TX 77070
      USA

      Allison Kim
      Allison.Kim@hpe.com
      +1 832 502 6651

      Catherine Schwartz
      Catherine.Schwartz@hpe.com
      +1 832 502 6140

      HPE Secure Encryption Engine v1.1

      PM8221


      HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

        • N/A
      2/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5234
      1999Hewlett-Packard Development Company, L.P.
      11445 Compaq Center Drive W
      Houston, TX 77070
      USA

      Allison Kim
      Allison.Kim@hpe.com
      +1 832 502 6651

      Catherine Schwartz
      Catherine.Schwartz@hpe.com
      +1 832 502 6140

      HPE Secure Encryption Engine v1.1

      PM8237


      HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

        • N/A
      2/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5233
      1998Hewlett-Packard Development Company, L.P.
      11445 Compaq Center Drive W
      Houston, TX 77070
      USA

      Allison Kim
      Allison.Kim@hpe.com
      +1 832 502 6651

      Catherine Schwartz
      Catherine.Schwartz@hpe.com
      +1 832 502 6140

      HPE Secure Encryption Engine v1.1

      PM8205


      HPE Secure Encryption for Gen10 Smart Array controllers enables encryption for data-at-rest with local and remote key management modes. It encrypts the data on attached bulk storage and the cache module of the Smart Array controllers on any Hard Disk Drive or Solid State Drive supported on HPE ProLiant Gen10 servers.

        • N/A
      2/9/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5232
      1997Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 libgcrypt

      R7-2.0.0


      The Oracle Linux 7 libgcrypt Cryptographic Module is a software library implementing general purpose cryptographic algorithms

        • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5231
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4211
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3463
      1996Certicom Corp.
      4701 Tahoe Blvd, Building A
      5th Floor
      Mississauga, Ontario L4W 0B5
      Canada

      Certicom Support
      support@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Certicom Sales
      sales@certicom.com
      1-905-507-4220
      Fax: 1-905-507-4230

      Security Builder® FIPS Core

      6.3.0


      Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

        • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
        • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
        • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
        • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
        • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
        • Intel Atom C3558 without AES-NI w/ QNX SDP 7
        • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
        • Intel Atom C3558 with AES-NI w/ QNX SDP 7
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5230
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4210
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3462
      1995IBM Corporation
      222 South Riverside Plaza
      Ste 1700
      Chicago, IL 60606
      USA

      Mark Seaborn
      mseaborn@us.ibm.com
      +1 312 423 6640x2354

      IBM Cloud Object Storage System's™ FIPS Cryptographic Module

      1.1


      The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

        • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
        • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5229
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4209
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3461
      1994Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      libancrypto.so

      1.0.0


      The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

        • Intel Core i7 w/ Linux 2.6 64-bit
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5228
      1993Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 32-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5227
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4207
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3459
      1992Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S3 w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5226
      1991Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S1P w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5225
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3458
      1990Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S3 w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5224
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3457
      1989Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S1P w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5221
      1988Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S3 w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5219
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3456
      1987Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S1P w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5217
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3455
      1986Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S3 w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5216
      1985Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple S1P w/ watchOS 4
      2/9/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5215
      1984Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2, x86_64, 64-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5212
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4202
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3454
      1983Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5211
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4201
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3453
      1982Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5210
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4200
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3452
      1981Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5209
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4199
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3451
      1980Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5208
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4198
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3450
      1979Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5207
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4197
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3449
      1978Gallagher Group
      181 Kahikatea Drive
      Hamilton 3206
      New Zealand

      Andrew Scothern
      andrew.scothern@gallagher.com
      +64-7-838-9800

      Simon Lawrence
      simon.lawrence@gallagher.com
      +64-7-838-9800

      Gallagher OpenSSL Cryptographic Module

      2.0.12


      Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

        • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5206
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4196
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3448
      1977Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5205
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4195
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3447
      1976Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 32-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/9/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5204
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4194
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3446
      1975Red Hat, Inc.
      100 E. Davie Street
      Raleigh, NC 27601
      USA

      Jaroslav Reznik
      fips140@redhat.com

      OpenSSL (Full CPU set, x86_64, 64-bit library)

      6.0


      The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

        • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
      2/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5203
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4193
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3445
      1974Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3444
      1973Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5201
      1972Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5199
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3443
      1971Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5198
      1970Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A11 Bionic w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5195
      1969Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10X Fusion w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5194
      1968Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9X w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5193
      1967Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10 Fusion w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5192
      1966Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8 w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5191
      1965Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9 w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5190
      1964Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8X w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5189
      1963Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A7 w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5188
      1962Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5187
      1961Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3442
      1960Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5185
      1959Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      2/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3441
      1958Samsung Electronics Co., Ltd.
      R5, Maetan 3-dong Yeongton-gu
      Suwon-si, Gyeonggi 443-742
      Korea

      JungHa Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Samsung Kernel Cryptographic Module

      1.9


      Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

        • Exynos 9810 w/ Android 8 Kernel 4.9
        • SDM845 w/ Android 8 (Kernel 4.9)
      2/2/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3439
      1957Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A11 Bionic w/ iOS 11
      2/2/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5182
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3438
      1956Centrify Corporation
      3300 Tannery Way
      Santa Clara, California 95054
      USA

      Kitty Shih
      kitty.shih@centrify.com
      669-444-5238

      Centrify Cryptographic Library

      2.1


      Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

        • Intel Xeon X5650 x86_64 w/ RHEL 7.2
      2/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5181
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4185
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3437
      1955Samsung Electronics Co., Ltd
      416 Maetan-3dong, Yeongtong-gu
      Suwon, Gyeonggi 152-848
      South Korea

      Brian Wood
      be.wood@samsung.com
      +1-973-440-9125

      Jung Ha Paik
      jungha.paik@samsung.com
      +82-10-8861-0858

      Samsung SCrypto Library

      v2.2


      Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

        • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
        • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
        • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
      2/2/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5180
      1954iStorage Limited
      iStorage House
      13 Alperton Lane
      Perivale
      Middlesex UB6 8DH
      England

      John Michael
      john@istorage-uk.com
      +44 (0)20 8991 6260
      Fax: +44 (0)20 8991 6277

      iStorage diskAshur2 Cryptographic Library

      00.04.17.01 (Firmware)


      The iStorage diskAshur2 cryptographic library is a firmware library that provides cryptographic functions for iStorage diskAshur2 range of PIN authenticated, hardware encrypted portable data storage devices. The cryptographic functions include AES-ECB-256, AES-CTR-256, SHA256, HMAC256, KWAE, KWAD and DRBG.

        • IST28398Q
      1/26/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5179
      1953Datrium
      385 Moffett Park Dr #205
      Sunnyvale, CA 94089
      USA

      R. Hugo Patterson
      info@datrium.com
      +1 (669) 721-9444

      Datrium FIPS Object Module

      2.0.12


      The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

        • Intel Xeon E5-2618L v4 w/ Linux 3.10
        • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
        • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
      1/26/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5178
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4182
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3434
      1952Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Module v8.0 (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      1/26/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3433
      1951Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5175
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3432
      1950Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5173
      1949Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple ibridgeOS CoreCrypto Module v8.0 (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5172
      1948Samsung Electronics Co., Ltd.
      1-1, Samsungjeonja-ro
      Hwaseong-si, Gyeonggi-do 18448
      KOREA

      Jisoo Kim
      jisoo74.kim@samsung.com
      82-31-8096-2832
      Fax: 823180008000(+62832)

      RFX DRBG

      RFX DRBG V1.0 (Firmware)


      PM 1643 Series is high-performance Self-Encrypting SSD supporting SAS 12G Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, RSA-PSS 2048 for FW authentication, and Hash_DRBG for key generation.

        • Cortex R7 ARM-based CPU
      1/26/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4178
      1947SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Sales
      sales@safelogic.com

      CryptoComply® Server

      2.1


      CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

        • Intel i7 w/ Windows Server 2012 R2
      1/26/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5170
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4177
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3431
      1946Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW FIPS Object Module

      2.0.14


      Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

        • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
        • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
        • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
        • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
        • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
      1/26/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5168
      1945Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW FIPS Object Module

      2.0.13


      Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

        • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
      1/26/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5167
      1944Forcepoint
      10900-A Stonelake Blvd.
      Ste. 350
      Austin, TX 78759
      USA

      Klaus Majewski
      legal@forcepoint.com
      1-858-320-8000

      Jorma Levomäki
      legal@forcepoint.com
      1-858-320-8000

      Forcepoint NGFW FIPS Java API

      1.0.0


      Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

        • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
      1/26/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5166
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-512
        • Prerequisite: SHS #4173
      1943Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10 Fusion w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5165
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3426
      1942Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10X Fusion w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5164
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3425
      1941Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8X w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5163
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3424
      1940Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9X w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5162
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3423
      1939Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8 w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5161
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3422
      1938Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9 w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5160
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3421
      1937Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A7 w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5159
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3420
      1936Mojo Networks, Inc.
      339 N Bernardo Avenue, Suite 200
      Mountain View, CA 94043
      USA

      Hemant Chaskar
      hemant.chaskar@mojonetworks.com
      (650) 961-1111
      Fax: (650) 961-1169

      Crypto Core

      2.0.16-1-01 (Firmware)


      Cryptographic library offering various cryptographic mechanisms in sensor and access point.

        • ARMv7
      1/26/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5158
      1935Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A7 w/ iOS 11 Fusion
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5157
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3418
      1934Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A11 Bionic w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5156
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3417
      1933Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10 Fusion w/ iOS 11
      1/26/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5155
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3416
      1932Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9X w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5154
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3415
      1931Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9 w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5153
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3414
      1930Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8X w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5152
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3413
      1929Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A7 w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5151
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3412
      1928Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8 w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5150
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3411
      1927Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A10X Fusion w/ tvOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5149
      1926Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A10X Fusion w/ tvOS 11
      1/19/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3410
      1925Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A10X w/ tvOS 11 Fusion
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5145
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3409
      1924Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A10X Fusion w/ tvOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5143
      1923Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A11 Bionic w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5131
      1922Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

        • Apple S3 w/ watchOS 4
      1/19/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3408
      1921Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

        • Apple S1P w/ watchOS 4
      1/19/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3407
      1920Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

        • Apple S3 w/ watchOS 4
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5128
      1919Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within watchOS.

        • Apple S1P w/ watchOS 4
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5127
      1918Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

        • Apple S3 w/ watchOS 4
      1/19/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3406
      1917Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

        • Apple S1P w/ watchOS 4
      1/19/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3405
      1916Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

        • Apple S1P w/ watchOS 4
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5126
      1915Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Kernel Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within watchOS.

        • Apple S3 w/ watchOS 4
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5125
      1914GDC Technology (USA) LLC
      1016 West Magnolia Boulevard
      Burbank, California 91506
      USA

      Pranay Kumar
      pranay@gdc-tech.com
      (852) 2507 9565
      Fax: (852) 2579 1131

      ChernYue Kwok
      Chernyue.kwok@gdc-tech.com
      (852) 2507 9552
      Fax: (852) 2579 1131

      Standalone IMB Cryptographic Module

      2.0.11 (Firmware)


      A digital cinema standalone integrated media block that is compliant with DCI specifications and SMPTE digital cinema standards. The supported features include JPEG2000 decoding, AES decryption, key management, and logging.

        • Xilinx Zynq Ultrascale+
      1/19/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5122
      1913Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10 Fusion w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5118
      1912Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9X w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5115
      1911Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A9 w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5114
      1910Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A10X Fusion w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5110
      1909Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8X w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5106
      1908Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A8 w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5103
      1907Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple Secure Key Store CoreCrypto Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

        • Apple A7 w/ iOS 11
      1/19/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5102
      1906Silver Spring Networks
      230 W Tasman Drive
      San Jose, CA 95134
      USA

      Andrew Pendray
      support@ssni.com
      +1 669 770 4000
      Fax: +1 886 776 0015

      Silver Spring Networks Endpoint Security Module

      130-0117-02


      Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard crytographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

        • N/A
      1/19/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-512
        • Prerequisite: HMAC #3402
      1905Hewlett-Packard Development Company, L.P.
      11445 Compaq Center Drive W
      Houston, TX 77070
      USA

      Timothy McDonough
      timothy.mcdonough@hpe.com

      Hewlett Packard Enterpprise SSL Crypto Module

      2.1


      Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

        • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
      1/12/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5099
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4147
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3401
      1904Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone SSL Crypto Library

      1.0


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
        • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
      1/12/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5098
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4146
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3400
      1903Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Smartzone SSL Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

        • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
        • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
      1/12/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5097
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4145
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3399
      1902Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (650) 265-4200
      Fax: (408) 738-2065

      Mukunda Chikkeralli
      +91 80 49134180

      Ruckus Access Point SSL Crypto Library

      1.0 (Firmware)


      The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

        • Qualcomm IPQ8068
        • Qualcomm IPQ8064
        • Qualcomm IPQ8065
      1/12/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5096
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4144
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3398
      1901Ruckus Networks, An ARRIS company
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Abhi Maras
      (678) 473-2907
      Fax: (678) 473-8470

      Mike Jamison
      (678) 473-2907
      Fax: (678) 473-8470

      Cloudpath Cryptographic Library

      1.0


      Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

        • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
        • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
      1/12/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5095
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4143
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3397
      1900Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

        • Apple S3 w/ watchOS 4
      1/12/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3396
      1899Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within watchOS.

        • Apple S1P w/ watchOS 4
      1/12/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3395
      1898Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

        • Apple S3 w/ watchOS 4
      1/12/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5092
      1897Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

        • Apple S3 w/ watchOS 4
      1/12/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5091
      1896Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Bishakha Banerjee
      408-745-2000
      Fax: 408-745-2100

      JUNOS 17.3R2 RE1800 - Kernel

      17.3R2 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon LC5518
      1/12/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3393
      1895Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Seyed Safakish
      seyeds@juniper.net
      408-745-2000
      Fax: 408-745-2100

      JUNOS 17.3R2 RE1800 - OpenSSL

      17.3R2 (Firmware)


      Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

        • Intel Xeon LC5518
      1/12/2018
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3392
      1894Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

        • Apple S3 w/ watchOS 4
      1/12/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5088
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3391
      1893Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

        • Apple S1P w/ watchOS 4
      1/12/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5087
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3390
      1892Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within watchOS.

        • Apple S1P w/ watchOS 4
      1/12/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5086
      1891Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple watchOS CoreCrypto Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within watchOS.

        • Apple S1P w/ watchOS 4
      1/12/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5085
      1890Toshiba Memory Corporation
      1-1, Shibaura 1-chome
      Minato-ku, Tokyo 105-8001
      Japan

      Akihiro Kimura
      akihero.kimura@toshiba.co.jp
      +81-45-890-2856
      Fax: +81-45-890-2593

      Crypto Library Hash_DRBG

      1.0.0 (Firmware)


      a library of unique software cipher solutions which are standard encryption algorithm-based to provide Toshiba Memory Corporation enterprise SSD products and the systems using them a robust and secure data storage environment

        • Cortex-M3
      1/12/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4128
      1889Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

        • Intel i5 w/ macOS 10.13
      1/5/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5072
      1888Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

        • Intel i7 w/ macOS 10.13
      1/5/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5071
      1887SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      Usha Sanagala
      usanagala@sonicwall.com
      408-962-6248
      Fax: 408-745-9300

      SonicWall Crypto Library

      SonicOS 6.2.5 (Firmware)


      SonicWall Crypto Library

        • Cavium Octeon
      1/5/2018
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4130
      1886Infineon Technologies AG
      Alter Postweg 101
      Augsburg, BY 86159
      Germany

      Roland Ebrecht
      Roland.Ebrecht@infineon.com
      +49-821-25851-68
      Fax: +49-821-25851-40

      Thomas Hoffmann
      Thomas.Hoffmann@infineon.com
      +49-821-25851-24
      Fax: +49-821-25851-40

      Trusted Platform Module 2.0 SLB 9670

      SLB 9670 7.83 (Firmware)


      Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

        • Infineon SLB 9670 security controller IC
      1/5/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5069
      1885Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel i7 w/ macOS 10.13
      1/5/2018
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3382
      1884Huawei Technologies Co., Ltd
      Huawei Industrial Base, Bantian Longgang
      Shenzhen, Guangdong 518129
      China

      SPENCER HE
      heshunbin@huawei.com
      +86-755-28979041

      EulerOS 2.0

      EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

        • Intel Xeon w/ EulerOS 2.0
      1/5/2018
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5066
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4126
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3381
      1883Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

        • Intel Xeon w/ macOS 10.13
      1/5/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5065
      1882Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and the AES-NI Intel instruction set using the generic block chaining mode of CBC.

        • Intel i5 w/ macOS 10.13
      1/5/2018
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5063
      1881Silver Peak Systems, Inc.
      2860 De La Cruz Blvd.
      Santa Clara, CA 95050
      USA

      Damon Ennis
      (408) 935-1836

      Anusha Vaidyanathan
      (408) 935 1800
      Fax: (408) 588-1608

      Silver Peak Cryptographic library

      1.0 (Firmware)


      Unity EdgeConnect appliances deliver predictable application performance over any combination of transport services. Orchestrated application-driven security policies enable direct internet breakout for trusted SaaS and web applications. Fully compatible with existing WAN infrastructure, EdgeConnect provides simplifies and enables the Thin Branch.

        • Intel(R) Xeon(R) CPU E5-2420 0 @ 1.90GHz with AES-NI
        • Intel(R) Xeon(R) CPU E5-2680 v3 @ 2.50GHz with AES-NI
      1/5/2018
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5060
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4125
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3380
      1880Hewlett Packard Enterprise
      8 Technology Drive
      Westborough, MA 01581
      USA

      Aftab Alan
      aftab.alan@hpe.com
      917 576-6680

      OmniStack Cryptographic Library

      2.1


      The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

        • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
      12/22/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5059
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4124
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3379
      1879Private Machines, Inc
      164 20th Street
      4A-4B
      Brooklyn, NY 11232
      USA

      Sumeet Bajaj
      sumeet@privatemachines.com

      Radu Sion
      sion@privatemachines.com

      Private Machines Enforcer DRBG Library

      L4-1 1.0.1 (Firmware)


      The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

        • MAX32550 Cortex M3
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3385
      1878Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel Core M w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5057
      1877Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel Xeon w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5056
      1876Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel i5 w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5055
      1875Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel i7 w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5054
      1874Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel Core M w/ macOS 10.13
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3377
      1873Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel i5 w/ macOS 10.13
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3376
      1872Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • intel Xeon w/ macOS 10.13
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3375
      1871Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel i7 w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5051
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3374
      1870Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel Core M w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5050
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3373
      1869Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel Xeon w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5049
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3372
      1868Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Intel i5 w/ macOS 10.13
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5048
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3371
      1867Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      JUNOS Version 17.3R2 - OpenSSL

      17.3R2 (Firmware)


      The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

        • Intel Xeon D
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3367
      1866Hewlett Packard Enterprise
      8 Technology Drive
      Westborough, MA 01581
      USA

      Aftab Alan
      aftab.alan@hpe.com
      917 576-6680

      OmniStack Cryptographic Library

      2.1


      The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

        • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
      12/22/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5045
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4110
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3365
      1865SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      George Duo
      gduo@sonicwall.com
      (408) 962-7049

      SonicOS 6.5.0 for TZ, NSA and SuperMassive

      FW Version 6.5.0 (Firmware)


      The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

        • Cavium OCTEON III (CN7XXX)
        • Cavium OCTEON II (CN6XXX)
      12/22/2017
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4109
      1864DocuSign, Inc.
      221 Main St.
      Suite 1000
      San Francisco, CA 94105
      USA

      Ezer Farhi
      Ezer.Farhi@docusign.com
      972-3-9279529

      DocuSign-SA-MAIN

      8.5 (Firmware)


      DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

        • Intel® Xeon Quad-Core
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3363
      1863Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto Kernel Module v8.0 (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3362
      1862Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto Kernel Module v8.0 (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5040
      1861Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      12/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3361
      1860Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto Kernel Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      12/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5039
      1859Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 7 GnuTLS C Implementation

      R7-2.0.0


      GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

        • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
      12/22/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5038, AES #5042
      1858Extreme Networks
      6480 Via Del Ora
      San Jose, CA 95119
      USA

      Craig J Ficik
      cficik@extremenetworks.com
      603-9525922
      Fax: 404-806-5377

      Extreme Networks Summit Series

      22.3 (Firmware)


      Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

        • Cavium Octeon II
      12/15/2017
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5037
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3359
      1857Extreme Networks
      6480 Via Del Ora
      San Jose, CA 95119
      USA

      Craig J Ficik
      cficik@extremenetworks.com
      603-952-5922
      Fax: 404-806-5377

      Extreme Networks Summit Series

      22.3 (Firmware)


      Extreme Networks Operating Systems (EXOS) for use on Extreme Networks Data Networking Switches.

        • Intel Atom C series
      12/15/2017
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5036
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-256, SHA-512
        • Prerequisite: HMAC #3358
      1856Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A10 Fusion w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3357
      1855Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A11 Bionic w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3356
      1854Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A10X Fusion w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3355
      1853Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A9X w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3354
      1852Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A9 w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3353
      1851Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A8X w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3352
      1850Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A8 w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3351
      1849Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

        • Apple A7 w/ iOS 11
      12/15/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-384, SHA-512
        • Prerequisite: HMAC #3350
      1848Infotecs
      77 Water Street
      office 853
      New York, NY 10005
      USA

      Aleksandr Tkachev
      Aleksandr.Tkachev@infotecs.us
      +1 (646) 589-8571

      Vladimir Kuryndin
      kurindinvv@infotecs.us
      +7 (495) 737-6192
      Fax: +7 (495) 737-7278

      ViPNet Common Crypto Core Library (Kernel)

      2.0


      The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

        • Intel® Core i5-3337U w/ Linux Debian 7.11 (64 bit)
        • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
      12/15/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5035
      1847Infotecs
      77 Water Street
      office 853
      New York, NY 10005
      USA

      Aleksandr Tkachev
      Aleksandr.Tkachev@infotecs.us
      +1 (646) 589-8571

      Vladimir Kuryndin
      kurindinvv@infotecs.us
      +7 (495) 737-6192
      Fax: +7 (495) 737-7278

      ViPNet Common Crypto Core Library (User Space)

      2.0


      n/a

        • n/a w/ Windows 10 (64-bit)
      12/15/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5034
      1846Infotecs
      77 Water Street
      office 853
      New York, NY 10005
      USA

      Aleksandr Tkachev
      Aleksandr.Tkachev@infotecs.us
      +1 (646) 589-8571

      Vladimir Kuryndin
      kurindinvv@infotecs.us
      +7 (495) 737-6192
      Fax: +7 (495) 737-7278

      ViPNet Common Crypto Core Library (User Space)

      2.0


      The ViPNet Common Crypto Core Library is a software library that provides cryptographic services to a number of ViPNet applications via an API. It is available in user space and kernel driver implementations on a wide range of operational systems. User space library and kernel library use the same base source code.

        • Intel® Core i5 w/ MacOS X 10.12
        • Apple A10 Fusion w/ iOS 10.3.3
        • Samsung Exynos 7880 w/ Android 7.0
        • Intel® Core i5-3337U w/PAA w/ Linux Debian 7.11 (64-bit)
        • Intel® Core i7-3632QM w/ Windows 10 (64-bit)
        • Intel® Core i5-3337U w/ Linux Debian 7.11 (64-bit)
      12/15/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5033
      1845Samsung Electronics Co., Ltd.
      1-1, Samsungjeonja-ro
      Hwaseong-si, Gyeonggi-do 18448
      KOREA

      Jisoo Kim
      jisoo74.kim@samsung.com
      82-31-8096-2832
      Fax: 823180008000(+62832)

      EPiC2 DRBG

      EPiC2 DRBG V1.0 (Firmware)


      PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

        • Cortex R7 ARM-based CPU
      12/15/2017
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4072
      1844DELL, Inc.
      One Dell Way
      Round Rock, Texas 78682
      USA

      Alaric Silveira
      Alaric.Silveira@dell.com

      Gang Liu
      gang_liu@dell.com
      +1 512 728 5545

      Dell Crypto Library for Dell iDRAC and Dell CMC

      2.4


      The Integrated Dell Remote Access Controller 8 (Dell iDRAC8) is designed to improve the overall manageability and availability of Dell PowerEdge Servers. The Dell Chassis Management Controller (Dell CMC) is a system management component designed to manage one or more Dell PowerEdge Systems containing Blade Servers.

        • ARMv7 NPCMX50 w/ Linux 4.1.12
      12/8/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5032
      1843McAfee, Inc.
      2821 Mission College Blvd.
      Santa Clara, CA 95054
      USA

      Andy Nissen
      andy.nissen@intel.com
      651-770-6151

      McAfee Advanced Threat Defense

      4.0


      A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

        • Intel Xeon w/ Linux 4.4.27
      12/8/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5031
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4090
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3345
      1842Certes Networks, Inc.
      300 Corporate Center Drive
      Suite 140
      Pittsburgh, PA 15108
      USA

      Sean Everson
      sean.everson@certesnetworks.com
      1.412.357.1130
      Fax: 1.412.262.2574

      Gary Brunner
      gary.brunner@certesnetworks.com
      1.412.200.2177
      Fax: 1.412.262.2574

      CryptoFlow Net Creator Java Crypto Module

      1.0


      The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

        • Intel Xeon E3-1270v5 w/ CentOS 6.7
      12/8/2017
      • Counter:
        • Modes: AES-128, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5028
      1841RSA Security LLC
      174 Middlesex Turnpike
      Bedford, MA 01730
      USA

      FIPS Program
      fips-program@rsa.com

      RSA BSAFE® Crypto-J JSAFE and JCE Software Module

      6.2.4


      RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

        • Intel Core i5 w/ Windows 10 (64-bit)
        • Intel Xeon w/ CentOS 7.3
        • Qualcomm Snapdragon w/ Android 7.1.2
      12/8/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #5026
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • Prerequisite: SHS #4085
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
        • Prerequisite: HMAC #3340
      1840Konica Minolta, Inc.
      2970, Ishikawa-machi
      Hachioji-shi, Tokyo 192-8505
      Japan

      R&D Administration Division, R&D Headquarters Business Techn

      Konica Minolta PP Crypto Library

      1.0 Rev.1 (Firmware)


      Konica Minolta PP Crypto Library is used in bizhub PRO 1100 and later version or series productions that provides cryptographic services to protect assets and communication channels. It implements support for RSA Digital Signature generation/verification, AES, hash function including SHA and HMAC_DRBG.

        • Intel(R) Pentium G3420
      12/8/2017
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3339
      1839Ruckus Wireless, Inc.
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Suneetha Sarala
      Suneetha.Sarala@arris.com
      650-265-4200

      Julie Lu
      Julie.Lu@arris.com
      650-265-4200

      BRCD-IP-CRYPTO-VER-4.0

      BRCD-IP-CRYPTO-VER-4.0 (Firmware)


      Firmware algorithm for the Brocade FastIron Series

        • Freescale P2041
      12/8/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5024
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4083
      1838Ruckus Wireless, Inc.
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Suneetha Sarala
      Suneetha.Sarala@arris.com
      650-265-4200

      Julie Lu
      Julie.Lu@arris.com
      650-265-4200

      BRCD-IP-CRYPTO-VER-4.0

      BRCD-IP-CRYPTO-VER-4.0 (Firmware)


      Firmware algorithm for the Brocade FastIron Series

        • ARM Cortex A57
      12/8/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5023
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4082
      1837Ruckus Wireless, Inc.
      350 W Java Drive
      Sunnyvale, CA 94089
      USA

      Suneetha Sarala
      Suneetha.Sarala@arris.com
      650-265-4200

      Julie Lu
      Julie.Lu@arris.com
      650-265-4200

      BRCD-IP-CRYPTO-VER-4.0

      BRCD-IP-CRYPTO-VER-4.0 (Firmware)


      Firmware algorithm for the Brocade FastIron Series

        • ARM Cortex A9
      12/8/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5022
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4081
      1836SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      Usha Sangala
      usanagala@SonicWALL.com
      408-962-6248
      Fax: 408-745-9300

      Mike Vache
      mvache@sonicwall.com
      408-962-6760
      Fax: 408-745-9300

      avcrypto

      12.1.0 (Firmware)


      Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

        • Intel Core i5 with AES-NI
        • Intel Xeon with AES-NI
      12/8/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5020
      1835Neopost Technologies, S.A.
      42-46 Avenue Aristide Briand
      Bagneux, Hauts-de-Seine 92220
      France

      Adriana Rosca
      a.rosca@neopost.com
      +33 1 45 36 61 04
      Fax: +33 1 45 36 30 10

      Neopost PSD

      A0038116B (Firmware)


      Neopost Postal Secure Device (PSD) for low to high range of franking machines

        • NXP LPC3220 Microprocessor
      11/30/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #2874
      1834HGST, a Western Digital company
      3403 Yerba Buena Road
      San Jose, CA 95119
      USA

      Michael Williamson
      michael.williamson@wdc.com
      408-717-8458

      Vishal Tanna
      Vishal.Tanna@wdc.com
      408-801-2499

      TCG Crypto Library

      SVN Revision 2038 (Firmware)


      Cryptographic library support for Western Digital's HGST branded Self-Encrypting Drives (SEDs).

        • Marvell ARM Cortex R5
      11/30/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3333
      1833Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      11/30/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3332
      1832Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

        • Apple A10X w/ tvOS 11 Fusion
      11/30/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3331
      1831Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      11/30/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5015
      1830Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple tvOS CoreCrypto Module v8.0 (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES within tvOS.

        • Apple A10X Fusion w/ tvOS 11
      11/30/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5014
      1829Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A10X Fusion w/ iOS 11
      11/30/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5009
      1828Cisco Systems, Inc.
      170 West Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Cisco Security Crypto Virtual

      F6.2


      The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

        • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
      11/30/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5008
      1827Brocade Communications Systems LLC
      120 Holger Way
      San Jose, CA 95110
      USA

      Hamid Sabouti
      hamid.sobouti@broadcom.com
      408-333-4150
      Fax: 408-333-3844

      Brocade Fabric OS FIPS Cryptographic Module

      8.2.0


      Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

        • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
        • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
      11/30/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #5006
      1826SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE NSS on x86 with AES-NI

      2.0


      SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

        • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
      11/30/2017
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4070
      1825SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE NSS on x86 without AES-NI

      2.0


      SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

        • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
      11/30/2017
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4069
      1824SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE NSS z13

      2.0


      SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

        • z13 w/ SUSE Linux Enterprise Server 12 SP2
      11/30/2017
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4068
      1823SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      Usha Sangala
      usanagala@SonicWALL.com
      408-962-6248
      Fax: 408-745-9300

      Mike Vache
      mvache@sonicwall.com
      408-962-6760
      Fax: 408-745-9300

      avcrypto

      12.1.0 (Firmware)


      Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

        • Intel Xeon with AES-NI
      11/30/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5001
      1822SonicWALL Inc.
      5455 Great America Parkway
      Santa Clara, CA 95054
      USA

      Usha Sangala
      usanagala@SonicWALL.com
      408-962-6248
      Fax: 408-745-9300

      Mike Vache
      mvache@sonicwall.com
      408-962-6760
      Fax: 408-745-9300

      avcrypto

      12.1.0 (Firmware)


      Kernel-based implementation of DRBG, AES, SHA, HMAC, GCM derived from OpenSSL and Linux implementations. CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc.

        • Intel Core i5 with AES-NI
      11/30/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #5000
      1821Lexmark International, Inc.
      740 West New Circle Road
      Lexington, KY 40550
      USA

      Graydon Dodson
      gdodson@lexmark.com
      +1 859 232-6483

      Crypto Module (user)

      3.2


      Lexmark Crypto Module (user)

        • Marvell MV78460-B0 w/ Lexmark Linux v4
      11/22/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4998
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4064
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3321
      1820Lexmark International, Inc.
      740 West New Circle Road
      Lexington, KY 40550
      USA

      Graydon Dodson
      gdodson@lexmark.com
      +1 859 232-6483

      Crypto Module (user)

      3.2


      Lexmark Crypto Module (user)

        • Marvell 88PA6270C0 w/ Lexmark Linux v4
      11/22/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Prerequisite: AES #4997
      • Hash based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4063
      • HMAC based:
        • Prediction Resistance Modes: Enabled, Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3320
      1819Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel i5 w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3319
      1818Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

        • Intel Core M w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3318
      1817Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

        • Intel Xeon w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3317
      1816Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

        • Intel i7 w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3316
      1815Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA1-, SHA-224, SHA-256 using the SSE3 processor instruction set.

        • Intel i5 w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3315
      1814Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel Core M w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3314
      1813Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel Xeon w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3313
      1812Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel i7 w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3312
      1811Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel i5 w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3311
      1810Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel Core M w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3310
      1809Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel i7 w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3309
      1808Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-256.

        • Intel Xeon w/ macOS 10.13
      11/22/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3308
      1807Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Intel Core M w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4988
      1806Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Intel Xeon w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4987
      1805Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Intel i5 w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4986
      1804Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Intel i7 w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4985
      1803Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A11 Bionic w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4984
      1802Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A10 Fusion w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4983
      1801Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A9X w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4982
      1800Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A8 w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4981
      1799Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A9 w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4980
      1798Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A8X w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4979
      1797Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and assembler VNG implementations.

        • Apple A7 w/ iOS 11
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4978
      1796Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Intel Core M w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4976
      1795Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Intel i7 w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4975
      1794Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Intel i5 w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4974
      1793Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Intel Xeon w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4973
      1792Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel Core M w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4972
      1791Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel Xeon w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4971
      1790Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel i5 w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4970
      1789Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AESNI_gen)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel i7 w/ macOS 10.13
      11/22/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4969
      1788Qualcomm Technologies, Inc.
      5775 Morehouse Dr
      San Diego, CA 92121
      USA

      Yin Ling Liong
      yliong@qti.qualcomm.com
      858-651-7034
      Fax: 858-845-1523

      QTI Pseudo Random Number Generator (Version 2.3.1)

      Snapdragon 845


      Snapdragon 845 Pseudo Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

        • N/A
      11/22/2017
      • Hash based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-256
        • Prerequisite: SHS #4047
      1787Cisco Systems, Inc.
      170 W Tasman Dr
      San Jose, CA 95134
      USA

      Clint Winebrenner
      cwinebre@cisco.com
      919.392.6520

      CiscoSSL FIPS Object Module

      6.0 (Firmware)


      The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

        • Apple A10 on iOS 10.x
      11/17/2017
      • Counter:
        • Modes: AES-128, AES-192, AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4956
      • Hash based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4046
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3304
      1786Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel Xeon w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3303
      1785Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel Core M w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3302
      1784Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel i7 w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3301
      1783Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX2)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel i5 w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3300
      1782Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel Xeon w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3299
      1781Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel Core M w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3298
      1780Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel i7 w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3297
      1779Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (AVX)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-256.

        • Intel i5 w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3296
      1778Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

        • Intel Core M w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3295
      1777Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

        • Intel Xeon w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3294
      1776Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

        • Intel i7 w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3293
      1775Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (SSSE3)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256.

        • Intel i5 w/ macOS 10.13
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3292
      1774Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel Xeon w/ macOS 10.13
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4947
      1773Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel Core M w/ macOS 10.13
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4946
      1772Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel i5 w/ macOS 10.13
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4945
      1771Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple macOS CoreCrypto v8 Userspace Module (Assembler VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and the AES-NI Intel instructions set using the generic block chaining modes of CBC.

        • Intel i7 w/ macOS 10.13
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4944
      1770Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

      15.1 X49-D110 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7130)
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3291
      1769Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      Pradeepa M R
      pradeepam@juniper.net

      Junos FIPS Version 15.1X49 - SRX345 - Authentec

      15.1 X49-D110 (Firmware)


      Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

        • Cavium Octeon III (CN7130)
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Enabled
        • Modes: SHA-256
        • Prerequisite: HMAC #3289
      1768Renesas Electronics Corporation
      5-20-1 Jousuihon-cho
      Kodaira-shi, Tokyo 187-8588
      Japan

      Hideyuki Tanaka
      hideyuki.tanaka.jc@renesas.com
      +81-42-312-6926
      Fax: +81-42-328-4374

      TSIP

      RX Family RX65N Version 1.03 (Firmware)


      The TSIP is hardware which consists of cryptographic accelerator, random number generator and access management circuit based on the chip-unique-ID. The TSIP is embedded in the general purpose MCUs, RX65N and RX651. Therefore, RX65N and RX651 can provide the TSIP secure cryptographic functions including strong key management.

        • n/a
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4940
      1767Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A11 Bionic w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4939
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3288
      1766Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple 10X Fusion w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4938
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3287
      1765Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A9X w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4937
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3286
      1764Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A10 Fusion w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4936
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3285
      1763Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

        • Apple A8 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4935
      1762Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A8X w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4934
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3284
      1761Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A9 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4933
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3283
      1760Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

        • Apple A10X Fusion w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4932
      1759Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A7 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4931
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3282
      1758Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

        • Apple A8 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4930
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3281
      1757Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

        • Apple A11 Bionic w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4929
      1756Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

        • Apple A10 Fusion w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4928
      1755Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

        • Apple A9X w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4927
      1754Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized VNG Assembler implementations.

        • Apple A9 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4926
      1753Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

        • Apple A8X w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4925
      1752Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and VNG Assembler implementations.

        • Apple A7 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4924
      1751Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A11 Bionic w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3280
      1750Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A10X Fusion w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3279
      1749Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A10 Fusion w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3278
      1748Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A9X w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3277
      1747Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A8X w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3276
      1746Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A11 Bionic w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4923
      1745Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A9 w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3275
      1744Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A8 w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3274
      1743Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A9 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4922
      1742Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A10X Fusion w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4921
      1741Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A8X w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4920
      1740Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A10 Fusion w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4919
      1739Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A9X w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4918
      1738Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A8 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4917
      1737Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space assembler optimized AES.

        • Apple A7 w/ iOS 11
      11/17/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4916
      1736Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Kernel Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A7 w/ iOS 11
      11/17/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3273
      1735Cisco Systems, Inc.
      170 West Tasman Dr.
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Cisco Security Crypto

      F6.2 (Firmware)


      The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

        • Intel Atom C2xxx Family, Intel Xeon 34xx Family
        • Intel Xeon E Family
        • Intel Xeon D Family
      11/17/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4905
      1734Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Microsoft Surface Hub Virtual TPM Implementations

      10.0.15063.674


      The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
      11/17/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4904
      1733Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

      10.0.16299


      The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
      11/17/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4903
      1732Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Microsoft Surface Hub SymCrypt Cryptographic Implementations

      10.0.15063.674


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
      11/17/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4902
      1731Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

      10.0.15254


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
        • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
        • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
        • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
      11/17/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4901
      1730Microsoft Corporation
      One Microsoft Way
      Redmond, WA 98052-6399
      USA

      Mike Grimm
      FIPS@microsoft.com
      800-Microsoft

      Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

      10.0.16299


      The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
        • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
        • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
        • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
        • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
        • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
        • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4897
      1729Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A9X w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3266
      1728Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A10X Fusion w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3265
      1727Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A11 Bionic w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3264
      1726Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A8 w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3263
      1725Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A8X w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3262
      1724Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A7 w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3261
      1723Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A9 w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3260
      1722Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Module (VNG)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and optimized SHA-1, SHA-224, SHA-256 using SHAVNG.

        • Apple A10 Fusion w/ iOS 11
      11/9/2017
      • HMAC based:
        • Prediction Resistance Modes: Not Enabled
        • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: HMAC #3259
      1721Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A10 Fusion w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4877
      1720Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A8X w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4876
      1719Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A11 Bionic w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4875
      1718Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A10X Fusion w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4874
      1717Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A9 w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4873
      1716Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A9X w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4872
      1715Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A8 w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4871
      1714Apple Inc.
      1 Infinite Loop
      Cupertino, CA 95014
      USA

      Shawn Geddis
      geddis@apple.com
      (669)227-3579
      Fax: (866)315-1954

      Apple iOS CoreCrypto v8 Userspace Module (Assembler)

      8.0


      Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space assembler optimized AES.

        • Apple A7 w/ iOS 11
      11/9/2017
      • Counter:
        • Modes: AES-128
        • Derivation Function States: Derivation Function used
        • Prediction Resistance Modes: Not Enabled
        • Prerequisite: AES #4870
      1713Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tinri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4861
      1712Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA

      Farzam Tajbakhsh
      ftajbakhsh@tintri.com
      (650) 810-8266

      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri OS 4.5
      11/9/2017
      • Counter:
        • Modes: AES-256
        • Derivation Function States: Derivation Function not used, Derivation Function used
        • Prediction Resistance Modes: Enabled
        • Prerequisite: AES #4860
      1711Tintri, Inc.
      303 Ravendale Drive
      Mountain View, CA 94043
      USA
      Tintri Cryptographic Module

      1.0


      The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4860
        1710Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri OS 4.5
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4859
        1709Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2680 @ 2399MHz with AES-NI w/ Tintri OS 4.5
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4858
        1708Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

          • Intel Xeon E5-2620 @ 2100MHz with AES-NI w/ Tintri OS 4.5
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4857
        1707Tintri, Inc.
        303 Ravendale Drive
        Mountain View, CA 94043
        USA

        Farzam Tajbakhsh
        ftajbakhsh@tintri.com
        (650) 810-8266

        Tintri Cryptographic Module

        1.0


        The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms by the module have been made.

          • Intel Xeon E5-2609 @ 1699MHz with AES-NI w/ Tintri OS 4.5
        11/9/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4856
        1706Ciena Corporation
        7035 Ridge Road
        Hanover, MD 21076
        USA

        Kevin Meagher
        KMeagher@ciena.com

        Ciena 6500 Packet Optical Family

        12.3


        Ciena's Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

          • PowerQUICC II w/ VxWorks 6.1
          • PowerQUICC II w/ VxWorks 6.3
        11/3/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4855
        1705Hewlett Packard Enterprise
        8000 Foothills Blvd.
        Roseville, CA 95747
        USA

        Susan Scotten
        susan.scotten@hpe.com
        1-916-540-1109

        Aruba Campus Switch Series Crypto Library

        16.04 (Firmware)


        Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

          • Freescale P2020 Dual Core
          • Dual Core ARM Coretex
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4853
        1704Gemalto
        20 Colonnade Road, Suite 200
        Ottawa, ON K2E7M6
        Canada

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        SafeXcel 3120 Chip

        SF114-011206-001A, v2.9.5


        The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

          • N/A
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4849
        1703Thales e-Security Inc.
        900 South Pine Island Road
        Suite 710
        Plantation, FL 33324
        USA

        Natalya Robert
        natalya.robert@thalesesec.com
        954-888-6268

        Robert Burns
        robert.burns@thalesesec.con
        954-888-6215

        Vormetric Data Security Manager Virtual Appliance Module

        6.0.0


        The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

          • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4846
        1702Thales e-Security Inc.
        900 South Pine Island Road
        Suite 710
        Plantation, FL 33324
        USA

        Natalya Robert
        natalya.robert@thalesesec.com
        954-888-6268

        Robert Burns
        robert.burns@thalesesec.con
        954-888-6215

        Vormetric Data Security Manager Module

        6.0.0 (Firmware)


        The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

          • Intel Xeon
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Not Enabled
          • Prerequisite: AES #4845
        1701Pure Storage, Inc.
        650 Castro Street
        Suite 400
        Mountain View, CA 94041
        USA

        John Fuchigami
        jfuchigami@purestorage.com
        800-379-7873

        Flash Array Crypto Library

        1.2.0


        Flash Array Crypto Library is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

          • Intel Xeon x64 CPU with AES-NI (E3/E5/E7 Family) w/ Purity 4
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4844
        1700F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP vCMP on B4450 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4841
        1699SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE libgcrypt using generic C implementation

        3.0


        This test covers generic C implementation of multiple algorithms.

          • z13 w/ SUSE Linux Enterprise Server 12 SP2
        11/3/2017
        • Counter:
          • Modes: AES-128, AES-192, AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4840
        • Hash based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3982
        • HMAC based:
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Modes: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: HMAC #3241
        1698F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP vCMP on B2250 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4839
        1697F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP 10350F TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4838
        1696F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP B4450N TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4837
        1695F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038
        Fax: ~

        BigIP B2250 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4836
        1694F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP vCMP on B4450 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4835
        1693F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP B4000 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4834
        1692F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP i5820 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4833
        1691F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP B7000 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E3-1275
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4832
        1690F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP i7820 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1650
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4834
        1689F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BigIP i4000 TMM Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4830
        1688F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B4450N OpenSSL Software Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658A
        11/3/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4829
        1687F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B2250 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4828
        1686F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP 10350F OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4827
        1685F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP vCMP on B2250 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-2658
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4826
        1684F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B4000 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4825
        1683F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP i4000 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4824
        1682F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP i7820 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1650
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4823
        1681F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP i5820 OpenSSL Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

          • Intel(R) Xeon(R) CPU E5-1630
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4822
        1680F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        BIGIP B7000 OpenSSL Software Implementation

        13.1.0 (Firmware)


        F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

          • Intel(R) Xeon(R) CPU E3-1275
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function not used, Derivation Function used
          • Prediction Resistance Modes: Enabled, Not Enabled
          • Prerequisite: AES #4821
        1679McAfee, Inc.
        2821 Mission College Blvd.
        Santa Clara, CA 95054
        USA

        Mark Hanson
        Mark_Hanson@McAfee.com

        McAfee NSP NS Crypto Lib

        n.a 2.0.5_9.1.17.2 (Firmware)


        Cryptographic services for the McAfee NSP Intrusion Prevention appliance

          • Intel Atom C Family
          • Intel Xeon E5 Family
        10/27/2017
        • Counter:
          • Modes: AES-256
          • Derivation Function States: Derivation Function used
          • Prediction Resistance Modes: Enabled
          • Prerequisite: AES #4820
        1678
        10/27/2017
          1677McAfee, Inc.
          2821 Mission College Blvd.
          Santa Clara, CA 95054
          USA

          Mark Hanson
          Mark_Hanson@McAfee.com

          McAfee NSP NS Crypto Lib

          n.a 2.0.5_9.1.17.2 (Firmware)


          Cryptographic services for the McAfee NSP Intrusion Prevention appliance

            • Intel Atom C Family
          10/20/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4817
          1676Synopsys, Inc.
          690 East Middlefield Road
          Mountain View, CA 94043
          USA

          Dana Neustadter
          danan@synopsys.com
          +1(613)595-9836

          DWC Cryptography Software Library

          4.2.0


          The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

            • ARC® EM7D Processor with CryptoPack w/ n/a
          10/20/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4816
          1675IBM
          2455 South Rd
          Poughkeepsie, NY 12601
          USA

          Thomas Morris Jr
          tmorrisj@us.ibm.com
          1-845-435-5538

          William Santiago
          wsf1@us.ibm.com
          1-845-435-9265

          Miniboot 1.30 with 00CW683

          Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


          Miniboot implemented algorithms with hardware acceleration

            • IBM PowerPC 405
          10/20/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4815
          1674IBM
          2455 South Rd
          Poughkeepsie, NY 12601
          USA

          Thomas Morris Jr
          tmorrisj@us.ibm.com
          1-845-435-5538

          William Santiago
          wsf1@us.ibm.com
          1-845-435-9265

          Miniboot 1.30 with 00KP899

          Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


          Miniboot implemented algorithms with hardware acceleration

            • IBM PowerPC 405
          10/20/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4814
          1673Tandberg Data
          10155 Westmoor Dr., Suite 155
          Westminster, CO 80021
          USA

          Neil Donohoe
          ndonohoe@overlandstorage.com
          720-598-7265

          Dan Walkes
          dwalkes@overlandstorage.com
          720-598-7264

          RDX RNG

          1.0.1 (Firmware)


          DRBG implementation

            • Altera Nios Classic
          10/20/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3955
          1672IBM Corporation
          9032 S Rita Road
          Tucson, AZ 85744
          USA

          Kevin D. Butt
          kdbutt@us.ibm.com
          520-799-5280

          IBM LTO 7 Cryptographic Firmware Library

          1.0 (Firmware)


          Firmware cryptographic implementation that adds secure key channel capabilities to the IBM LTO 7 tape drive.

            • IBM PowerPC 405
          10/13/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-512
            • Prerequisite: SHS #3954
          1671Infoblox
          3111 Coronado Drive
          Santa Clara, CA 95054
          USA

          Dave Funk
          dfunk@infoblox.com
          408-986-5591

          NIOS Cryptographic Library

          2.0 (Firmware)


          Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

            • Intel Xeon w/ VMware ESXi 5
            • Intel Xeon
            • Intel Xeon w/ VMware ESXi 6
            • Intel Core i3
          10/13/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4805
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3953
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3215
          1670McAfee, Inc.
          2821 Mission College Blvd.
          Santa Clara, CA 95054
          USA

          Mark Hanson
          Mark_Hanson@McAfee.com
          972.963.7326

          McAfee NSP NS Crypto Lib

          2.0.5_9.1.17.1 (Firmware)


          Cryptographic services for the McAfee NSP Intrusion Prevention appliances

            • Intel Xeon Gold Family
          10/13/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4801
          1669Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2680 @ 2399MHz without AES-NI w/ Tintri Linux version 4.4.0.1
          10/6/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4800
          1668Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2620 @ 2100MHz without AES-NI w/ Tintri Linux version 4.4.0.1
          10/6/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4799
          1667Tintri, Inc.
          303 Ravendale Drive
          Mountain View, CA 94043
          USA

          Farzam Tajbakhsh
          ftajbakhsh@tintri.com
          (650) 810-8266

          Tintri Cryptographic Module

          1.0


          The Tintri Cryptographic Module is a repackaged copy of OpenSSL which includes AES-GCM, AES-CBC, HMAC-SHA1, and DRBG. No modifications to the software content have been made, and no modifications to the algorithms implemented by the module have been made.

            • Intel Xeon E5-2609 @ 1699MHz without AES-NI w/ Tintri Linux version 4.4.0.1
          10/6/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4798
          1666Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Bill Shelton
          bshelton@juniper.net
          408-745-2000
          Fax: 408-745-2100

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS Version 17.3R1-OpenSSL

          17.3R1 (Firmware)


          The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

            • Intel Xeon D-1531
          10/6/2017
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3202
          1665Zebra Technologies Corporation
          3 Overlook Point
          Lincolnshire, IL 60069
          USA

          Erv Comer
          Erv.Comer@zebra.com
          480-628-7901

          Rob Franzo
          Rob.Franzo@zebra.com
          631-291-2341

          DRBG of QTI Cryptographic Module on Crypto 5 Core

          5.f4-64


          This cryptographic module implements block ciphers including AES, Triple-DES, hash functions SHA-1 and SHA-256, Message Authentication Code functions HMAC and CMAC and DRBG 800-90A.

            • Snapdragon 650 w/ Android 6.0.1
          9/29/2017
          • Counter:
            • Modes: AES-128
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Not Enabled
            • Prerequisite: AES #4792
          1664Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (shaavx)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/29/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: SHS #3931
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: HMAC #3194
          1663Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (shassse3)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/29/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: SHS #3930
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-512
            • Prerequisite: HMAC #3193
          1662SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          SafeLogic Sales
          na

          CryptoComply Server Engine

          2.1


          CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

            • Intel i7 w/ CentOS 7
          9/29/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4790
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3929
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3192
          1661MediaTek Inc.
          No.1, Dusing Rd. 1, Hsinchu Science Park
          Hsinchu, Taiwan 30078
          Taiwan

          William Cheng
          William.cheng@mediatek.com
          +1-858-731-9200
          Fax: +1-858-731-9201

          MingHsien Hsieh
          minghsien.hsieh@mediatek.com
          +886-3-567-0766
          Fax: +886-3-578-7610

          MTK CryptoCore V1.0 Secure Core

          MTK CryptoCoreV1.0 S Core


          The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

            • N/A
          9/26/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4789
          1660Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (shagen)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/26/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3925
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3189
          1659Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (aesni)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4787
          1658Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (aesgen)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4786
          1657Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (aesasm)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4784
          1656Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Linux Kernel crypto API (shaavx2)

          5.0


          Linux kernel crypto API implementation providing cryptographic services to software components executing as part of the Linux kernel.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          9/26/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3924
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3188
          1655Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Bhadresh Udani
          bhadresh.udani@hpe.com
          +91 9886399320

          Premnath M
          premnath.mangal@hpe.com
          +91 9845369405

          HPE BladeSystem c-Class Virtual Connect Firmware OpenSSL libcrypto Library 1.0.2j

          4.65 (Firmware)


          This is a standalone general-purpose cryptography library providing all necessary crypto functionality.

            • FreeScale MPC8535
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4777
          1654Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Hridya Valakkadavil Thilakan
          hridya-valakkadavil.thilakan@hpe.com

          Aprana Shrivastava
          aprana.shrivastava@hpe.com

          HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

          4.71 (Firmware)


          The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

            • PowerPC 440EPx
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4776
          1653FireEye, Inc.
          1440 McCarthy Boulevard
          Milipitas, CA 90655
          USA

          Steve Lanser
          steve.lanser@fireeye.com
          508-983-2505

          FireEye Cryptographic Implementation

          1.0


          The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

            • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4775
          1652Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux 6 NSS without AES-NI

          R6-1.0.0


          Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

            • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          9/26/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3918
          1651wolfSSL Inc
          10016 Edmonds Way
          Suite C-300
          Edmonds, WA 98020
          USA

          Todd Ouska
          todd@wolfssl.com
          503-679-1859

          Larry Stefonic
          larry@wolfssl.com
          206-369-4800

          wolfCrypt

          3.12.2


          wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

            • Intel® Xeon® E5335 w/ Windows Server 2012R2
            • Intel® Core™ i7-2640M w/ Windows 7 Professional SP1
          9/26/2017
          • Hash based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: SHS #3915
          1650IBM Corporation
          1787 Sentry Pkwy West
          Building 18, Suite 200
          Blue Bell, PA 19422
          USA

          Sandeep Singhal
          Sandeep.Singhal1@ibm.com
          215-664-1614

          OpenSSL for the IBM MaaS360 Cloud Extender

          2.91


          The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

            • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
          9/26/2017
          • Counter:
            • Modes: AES-128, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4771
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384
            • Prerequisite: SHS #3914
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384
            • Prerequisite: HMAC #3182
          1649Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          Cisco Security Crypto Virtual

          F6.0


          FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

            • Intel Xeon E series w/ ESXi 6.0
            • Intel Xeon E series w/ ESXi 5.5
          9/15/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4768
          1648Bomgar Corporation
          578 Highland Colony Parkway
          Paragon Centre, Suite 300
          Ridgeland, MS 39157
          USA

          Faye Santangelo
          FSantangelo@bomgar.com
          6016078322

          Bomgar Cryptographic Engine

          2.0.13 (Firmware)


          The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

            • Intel® Xeon E5-2640 v3
          9/15/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4767
          1647SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using assembler implementation for AES

          3.0


          This test covers assembler implementation of AES

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/15/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4766
          1646SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using AES-NI for AES

          3.0


          This test covers AES-NI implementation of AES

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/15/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4765
          1645SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using SSE3 implementation for SHA

          3.0


          This test covers SSSE3 implementation of SHA.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3911
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3179
          1644SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using generic C implementation

          3.0


          This test covers generic C implementation of multiple algorithms.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3910
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3178
          1643SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using AVX implementation for SHA

          3.0


          This test covers AVX implementation of SHA.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-384, SHA-512
            • Prerequisite: SHS #3909
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-384, SHA-512
            • Prerequisite: HMAC #3177
          1642SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE libgcrypt using AVX2 implementation for SHA

          3.0


          This test covers AVX2 implementation of SHA.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          9/8/2017
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-384, SHA-512
            • Prerequisite: SHS #3908
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-384, SHA-512
            • Prerequisite: HMAC #3176
          1641Lenovo Group Limited
          7001 Development Drive
          Morrisville, NC 27560
          USA

          James Takahashi
          jtakahashi2@lenovo.com
          503-643-8308

          Taylor Greenwood
          tgreenwood@lenovo.com
          515-450-7432

          Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

          1.0


          The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

            • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
          9/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4764
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3907
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3175
          1640Lenovo Group Limited
          7001 Development Drive
          Morrisville, NC 27560
          USA

          James Takahashi
          jtakahashi2@lenovo.com
          503-643-8308

          Taylor Greenwood
          tgreenwood@lenovo.com
          515-450-7432

          Lenovo OpenSSL Library for ThinkSystem (AES-NI and AVX+SSSE3 for SHA)

          1.0


          The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

            • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
          9/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4763
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3906
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #3174
          1639Lenovo Group Limited
          7001 Development Drive
          Morrisville, NC 27560
          USA

          James Takahashi
          jtakahashi2@lenovo.com
          503-643-8308

          Taylor Greenwood
          tgreenwood@lenovo.com
          515-450-7432

          Lenovo OpenSSL Library for ThinkSystem (SSSE3 Assembler for AES and SHA)

          1.0


          The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

            • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
          9/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4762
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: SHS #3905
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1
            • Prerequisite: HMAC #3173
          1638FireEye, Inc.
          1440 McCarthy Boulevard
          Milipitas, CA 90655
          USA

          Steve Lanser
          steve.lanser@fireeye.com
          508-983-2505

          FireEye SSL

          1.0 (Firmware)


          The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

            • Intel Xeon
            • Intel Xeon with ESXi 6.5
            • Intel Atom
            • AMD Opteron
          9/8/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled
            • Prerequisite: AES #4761
          1637VMware, Inc.
          3401 Hillview Ave
          Palo Alto, CA 94303
          USA

          Manoj Maskara
          mmaskara@vmware.com
          650-427-1000
          Fax: 650-475-5001

          Michael McKay
          mmckay@vmware.com
          650-427-3615
          Fax: 650-475-5001

          VMware BC-FJA (Bouncy Castle FIPS Java API)

          1.0.0


          The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

            • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
          9/1/2017
          • Counter:
            • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4760, TDES #2530
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3902
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3171
          1636Legion of the Bouncy Castle Inc.
          85 The Crescent
          Ascot Vale, Victoria 3032
          Australia

          David Hook
          dgh@bouncycastle.org
          +61438170390

          Jon Eaves
          jon@bouncycastle.org
          +61417502969

          Bouncy Castle FIPS Java API

          1.0.1


          The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

            • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
            • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
          9/1/2017
          • Counter:
            • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4759, TDES #2529
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Prerequisite: SHS #3901
          • HMAC based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
            • Prerequisite: HMAC #3170
          1635Software Diversified Services
          1322 81st Ave NE
          Minneapolis, MN 55432
          USA

          Tim Full
          cavp@sdsusa.com

          SDS Cryptographic Module

          1.0


          Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

            • Intel i7 with AES-NI w/ Windows Server 2012 R2
            • Intel i7 with AES-NI w/ Windows Server 2016
            • Intel i7 with AES-NI w/ RedHat 6.9
            • Intel i7 with AES-NI w/ RedHat 7.4
            • POWER8 w/ AIX 6.1
            • POWER8 w/ AIX 7.2
          9/1/2017
          • HMAC based:
            • Prediction Resistance Modes: Not Enabled
            • Modes: SHA-256
            • Prerequisite: HMAC #3167
          1634Gemalto
          20 Colonnade Road, Suite 200
          Ottawa, ON K2E7M6
          Canada

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Luna K7 Accelerated Cryptographic Library

          7.0.1 (Firmware)


          The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

            • PowerPC 476
          9/1/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function not used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4753
          1633A10 Networks, Inc.
          3 West Plumeria Drive
          San Jose, CA 95134
          USA

          John Chiong
          +1 408 325-8668

          A10 Networks Data Plane FIPS Software Library

          3.0.0 (Firmware)


          The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

            • Intel Xeon E3-1275v2 with AES-NI
            • Intel Xeon E5-1650v3 with AES-NI
            • Intel Xeon E5-2697v2 with AES-NI
            • Intel Xeon E5-2697v4 with AES-NI
          9/1/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4752
          1632Monkton, Inc
          2236 Central Ave
          Tysons, VA 22182
          USA

          Harold E. Smith III
          harold@monkton.io
          571-527-6680

          OpenSSL

          1.0.2L


          Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton's Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

            • Apple A10X w/ iOS 10.3.2
            • Apple A10 Fusion w/ iOS 10.3.2
          8/25/2017
          • Counter:
            • Modes: AES-256
            • Derivation Function States: Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4751
          1631SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          Ray Potter
          ray@safelogic.com
          650-646-1702

          CryptoComply Server Engine

          2.2


          CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

            • Intel Celeron w/ CentOS 7.3
          8/25/2017
          • Counter:
            • Modes: AES-128, AES-192, AES-256
            • Derivation Function States: Derivation Function not used, Derivation Function used
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Prerequisite: AES #4750
          • Hash based:
            • Prediction Resistance Modes: Enabled, Not Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3893
          • HMAC based:
            • Prediction Resistance Modes: Enabled
            • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: HMAC #3164
          1630ARM Ltd
          110 Fulbourn Road
          Cambridge CB1 9NJ
          United Kingdom

          Leo Dorrendorf
          leo.dorrendorf@arm.com
          +972-52-6818594
          Fax: +972-73-2558808

          Udi Maor
          udi.maor@arm.com
          +972-54-4205101
          Fax: +972-73-2558808

          ARM TrustZone Cryptocell 712 TEE

          CC 712 TEE


          ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

            8/25/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4749
            1629Ixia
            26601 W. Agoura Road
            Calabasas, California 91302
            USA

            Tom Casella
            NVSCertificationTeam@ixiacom.com
            703-288-0184

            NTO Crypto Library

            1.0.1-1 (Firmware)


            The NTO Crypto Library performs all cryptographic functionality for the NTO 7303 and Vision ONE appliances, including asymmetric key generation, symmetric encryption, hashing, digital signatures, and provides TLSv1.2 protocols and SNMPv3 privacy and authentication protocols.

              • Intel i7 3555LE
            8/25/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3891
            1628Nuvoton Technology Corporation
            No. 4, Creation Rd. III
            Hsinchu Science Park 300
            Taiwan, R.O.C.

            Yossi Talmi
            yossi.talmi@nuvoton.com
            +972-9-9702364
            Fax: +972-9-9702001

            Oren Tanami
            oren.tanami@nuvoton.com
            +972-9-9702390
            Fax: +972-9-9702001

            Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

            LAG019


            Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16

              • N/A
            8/25/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3890
            1627Samsung Electronics Co., Ltd.
            R5, Maetan 3-dong Yeongton-gu
            Suwon-si, Gyeonggi 443-742
            Korea

            JungHa Paik
            jungha.paik@samsung.com
            +82-10-8861-0858

            Brian Wood
            be.wood@samsung.com
            +1-973-440-9125

            Samsung Kernel Cryptographic Module

            1.7.1


            Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.

              • Samsung Exynos 7870 w/ Android 7.1 (Kernel 3.18)
            8/25/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3159
            1626Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Red Hat NSS Softoken (64 bit)

            5.0


            User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            8/25/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3885
            1625Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Red Hat NSS Softoken (32 bit)

            5.0


            User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

              • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
            8/25/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3884
            1624IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • SPARC T4 w/ Solaris(R) 11 64-bit
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4738
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3883
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3155
            1623IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • SPARC T4 w/ Solaris(R) 11 64-bit
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4737
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3882
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3154
            1622IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4736
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3881
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3153
            1621IBM Corporation
            1 New Orchard Road
            Armonk, NY 10504
            USA

            Peter Szczepankiewicz
            peter.s14@us.ibm.com
            757-689-0507
            Fax: 757-689-0507

            Rory Bray
            rory.bray@ca.ibm.com
            506-449-7810
            Fax: 506-449-7810

            libcrypto/openssl

            1.0.1e


            Main crypto provider for all standard QRadar functionality

              • Intel(R) Xeon(R) CPU E5-2650 w/ Red Hat Enterprise Linux Server release 6.7 (Santiago)
            8/25/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4735
            1620IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4734
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3879
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3151
            1619IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4733
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3878
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3150
            1618IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4732
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3877
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3149
            1617IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core without PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4731
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3876
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3148
            1616IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
            8/25/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4730
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3875
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3147
            1615IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
            8/18/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4729
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3874
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3146
            1613IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
            8/18/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4727
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3872
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3144
            1612IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
            8/18/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4726
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3871
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3143
            1611IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
            8/18/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4725
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3870
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3142
            1610IBM(R) Corporation
            Seabank Centre
            12 - 14 Marine Parade
            Southport, QLD 4215
            Australia

            Peter Waltenberg
            pwalten@au1.ibm.com
            +61 7 5552 4016
            Fax: +61 7 5571 0420

            ICC Algorithmic Core with PAAs

            8.6.0.0


            ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

              • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
            8/18/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4724
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3869
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3141
            1609Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100- OpenSSL-vSRX

            15.1X49-D100


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
            8/18/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3137
            1608Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100- Quicksec

            15.1X49-D100


            The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

              • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
            8/18/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3136
            1607DELL, INC
            5450 Great America Parkway,
            Santa Clara, CA 95054
            US

            Srihari Mandava
            srihari_mandava@dell.com

            Jeff Yin
            Jeff_Yin@Dell.com

            Dell OpenSSL Cryptographic Library

            2.4


            Dell OpenSSL Cryptographic Library v2.4 provides a variety of cryptographic services used by Dell's Data Center hardened Dell Networking OS management and routing features.

              • Intel Atom C2000 w/ Dell EMC Networking OS 10.3.1
            8/18/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4718
            1606CA Technologies Canada
            500-885 West Georgia St
            Vancouver, BC V6C 3G1
            Canada

            Alina Muresan
            mural05@ca.com
            604 235 8305

            Julia Kazakova
            kazju01@ca.com
            604-235-8354

            CA API Gateway Cryptographic Library - OpenSSL

            v9.2.00


            Provides cryptographic functionality for the CA API Gateway.

              • Intel Xeon w/ RHEL6 on VMware ESXi 5.5.0
              • Intel Xeon w/ RHEL6
            8/18/2017
            • Counter:
              • Modes: AES-128, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4429
            1605Forcepoint
            10900-A Stonelake Blvd.
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (3305) without AESNI

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
            8/18/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4716
            1604Yubico
            420 Florence St, Ste 200
            Palo Alto, CA 94301
            USA

            Jerrod Chong
            jerrod@yubico.com

            Jakob Ehrensvard
            jakob@yubico.com

            Yubico HW/FW DRBG

            SLE78CLUFX3000PH e58230b8 (Firmware)


            This module implements required SP800-90A hardware/firmware functions for instantiate, generate and reseed, including initial reseed from built-in hardware TRNG.

              • Infineon SLE78V2
            8/11/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4713
            1603Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-QuickSec

            15.1X49-D100 (Firmware)


            The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E5
            8/11/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3129
            1602Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-OpenSSL

            15.1X49-D100 (Firmware)


            The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E3
            8/11/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3128
            1601Trend Micro Inc.
            11305 Alterra Parkway
            Austin, TX 78758
            USA

            Paul Tucker
            paul_tucker@trendmicro.com
            512-633-7945

            TippingPoint Crypto Core OpenSSL

            2.0.13


            The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

              • Intel Core i3 without PAA w/ Linux 4.4
              • Intel Xeon with PAA w/ Linux 4.4
              • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4703
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3850
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3115
            1600SafeLogic, Inc.
            530 Lytton Ave
            Suite 200
            Palo Alto, CA 94301
            USA

            SafeLogic Inside Sales
            sales@safelogic.com
            (844) 436-2797

            CryptoComply Java Engine

            3.0.1


            CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

              • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
            8/11/2017
            • Counter:
              • Modes: 3KeyTDEA, AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4702, TDES #2494
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3849
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3114
            1599Allwinner Technology Co.,Ltd
            No.9 Technology Road 2, High-Tech Zone
            Zhuhai, Guangdong 519085
            China

            Qing Zhang
            qingzhang@allwinnertech.com
            +86-756-3818333
            Fax: +86-756-3818358

            Wei Guo
            guowei@allwinnertech.com
            +86-756-3818333
            Fax: +86-756-3818358

            Crypto Engine

            V2.0


            Crypto engine is implemented with Veilog HDL. It provides cryptographic functions.

              • N/A
            8/11/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3848
            1598Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2/AVX, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4700
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3847
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3112
            1597Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2/AVX, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4699
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3846
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3111
            1596Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2/AVX/AESNI, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4698
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3845
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3110
            1595Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2/AVX/AESNI, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4697
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3844
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3109
            1594Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4696
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3843
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3108
            1593Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2/AVX/AESNI/SSSE3, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4695
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3842
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3107
            1592LG Electronics, Inc.
            20 Yoido-dong
            Youngdungpo-gu
            Seoul 152-721
            Republic of Korea

            Jongseong Kim
            jongseong.kim@lge.com
            82-10-4535-0110
            Fax: 82-2-6950-2080

            LG BoringSSL

            2.0


            General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

              • Snapdragon 835 (MSM8998) w/ Android 7.1.2
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4691
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3841
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3106
            1591NetBrain Technologies, Inc
            15 Network Drive 2nd Floor
            Burlington, Massachusetts 01803
            United States

            Michael Passanisi
            Michael.Passanisi@netbraintech.com
            781-221-7199 (x2055)
            Fax: +1 (781) 998-5800

            Boyang Zhang
            boyang.zhang@netbraintech.com
            781-221-7199 (x2059)

            NetBrain OpenSSL Cryptographic Module

            1.0


            The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

              • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4690
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3840
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3105
            1590Taisys Technologies Co. Ltd.
            7F., No.56, Lane 321
            Yangguang St., Neihu Dist.
            Taipei, Taipei 11491
            Taiwan (R.O.C.)

            Joe Wang
            joe.wang@taisys.com
            +886-2-26270927x6699
            Fax: +886-2-26270619

            Kent Horng
            kent.horng@taisys.com
            +886-2-26562185 #206
            Fax: +886-2-26579657

            TAISYS JUISE-S2

            ST33G1M2


            The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

              • N/A
            8/11/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3838
            1589BiObex, LLC
            11501 Sunset Hills Rd
            Suite 200
            Reston, VA 22190
            USA

            Arthur Joyce
            ajoyce@biobex.com
            571-313-0969

            SAFE-Key device

            1.1.0.0 (Firmware)


            The SAFE-Key device is a USB-based hardware token; its primary purpose is two-factor authentication. The device supports three modalities: web-based two-factor authentication, two-factor authentication for protected file decryption and two-factor authentication for digital signature generation.

              • STM32F415
            8/11/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3837
            1588Sonus Networks, Inc.
            4 Technology Park Drive
            Westford, MAS 01886
            USA

            Keith Conger
            kconger@sonusnet.comkconger@sonusnet.com
            978-614-8115

            Adam Elshama
            aelshama@sonusnet.com
            978-614-8327

            Sonus Cryptographic Library version 3.0

            5.1.2


            Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

              • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
            8/11/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4686
            1587Motorola Solutions Inc
            1301 East Algonquin Road
            Schaumburg, IL 60196
            USA

            Amalendu Roy
            aroy@motorolasolutions.com
            888-325-9336

            Ken Fuchs
            Ken.Fuchs@motorolasolutions.com
            888-325-9336

            Motorola Solutions Cryptographic Software Module

            libALG_R01.03.00


            The module is a comprehensive suite of FIPS Approved and non-Approved algorithms and delivered to the end customer(s) as a Dynamically Linked Library (DLL) which is the logical boundary of the cryptographic module. The module provides cryptographic functionalities in Motorola Solutions ASTRO IP Dispatch Console products.

              • Intel Core i7-6820HQ CPU w/ Microsoft Windows 10 Professional Version 10.0.14393
              • Intel Core i7-6820HQ CPU w/ Microsoft Windows 7 Professional Version 6.1.7601 Service Pack 1
            8/11/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4683
            1586SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using C implementation of SHA

            2.0


            The test covers implementations of sha1-generic, sha224-generic, sha256-generic,, sha384-generic,, sha512-generic,.

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            8/4/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3833
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3098
            1585SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using CPACF for AES core, TDES core and SHA

            2.0


            This test covers the implementations of gcm_base(ctr(aes-s390),ghash-generic), ccm_base(ctr(aes-s390),aes-s390), cbc(aes-s390), ecb(aes-s390), xts(aes-s390), kw(aes-s390), cmac(aes-s390),cbc(des3_ede-s390), ctr(des3_ede-s390), ecb(des3_ede-s390), cmac(des3_ede-s390), sha1-s390, sha224-s390, sha256-s390, sha384-s390, sha512-s390.

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4682
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3832
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3097
            1584SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using C implementation of AES

            2.0


            The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic).

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4681
            1583Cisco Systems, Inc.
            170 W Tasman Dr
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            CiscoSSL FIPS Object Module

            6.0 (Firmware)


            The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Intel Xeon on VMware ESXi 5.5
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4680
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3831
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3096
            1582SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using CPACF for AES, TDES and GHASH

            2.0


            This test covers implementations of gcm_base(ctr-aes-s390,ghash-s390), ccm_base(ctr-aes-s390,aes-s390), cbc-aes-s390, ecb-aes-s390, xts-aes-s390, cbc-des3_ede-s390, ecb-des3_ede-s390, ctr-des3_ede-s390.

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4677
            1581Cisco Systems, Inc.
            170 W Tasman Dr
            San Jose, CA 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            CiscoSSL FIPS Object Module

            6.0 (Firmware)


            The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Intel Xeon
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4676
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3830
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3095
            1580ForeScout
            190 West Tasman Drive
            San Jose, CA 95134
            USA

            Ayelet Kutner
            cavp@forescout.com

            BC-FJA (Bouncy Castle FIPS Java API)

            1.0.0


            The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

              • Intel Celeron J1900 w/ CentOS 6.6
            8/4/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256
              • Prerequisite: SHS #3827
            1579Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4667
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3824
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3091
            1578Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (no AVX2, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4666
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3823
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3090
            1577RSA, The Security Division of EMC
            174 Middlesex Turnpike
            Bedford, MA 01730
            USA

            Rohit Mathur
            rohit.mathur@rsa.com
            +61730325220

            RSA BSAFE Crypto-C Micro Edition

            4.1.3.2


            RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

              • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4665
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3089
            1576Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (Full CPU set, x86_64, 32-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4664
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3821
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3088
            1575Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            GnuTLS_x86_64_C

            5.0


            GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

              • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4585
            1574Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            GnuTLS_x86_C

            5.0


            GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

              • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4584
            1573Nokia
            600 March Rd
            Ottawa, Ontario K2K 2E6
            Canada

            Hooman Bidgoli
            hooman.bidgoli@nokia.com
            +1 613 784 5351

            Peter Merriman
            peter.merriman@nokia.com
            +1 613 784 3045

            Nokia 7705 SAR OS Non Datapath Cryptographic Library

            2 (Firmware)


            The Nokia 7705 SAR OS Non Datapath Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

              • Cavium Octeon Plus
            8/4/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4657
            1572Nokia
            600 March Rd
            Ottawa, Ontario K2K 2E6
            Canada

            Hooman Bidgoli
            hooman.bidgoli@nokia.com
            +1 613 784 5351

            Peter Merriman
            peter.merriman@nokia.com
            +1 613 784 3045

            Nokia 7705 SAR OS Cryptographic Library

            2 (Firmware)


            The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

              • Cavium Octeon Plus
            8/4/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4656
            1571Nokia
            600 March Rd.
            Ottawa, Ontario k0A 2Z0
            Canada

            Hooman Bidgoli
            hooman.bidgoli@nokia.com
            +1 613 784 5351

            Peter Merriman
            peter.merriman@nokia.com
            +1 613 784 3045

            Nokia 7705 SAR OS Cryptographic Library

            2 (Firmware)


            The Nokia 7705 SAR OS Cryptographic Library is used on the Nokia 77705 Service Aggrigation Router

              • Cavium Octeon II
            8/4/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4655
            1570Evertz Microsystems
            5292 John Lucas Dr.
            Burlington, Ontario L7L 5Z9
            Canada

            Bruce Mathews
            brucematthews@evertz.com
            540-778-3287

            IPX OpenSSL Cryptographic Module

            2v0_b1 (Firmware)


            Card for 6RU Shelf loaded with Evertz IPX

              • MPC8377E
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4652
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256
              • Prerequisite: SHS #3811
            1569Evertz Microsystems
            5292 John Lucas Dr.
            Burlington, Ontario L7L 5Z9
            Canada

            Bruce Matthews
            BruceMatthews@evertz.com
            540-778-3287

            MAGNUM OpenSSL Cryptographic Module

            1.16.0 (Firmware)


            1RU Server loaded with Evertz MAGNUM control

              • Intel Xeon
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4651
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256
              • Prerequisite: SHS #3810
            1568Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux 7 NSS without AES-NI

            R7-2.0.0


            Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

              • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            8/4/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3808
            1567Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            OpenSSL (Full CPU set, x86_64, 64-bit library)

            5.0


            The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

              • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4644
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3807
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3076
            1566wolfSSL Inc
            10016 Edmonds Way
            Suite C-300
            Edmonds, WA 98020
            USA

            Todd Ouska
            todd@wolfssl.com
            503-679-1859

            Larry Stefonic
            larry@wolfssl.com
            206-369-4800

            wolfCrypt

            3.11.2


            wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

              • NXP i.MX6 Quad w/ Android Dalvik 4.2.2
              • NXP i.MX50 (Device Tree Support) w/ Linux 4.1.15
            8/4/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3806
            1565DocuSign, Inc.
            221 Main St.
            Suite 1000
            San Francisco, CA 94105
            USA

            Ezer Farhi
            ezer@arx.com
            972-39279529
            Fax: 972-39230864

            Moshe Harel
            Moshe.Harel@docusign.com
            972-3-9279578
            Fax: 972-3-9230864

            PrivateServer

            5.0.2 (Firmware)


            PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

              • Intel Xeon Quad-Core
            8/4/2017
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3073
            1564Feitian Technologies Co., Ltd.
            Floor 17, Tower B, Huizhi Mansion
            No.9 Xueqing Road
            Haidian, Beijing 100085
            China

            PENG Jie
            pengjie@ftsafe.com
            +8610 62304466-419
            Fax: +8610 62304477

            WenSheng Ju
            wensheng@ftsafe.com
            +8610 62304466-527
            Fax: +8610 62304477

            DRBG

            1.0 (Firmware)


            DRBG is implemented following SP800-90A, CTR DRBG. Its crypto algorithm is 3DES. The seeding implementation uses Derivation function.

              • M7893 (Infineon Technologies AG SLx78)
            8/4/2017
            • Counter:
              • Modes: 3KeyTDEA
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: TDES #1899
            1563Trusted Concepts
            205 Van Buren St
            Suite 440
            Herndon, VA 20170
            USA

            Chris Greenlee
            chris.greenlee@trustedconcepts.com
            202.680.3718

            TrustedKeep Encryption Module

            1.8.3


            TrustedKeep is a secure object storage and sharing solution.

              • Intel Core i7 w/PAA w/ CentOS 7.3
              • Intel Core i7 w/o PAA w/ CentOS 7.3
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4637
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3801
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3070
            1562Security First Corp.
            29811 Santa Margarita Parkway
            Suite 600
            Rancho Santa Margarita, CA 92688
            USA

            Rick Orsini
            rorsini@securityfirst.com
            949-585-7525
            Fax: 949-858-7092

            Secure Parser Library

            4.7.1.10


            The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library

              • Intel Atom x5 on GETAC MX50 w/ Android 5.1.1
            8/4/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4636
            1561wolfSSL Inc
            10016 Edmonds Way
            Suite C-300
            Edmonds, WA 98020
            USA

            Todd Ouska
            todd@wolfssl.com
            503-679-1859

            Larry Stefonic
            larry@wolfssl.com
            206-369-4800

            wolfCrypt

            3.11.2


            wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

              • Intel Xeon 1275v3 w/ Debian 8.8
            8/4/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3799
            1560Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-QuickSec

            15.1X49-D100 (Firmware)


            The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E3
            8/4/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3067
            1559Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Pradeepa M R
            pradeepam@juniper.net

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            JUNOS FIPS Version 15.1X49-D100-OpenSSL

            15.1X49-D100 (Firmware)


            The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

              • Intel Xeon E5
            8/4/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3066
            1558Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Titan Key FIPS officer
            titan-key-fips-officer@google.com

            Titan Key

            1.0


            Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

              • N/A
            7/28/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #3065
            1557Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Oracle Security Evaluations
            Seceval_us@oracle.com
            +1.800.392.299

            Chris Brych
            +1 613.216.3078

            Oracle ILOM OpenSSL FIPS Object Module

            2.0.10


            Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 140-2 as a software module, multichip standalone module

              • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
              • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
              • Oracle ILOM SP V4 (ARM V5) without PAA w/ Oracle ILOM OS v3.0
            7/28/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4629
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3793
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3064
            1556Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

            10.0.15063


            The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            7/28/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4627
            1555Microsoft Corporation
            One Microsoft Way
            Redmond, WA 98052-6399
            USA

            Mike Grimm
            FIPS@microsoft.com
            800-Microsoft

            Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

            10.0.15063


            The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
              • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
              • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
              • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
              • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
              • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
              • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
              • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
              • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
              • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            7/21/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4624
            1554Hewlett-Packard Development Company, L.P.
            11445 Compaq Center Drive W
            Houston, TX 77070
            USA

            Timothy McDonough
            timothy.mcdonough@hpe.com

            Hewlett Packard Enterprise SSL Crypto Module Engine

            2.1


            Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

              • ARM i.MX6 w/ Yocto Linux 3.0.35
            7/21/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4624
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3790
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3061
            1553SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using AES, SHA and GHASH from CPACF

            3.0


            This test covers CPACF implementation of AES, SHA and GHASH.

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4623
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3789
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3060
            1552SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

            3.0


            This test covers assembler implementation of AES, SHA and GHASH.

              • z13 w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4622
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3788
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3059
            1551SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using SSSE3 for SHA

            2.0


            The test covers implementations of sha1-ssse3, sha224-ssse3, sha256-ssse3, sha384-ssse3, sha512-ssse3.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3786
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3058
            1550SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using C implementation of SHA

            2.0


            The test covers implementations of sha1-generic, sha224-generic, sha256-generic, sha384-generic, sha512-generic.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3785
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3057
            1549SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using AVX2 for SHA

            2.0


            The test covers implementations of sha1-avx2, sha224-avx2, sha256-avx2, sha384-avx2, sha512-avx2.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3784
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3056
            1548McAfee, Inc.
            2821 Mission College Blvd.
            Santa Clara, CA 95054
            USA

            Mark Hanson
            Mark_Hanson@McAfee.com
            972-963-7326

            McAfee NSP NS Crypto Lib

            2.0.5_8.1.17.30 (Firmware)


            Cryptographic services for the McAfee NSP Intrusion Prevention appliances

              • Intel Xeon E5 Family
              • Intel Atom C Family
            7/21/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4619
            1547SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernle Crypto API using AVX for SHA

            2.0


            The test covers implementations of sha1-avx, sha224-avx, sha256-avx, sha384-avx, sha512-avx.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3782
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3054
            1546SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using AES_NI for AES core and CLMUL for GHASH

            2.0


            The test covers implementations of gcm_base(ctr-aes-aesni,ghash-clmulni), ccm_base(ctr-aes-aesni,aes-aesni), cbc(aes-aesni), ecb(aes-aesni), xts(aes-aesni), kw(aes-aesni), cmac(aes-aesni).

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4614
            1545SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using strict assembler for AES core

            2.0


            This test covers the implementations of gcm_base(ctr(aes-asm),ghash-generic), ccm_base(ctr(aes-asm),aes-asm), cbc(aes-asm), ecb(aes-asm), xts(aes-asm), kw(aes-asm), cmac(aes-asm).

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4611
            1544SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            Kernel Crypto API using C implementation of AES

            2.0


            The test covers implementations of gcm_base(ctr(aes-generic), ghash-generic), ccm_base(ctr(aes-generic),aes-generic), cbc(aes-generic), ecb(aes-generic), xts(aes-generic), kw(aes-generic), cmac(aes-generic).

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/21/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4608
            1543Fortinet Inc.
            1090 Kifer Road
            Sunnyvale, CA 94086-5301
            USA

            Alan Kaye
            akaye@fortinet.com
            613-225-9381 x7416
            Fax: 613-225-9951

            Fortinet FortiOS RBG Cryptographic Library

            5.4 (Firmware)


            This document focuses on the firmware implementation of the Fortinet FortiOS RNG Cryptographic Library v5.4 running on Intel x86 compatible processors.

              • ARM v5 Compatible (SoC2)
              • ARM v7 Compatible (SoC3)
              • Intel Celeron
              • Intel Xeon E5
              • Intel i3
              • Intel i5
              • Intel i7
            7/14/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #200928-0-N-00
            1542Hewlett Packard Enterprise
            1160 Enterprise Way
            Sunnyvale, CA 94089
            USA

            Indra Fitzgerald
            indra.fitzgerald@hpe.com
            541-360-6218

            HPE Atalla Cryptographic Subsystem

            1.20 (Firmware)


            The Atalla Cryptographic Subsytem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities.

              • Cavium Octeon III CN73xx, 16 cores, 1.8 Ghz
            7/14/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4600
            1541Symantec Corporation
            350 Ellis Street
            Mountain View, CA 94043
            USA

            Ian Hall
            Ian_hall@symantec.com
            703-598-6876

            Diana Robinson
            diana_robinson@symantec.con
            845-454-6397

            SG VA Cryptograpchic Library

            4.1.1


            The SG VA Crypto Library provides the necessary cryptographic services developed specifically for use in the Secure Web Gateway appliance line.

              • Intel Xeon E5 Broadwell on VMWare ESXi v6.0 w/ SGOS 6.7
            7/14/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4596
            1540SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using AES-NI for AES, and PCLMULQDQ for multiplication and GHASH

            3.0


            This test covers AES-NI for AES, and PCLMULQDQ for multiplication and GHASH.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4595
            1539SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using SHA assembler

            3.0


            This test covers generic assembler implementation of SHA.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3771
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3045
            1538SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using SSSE3 for SHA

            3.0


            This test covers SSSE3 implementation of SHA-1, SHA-224, SHA-256.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256
              • Prerequisite: SHS #3770
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256
              • Prerequisite: HMAC #3044
            1537SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using AVX for SHA

            3.0


            This test covers AVX implementation of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3769
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3043
            1536SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using AVX2 for SHA

            3.0


            This test covers AVX2 implementation of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3768
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3042
            1535SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using SSSE3 for Constant Time assembler and Bit Slice AES, and PCLMULQDQ for GHASH

            3.0


            This test covers OpenSSL using SSSE3 for Constant Time assembler and Bit Slice AES, and PCLMULQDQ for GHASH.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4594
            1534Forcepoint LLC
            10900-A Stonelake Blvd
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (3305)

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
            7/14/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4593
            1533Forcepoint LLC
            10900-A Stonelake Blvd
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (2105)

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
            7/14/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4592
            1532Forcepoint LLC
            10900-A Stonelake Blvd
            Ste. 350
            Austin, TX 78759
            USA

            Klaus Majewski
            legal@forcepoint.com
            1-858-320-8000

            Jorma Levomäki
            legal@forcepoint.com
            1-858-320-8000

            Forcepoint NGFW Cryptographic Library Module (325)

            2.0


            Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

              • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
            7/14/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4591
            1531SUSE, LLC
            10 Canal Park, Suite 200
            Cambridge, MA 02141
            USA

            Andreas Stieger
            astieger@suse.com
            +49 911 74053 384

            Thomas Biege
            thomas@suse.de
            +49 911 74053 500

            SUSE OpenSSL using AES assembler for AES, and PCLMULQDQ for GHASH

            3.0


            This test covers AES assembler for AES, and PCLMULQDQ for multiplication and GHASH.

              • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
            7/14/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4588
            1530IBM Corporation
            2455 South Road
            Poughkeepsie, New York 12601-5400
            USA

            John Monti
            jmonti@us.ibm.com
            845-435-4164

            IBM z/OS(R) Cryptographic Services ICSF PKCS #11

            OA52336


            ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

              • IBM z13 w/ IBM z/OS(R) v2.2
            7/8/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-512
              • Prerequisite: SHS #3761
            1529Cisco Systems, Inc
            170 W Tasman Drive
            San Jose, California 95134
            USA

            Clint Winebrenner
            cwinebre@cisco.com
            919.392.6250

            IOS Common Cryptographic Module (IC2M)

            Rel5 (Firmware)


            The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

              • MIPS64
              • Intel Atom
              • Intel Xeon on ESXi 5.5
              • PPC405
              • PPCe500
              • PPCe5500
              • Intel Core i3
              • Intel Pentium
              • Intel Xeon
              • PPC465
            7/8/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4583
            1528Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Libgcrypt (C implementations) Intel x86 32 bit

            5.0


            Libgcrypt (C implementations) Intel x86 64 bit

              • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
            7/8/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4581
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3757
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3031
            1527Red Hat, Inc.
            100 E. Davie Street
            Raleigh, NC 27601
            USA

            Jaroslav Reznik
            jreznik@redhat.com

            Libgcrypt (C implementations) Intel x86 64 bit

            5.0


            Libgcrypt (C implementations) Intel x86 64 bit

              • Intel x86 64 bit w/ Red Hat Enterprise Linux 7.4
            7/8/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4580
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3756
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3030
            1526IBM Corporation
            2455 South Road
            Poughkeepsie, New York 12601-5400
            USA

            John Monti
            jmonti@us.ibm.com
            845-435-4164

            Alyson Comer
            comera@us.ibm.com
            607-429-4309

            IBM(R) z13(TM) CP Assist

            FC 3863 EC P00339 Drv 27I


            The IBM z System(TM) CP Assist for Cryptographic Function (CPACF) provides processor-integrated hardware acceleration for TDES, AES, DRBG and SHA variants.

              • N/A
            7/8/2017
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-512
              • Prerequisite: SHS #3661
            1525L3 Communications Canada / Targa Systems Division
            2081 Merivale Road
            Ottawa, ON K2G1G9
            Canada

            Dave Saunders
            Dave.Saunders@l-3com.com
            613-727-9876
            Fax: 613-727-1705

            Series 4 Gen 3 DTU

            1.0.0-32004093 (Firmware)


            Network Attached Storage device with removable storage.

              • Freescale P1022
            7/8/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3755
            1524Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            Madhu Mathiyalagan
            madhu.mathiyalagan@oracle.com
            (781) 578-7514

            Chris Brych
            chris.brych@oracle.com
            (613) 216-3078

            Oracle Acme Packet OpenSSL Cryptographic Library

            ECz 7.5.0


            The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
            7/8/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4577
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1
              • Prerequisite: SHS #3754
            1523F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4576
            1522F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES-NI and SHA SSSE3

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v3 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4575
            1521F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES-NI and SHA SSSE3

            12.1.3.4


            Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4574
            1520F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v3 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4573
            1519F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4572
            1518F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AESNI and SHA SSSE3

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4571
            1517F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4570
            1516F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES-NI and SHA SSSE3

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4569
            1515F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-1650 v4 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4568
            1514F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES-NI and SHA SSSE3

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-1650 v4 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4567
            1513F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES and SHA assembler

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-1630 v4 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4566
            1512F5 Networks
            401 Elliott Avenue West
            Seattle, WA 98119
            USA

            Maryrita Steinhour
            m.steinhour@f5.com
            206-272-7351

            Ravi Kasinadhuni
            R.Kasinadhuni@f5.com
            206-272-7467

            Crypto for BIG-IP with AES-NI and SHA SSSE3

            12.1.3.4


            Cryptographic library offering various cryptographic mechanisms to BigIP product.

              • Intel E5-1630 v4 w/ BIG-IP 12.1.3.4
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4565
            1511Futurex
            864 Old Boerne Road
            Bulverde, TX 78163
            USA

            Futurex Security Certifications
            certifications@futurex.com
            830-980-9782

            OpenSSL

            6.2.0.0 (Firmware)


            The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

              • TI AM3352
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4564
            1510NetApp, Inc.
            495 East Java Drive
            Fourth Floor
            Sunnyvale, CA 94089
            USA

            Mike Scanlin
            Michael.Scanlin@netapp.com
            919.476.8578
            Fax: 919.476.4272

            NetApp Cryptomod

            2.0


            NetApp CryptoMod will be integrated into select NetApp ONTAP releases for the purpose of supporting FIPS 140-2 compliant data-at-rest encryption and key management.

              • Intel Xeon E5 w/ Data ONTAP 9.2
              • Intel Xeon E5 w/ Data ONTAP 9.2 without PAA
            6/23/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4563
            1509Cisco Systems, Inc.
            170 West Tasman Drive
            San Jose, CA 95134
            USA

            Kelvin Desplanque
            kdesplan@cisco.com
            6137887216

            CiscoSSL FIPS Object Module

            6.0 (Firmware)


            The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

              • Intel Xeon
            6/23/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4561
            • Hash based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3739
            • HMAC based:
              • Prediction Resistance Modes: Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #3013
            1507Google, Inc.
            1600 Amphitheatre Parkway
            Mountain View, CA 94043
            USA

            Adam Langley
            security@chromium.org

            BoringCrypto

            24e5886c0edfc409c8083d10f9f1120111efd6f5


            A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

              • POWER9 w/ Ubuntu Linux 17.04
              • POWER8 w/ Ubuntu Linux 17.04
              • Intel Xeon E5 w/ Ubuntu Linux 16.04
              • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
              • POWER8 without PAA w/ Ubuntu Linux 15.04
            6/21/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4558
            1506Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN9000 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • ARM Cortex A9
            6/21/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3734
            1505Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN6000 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel ATOM
            6/21/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3733
            1504Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
            312 Kings Way
            South Melbourne, Victoria 3205
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN8000 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel Xeon
            6/21/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3732
            1503Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

            3.0.1 (Firmware)


            The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • ARM Cortex A9
            6/21/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3731
            1502Symantec Corporation
            305 Ellis Street
            Mountain View, CA 94043
            USA

            Ian Hall
            Ian_hall@symantec.com
            703-598-6876

            Diana Robinson
            diana_robinson@symantec.con
            845-454-6397

            SGOS Cryptographic Library

            4.1.1


            The SGOS Crypto Library provides the necessary cryptographic services to a proprietary operating system (SGOS 6.7) developed specifically for use in the ProxySG, Reverse Proxy and ASG.

              • Intel Xeon E5 Ivy Bridge w/ ASG 6.7
              • Intel Xeon E5 Sandy Bridge w/ SGOS 6.7
              • Intel Xeon E5 Ivy Bridge w/ SGOS 6.7
              • Intel Xeon E5 Broadwell w/ SGOS 6.7
            6/21/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4552
            1501Ultra Electronics AEP
            419 Bridport Road
            Greenford, Middlesex UB6 8UA
            United Kingdom

            Paul Kettlewell
            paul.kettlewell@ultra-cis.com
            +44 (0) 208 813 4461

            Vicky Hayes
            vicky.hayes@ultra-cis.com
            +44 (0) 208 813 4649

            Advanced Configurable Crypto Environment v3

            011395 v3 r4 (Firmware)


            The AEP Networks Advanced Configurable Crypto Environment v3 (ACCEv3) provides highly secure cryptographic services and key storage. It is the foundation of a range of products including the Keyper Plus.

              • P2020 QorIQ
            6/16/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256, SHA-512
              • Prerequisite: SHS #3728
            1500Bivio Networks, Inc.
            4457 Willow Road, Suite 240
            Pleasanton, CA 94588
            USA

            Raj Srinivasan
            raj@bivio.net
            (925) 924-8608
            Fax: (925) 924-8650

            OpenSSL

            1.0.1e-51


            OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

              • Intel® Atom™ CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4549
            1499Oracle Communications
            100 Crosby Drive
            Bedford, MA 01730
            USA

            Madhu Mathiyalagan
            madhu.mathiyalagan@oracle.com
            (781) 578-7514

            Chris Brych
            chris.brych@oracle.com
            (613) 216-3078

            Oracle Acme Packet OpenSSL Cryptographic Library

            ECz 7.5.0 (Firmware)


            The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

              • Intel Atom C2358
              • Intel Xeon D-1548 (Intel Broadwell-DE)
            6/16/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4547
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-1
              • Prerequisite: SHS #3725
            1498DocuSign, Inc.
            221 Main St.
            Suite 1000
            San Francisco, CA 94105
            USA

            Ezer Farhi
            Ezer.Farhi@docusign.com
            972-3-9279529

            DocuSign-SA-Main

            8.4 (Firmware)


            DocuSign is a digital signature appliance that is connected to the organizational network and manages all signature keys and certificates of organization's end-users. End-users will connect securely to DocuSign from their PC for the purpose of signing documents and data.

              • Intel® Xeon Quad-Core
            6/16/2017
            • HMAC based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2999
            1497GE MDS, LLC
            175 Science Parkway
            Rochester, NY 14620
            USA

            Aaron Wright
            aaron.wright@ge.com
            585-242-8354
            Fax: 585-241-5590

            Alex Charissis
            alex.charissis@ge.com
            585-242-8402
            Fax: 585-241-5590

            Mocana DSF

            5.5 (Firmware)


            Cryptographic algorithm API and self-test routines implemented by Mocana, Inc.

              • Freescale IMX 6 (ARM)
            6/16/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4540
            1496GE MDS, LLC
            175 Science Parkway
            Rochester, NY 14620
            USA

            Aaron Wright
            aaron.wright@ge.com
            585-242-8354
            Fax: 585-241-5590

            Alex Charissis
            alex.charissis@ge.com
            585-242-8402
            Fax: 585-241-5590

            OpenSSL

            Fips-2.0.12 (Firmware)


            Open source Secure Sockets Layer cryptographic API and associated self-test routines.

              • Freescale IMX 6 (ARM)
            6/16/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4539
            1495Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

            R7-2.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4538
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3719
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2996
            1494Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

            R6-1.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4537
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3718
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2995
            1493Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL with AES and SHA1 assembler

            R7-2.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4536
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: SHS #3717
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: HMAC #2994
            1492Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL with AES and SHA1 assembler

            R6-1.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4535
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: SHS #3716
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: HMAC #2993
            1491Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL VPAES and SHA1 SSSE3

            R7-2.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4534
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: SHS #3715
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: HMAC #2992
            1490Oracle Corporation
            500 Oracle Parkway
            Redwood Shores, CA 94065
            USA

            Linda Gallops
            linda.gallops@oracle.com
            +1 704.972.5018
            Fax: +1 980.355.5399

            Chris Brych
            chris.brych@oracle.com
            +1 613.216.3078

            Oracle Linux OpenSSL VPAES and SHA1 SSSE3

            R6-1.0.0


            Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

              • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
            6/16/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4533
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: SHS #3714
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1
              • Prerequisite: HMAC #2991
            1489Palo Alto Networks
            4301 Great America Parkway
            Santa Clara, California 95054
            USA

            Richard Bishop
            rbishop@paloaltonetworks.com
            408-753-4000

            Jake Bajic
            jbajic@paloaltonetworks.com
            408-753-3901

            Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

            8.0 (Firmware)


            The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

              • Cavium Octeon MIPS64
              • Cavium MIPS64
              • Intel Multi Core Xeon
              • Intel Celeron
              • Intel i7
            6/9/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4532
            1488VMware, Inc.
            3401 Hillview Ave
            Palo Alto, CA 94303
            USA

            Manoj Maskara
            mmaskara@vmware.com
            650-427-1000
            Fax: 650-475-5001

            VMware VMkernel Cryptographic Module

            1.0


            The VMware VMkernel Cryptographic Module is a software cryptographic library that provides FIPS 140-2 approved cryptographic services for VMware products and platforms

              • Intel Xeon without PAA w/ VMWare ESXi 6.7
              • Intel Xeon with PAA w/ VMWare ESXi 6.7
            6/9/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4531
            1487Amazon Web Services, Inc.
            410 Terry Ave N
            Ste 1200
            Seattle, WA 98109-5210
            USA

            Kelvin Yiu
            kelvinyi@amazon.com

            Ken Beer
            nbeer@amazon.com

            AWS Key Management Service Cryptographic Algorithm Library

            1.0.0 (Firmware)


            The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

              • Intel Xeon E5-2640v4
            6/9/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4527
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3708
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2987
            1486Palo Alto Networks
            4301 Great America Parkway
            Santa Clara, California 95054
            USA

            Richard Bishop
            rbishop@paloaltonetworks.com
            408-753-4000

            Jake Bajic
            jbajic@paloaltonetworks.com
            408-753-3901

            Palo Alto Networks Crypto Module (PA VM-series)

            8.0


            The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

              • Intel Multi Core Xeon w/ VMware ESXi 5.5
              • Intel Multi Core Xeon w/ Centos 7.2 - KVM
              • Intel Multi Core Xeon w/ Hyper-V 2012 r2
              • Intel Multi Core Xeon w/ AWS EC2
              • Intel Multi Core Xeon w/ Azure
            6/2/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4526
            1485Hewlett Packard Enterprise Company
            3000 Hanover Street
            Palo Alto, CA 94304
            USA

            Luis Luciani
            luis.luciani@hpe.com
            281-518-6762

            Edward Newman
            edward.newman@hpe.com
            281-514-2713

            iLO SSL Firmware Crypto Library

            iLO 5 v1.11 (Firmware)


            HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

              • Cortex A9
            6/2/2017
            • Counter:
              • Modes: AES-128
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4525
            1484Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Hardware DRBG (A10)

            A10


            SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

              • N/A
            5/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4523
            1483Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Hardware DRBG (A9X)

            A9X


            SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

              • N/A
            5/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4522
            1482Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Hardware DRBG (A9)

            A9


            SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

              • N/A
            5/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4521
            1481Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Hardware DRBG (A8X)

            A8X


            SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

              • N/A
            5/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4520
            1480Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Hardware DRBG (A8)

            A8


            SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

              • N/A
            5/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4519
            1479Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple Hardware DRBG (A7)

            A7


            SP800-90A DRBG offered by the CPU for the Secure Enclave used by the Apple Key Store.

              • N/A
            5/26/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Enabled
              • Prerequisite: AES #4518
            1478Motorola Solutions Inc
            1301 East Algonquin Road
            Schaumburg, IL 60196
            USA

            Amalendu Roy
            aroy@motorolasolutions.com
            888-325-9336

            Ken Fuchs
            Ken.Fuchs@motorolasolutions.com
            888-325-9336

            Motorola Solutions Cryptographic Software Module

            libALG_R01.01.02


            The Crypto module is a comprehensive suite of FIPS Approved algorithms implemented in C and crossed compiled on Linux build server. The module is delivered to target application team as library which is the logical boundary of the cryptographic module.

              • Texas Instruments (TI) Code Composer Studio (CCS) V5.3 Simulator w/ Mentor Graphics Nucleus 3.0 (version 2013.08.1)
              • Texas Instruments (TI) Code Composer Studio (CCS) V5.3 Simulator w/ Texas Instruments (TI) DSP/BIOS 5.41.04.18
            5/19/2017
            • Counter:
              • Modes: AES-256
              • Derivation Function States: Derivation Function not used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4517
            1477Symantec Corporation
            350 Ellis Street
            Mountain View, CA 94043
            USA

            Jordan Saxonberg
            jordan_saxonberg@symantec.com
            424-750-7052
            Fax: 424-750-8107

            Symantec SymSSLf Cryptographic Module

            Intel Xeon 1.0.1


            Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

              • Intel Xeon with AES-NI w/ Windows 7 SP1
            5/19/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4516
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3704
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2983
            1476Symantec Corporation
            350 Ellis Street
            Mountain View, CA 94043
            USA

            Jordan Saxonberg
            jordan_saxonberg@symantec.com
            424-750-7052
            Fax: 424-750-8107

            Symantec SymSSLf Cryptographic Module

            Intel Xeon 1.0.1


            Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

              • Intel Xeon without AES-NI w/ Windows 7 SP1
            5/19/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4515
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3703
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2982
            1475TCL Communication Ltd.
            25 Edelman Suite 200
            Irvine, CA 92618
            USA

            Alain Perrier
            alain.perrier@blackberrymobile.com
            214-316-2312

            Nikhil Mhatre
            nikhil.mhatre@alcatelonetouch.com
            954-914-9952

            TCT Random Number Generator

            Snapdragon 625


            Snapdragon 625 Random Number Generator is a hardware random number generator that provides cryptographic functions through on-chip entropy sources and hash based DRBG.

              • N/A
            5/19/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3700, SHS #3702
            1474Intel Corporation
            2200 Mission College Blvd.
            Santa Clara, California 95054
            USA

            Mark Hanson
            mark.hanson@intel.com
            972.963.7326

            McAfee OpenSSL FIPS Object Module

            1.0.0


            The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

              • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
            5/19/2017
            • Counter:
              • Modes: AES-128, AES-192, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Prerequisite: AES #4511
            • Hash based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3699
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: HMAC #2980
            1473VT iDirect
            13681 Sunrise Valley Drive, Suite 300
            Herndon, VA 20171
            USA

            Chris Gormont
            CGormont@idirectgov.com
            703.880.6257

            iDirect Cloak Algorithm Module 1.0

            1.0.2.0 (Firmware)


            VT iDirect, Inc's firmware cryptographic library provides all cryptographic operations for the support of iDirect's Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data.

              • Altera Cyclone V
            5/12/2017
            • Hash based:
              • Prediction Resistance Modes: Not Enabled
              • Modes: SHA-256
              • Prerequisite: SHS #3698
            1472Guardtime
            5151 California Ave.
            Suite 210
            Irvine, CA 92617
            USA

            Christian Bravo
            christian.bravo@guardtime.com
            310-227-6558

            Guardtime Cryptographic Support Library (CSL) Direct

            1.0.0 (Firmware)


            Cryptographic library for Guardtime products.

              • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
              • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
            5/12/2017
            • Counter:
              • Modes: AES-128, AES-256
              • Derivation Function States: Derivation Function not used, Derivation Function used
              • Prediction Resistance Modes: Not Enabled
              • Prerequisite: AES #4508
            1471Flonidan A/S
            Islandsvej 29
            Horsens, Denmark DK-8700
            Denmark

            Tonny Frederiksen
            twf@flonidan.dk
            +45 75 61 88 88

            Kenneth Sørensen
            ks@flonidan.dk
            +45 75 61 88 88

            Flonidan Smart Meter mbedTLS Module

            2.4.0 (Firmware)


            Crypto module used in Flonidan smart meters

              • ARM Cortex
            5/12/2017
            • HMAC based:
              • Prediction Resistance Modes: Enabled, Not Enabled
              • Modes: SHA-256
              • Prerequisite: HMAC #2978
            1470Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            KC API using CPACF for AES, TDES and GHAS