Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

ECDSA Validation List

This list identifies implementations that have been validated as conforming to the Elliptic Curve Digital Signature Algorithm (ECDSA), as specified in Federal Information Processing Standard (FIPS) 186-2 with Change Notice 1 and FIPS 186-4, using tests described in the (186-2) Elliptic Curve Digital Signature Algorithm Validation System (ECDSAVS) and (186-4) Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS).

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of curve sizes providing less than 112 bits of security strength (P-192, K-163, and B-163), and the use of SHA-1 with Digital Signature Generation excluding use with protocols, is no longer approved.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, the use of RNGs specified in FIPS 186-2, [X9.31], and the 1998 version of [X9.62] as a prerequisite for validation testing is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
1542Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
312 Kings Way
South Melbourne, Victoria 3025
Australia

John Weston
john.weston@senetas.com
+61 3 9868 4555
Fax: +61 3 9821 4899

CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library

5.0.1 (Firmware)


The CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010, CN6140, CN9100 and CN9120 Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming. Interface (API) to support security relevant services.

    • ARM Cortex A9
9/14/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4560, DRBG #2302
1541Berryville Holdings, LLC
2465 Centerville Road
#J17-812
Herndon, VA 20171
USA

Cael Jacobs
cael@bvhllc.com
(703) 782-9840

Chava Jurado
chava@bvhllc.com
(703) 782-9840

Cryptographic Module for Fognigma

2.0.16


The Cryptographic Module for Fognigma is a general purpose cryptographic module integrated in the Fognigma platform to provide FIPS 140-2 validated cryptography for the protection of sensitive information. This module provides the cryptographic services that are used by the Fognigma platform to generate its Virtual Private Network (VPN)

    • ARM Cortex-A53 without PAA w/ Raspbian Stretch
    • Intel® Xeon E5 without PAA w/ Ubuntu 16.04
    • ARM Cortex-A53 with PAA w/ Raspbian Stretch
    • Intel® Xeon E5 with PAA w/ Ubuntu 16.04
9/14/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4559, DRBG #2301
1540Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

6.2 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Cavium Octeon CN7240
9/14/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4555, DRBG #2299
1539Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products.

    • N/A
9/14/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4554, DRBG #2298
1538Sonus Networks, Inc.
4 Technology Park Drive
Westford, MA 01886
USA

Adam Elshama
aelshama@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Keith Conger
KConger@rbbn.com
1-855-GO-SONUS
Fax: 978-614-8101

Sonus Cryptographic Library

3.1 (Firmware)


Sonus Session Border Controller FIPS-validated cryptographic software module

    • Intel Xeon (Ivy Bridge)
9/14/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4550, DRBG #2295
1537Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

6.2 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Intel Xeon E5-2609
9/7/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4546, DRBG #2294
1536Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

6.2 (Firmware)


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Intel Xeon E5-2680
9/7/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4545, DRBG #2293
1535NETSCOUT Systems, Inc.
310 Littleton Road
Westford, MA 01886
USA

Steve Swidrak
Stephen.Swidrak@netscout.com

NetScout FIPS Object Module

1.0


This cryptographic library provides cryptographic services to NETSCOUT products.

    • Intel Xeon X5620 with AES-NI w/ Linux 2.6.39.1
    • Intel Xeon E5 Series with AES-NI w/ Linux 3.7.5
    • Intel Xeon E5-2608L v3 with AES-NI w/ ArbOS 7.0
    • Intel Xeon E5-2697 v3 with AES-NI w/ Linux 3.10
9/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4543, DRBG #2291
1534Klas Telecom
1101 30th Street NW, Suite 500
Washington, DC 20007
USA

Toby Stidham
toby.stidham@klastelecom.com
352-406-0560

Cian Masterson
cian.masterson@klastelecom.com

OpenSSL 1.0.1h without a FIPS object module

1.0.1h


Vendor Crypto Library uses the native OpenSSL 1.0.1h patched to meet FIPS 186-4 requirements.

    • Marvell Prestera 98DX8212 w/ Linux 3.10.70
9/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4542, DRBG #2290
1533KeyPair Consulting Inc.
846 Higuera Street
Suite 2
San Luis Obispo, CA 93401
USA

Mark Minnoch
mark@keypair.us
805-316-5024

Steve Weymann
steve@keypair.us
805-316-5024

KeyPair Cryptographic Module for OpenSSL

2.0.16


The KeyPair Cryptographic Module for OpenSSL expands the list of Tested Configurations (operating system + processor) for the OpenSSL FIPS Object Module v2.0. Please contact KeyPair Consulting to include your desired operating system as a Tested Configuration on a FIPS 140-2 certificate branded in your company's name.

    • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 6
    • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 7
    • Intel Xeon E5-2430L (x86) with PAA w/ CentOS 7
    • Nvidia Tegra X1 with PAA w/ Android 8.1
    • Nvidia Tegra X1 without PAA w/ Android 8.1
    • Intel Xeon E5-2430L (x86) with PAA w/ Ubuntu 16.04
    • Intel Xeon E5-2430L (x86) without PAA w/ CentOS 6
    • Intel Xeon E5-2430L (x86) without PAA w/ Ubuntu 16.04
9/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4541, DRBG #2289
1532Extreme Networks
6480 Via Del Oro
San Jose, CA 95119
USA

Sunil Chitnis
schitnis@extremenetworks.com
408-352-2407

Joey Salanga
jsalanga@extremenetworks.com
408-352-2439

Extreme FIPS Cryptographic Library

2.1 (Firmware)


The Extreme cryptographic library implements crypto operations in software. This library is present in VDX switch. Applications running in the switch uses the cryptographic library for security and crypto operations.

    • Freescale E500mc
9/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4540, DRBG #2288
1531Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Kevin Meagher
kmeagher@ciena.com
1-410-865-8936

OpenSSL FIPS Object Module

2.0.12


Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

    • Cavium OCTEON II CN6xxx w/ SAOS 6.17
8/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-384 SHA: SHA-1, SHA-256, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4539, DRBG #2287
1530FP InovoLabs GmbH
Prenzlauer Promenade 28
Berlin, Berlin 13089
Germany

Janos Laube
j.laube@francotyp.com
+49 30 220660 397

Hasbi Kabacaoglu
h.kabacaoglu@francotyp.com
+49 30 220660 656

NpsdCrypto

N-PSD rev. 04 1.0 (Firmware)


nRevenector Cryptographic Library

    • Maxim MAX32590
8/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-256
        • P-256 SHA: SHA-256
      • Signature Verification:
        • P-224 SHA: SHA-256
        • P-256 SHA: SHA-256
      • Prerequisite: SHS #4538, DRBG #2286
1529Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Ahmer Sabri
ahmer@google.com
201-341-1408

Titan Cryptographic Library

1.0 (Firmware)


Firmware implementation of standard algorithms written in C and assembly.

    • ARM SC300 processor, with Dcrypto Coprocessor
8/27/2018
  • ECDSA:
    • 186-4:
      • Signature Verification:
        • P-256 SHA: SHA-256
      • Prerequisite: SHS #4537
1528Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 7 NSS without AES-NI

R7-2.0.0


Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
8/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4535, DRBG #2284
1527Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
securitycertifications@gemalto.com

SafeNet Cryptographic Library

1.0 (Firmware)


The SafeNet Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

    • Andretta 2.0
8/17/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Prerequisite: DRBG #2283
1526Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
securitycertifications@gemalto.com

SafeNet Accelerated Cryptographic Library

1.0 (Firmware)


The SafeNet Accelerated Cryptographic Library is a high-performance cryptographic library tailored to use the advanced security capabilities of the Andretta 2.0 Security ASIC.

    • Andretta 2.0
8/17/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4533, DRBG #2283
1525ECI Telecom Ltd
30 Hasivim Street
Petach Tikvah 49517
Israel

Milind Barve
milind.barve@ecitele.com
+91-80-67122000
Fax: +91-80-67122001

ECI (OS) Crypto Library

2.0.16


ECI (OS) Crypto Library

    • PowerPC w/ Linux
8/17/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4532, DRBG #2282
1524SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply Server Engine

2.1


SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel i7 w/ Windows Server 2012 R2
    • Intel i7 w/ Red Hat Enterprise Linux 7
8/17/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4531, DRBG #2281
1523IBM Corporation
1701 North Street
Endicott, NY 13760
USA

AIX FIPS Security
aixfips@in.ibm.com

AIX FIPS Crypto Module for OpenSSL

2.0.16


The AIX FIPS Crypto Module for OpenSSL is supported on AIX for the Power 7, Power 8 and Power 9 platforms.

    • IBM Power9 (PPC) without PAA w/ AIX 7.2 64-bit
    • IBM Power9 (PPC) with PAA w/ AIX 7.2 32-bit
    • IBM Power9 (PPC) with PAA w/ AIX 7.2 64-bit
    • IBM Power9 (PPC) without PAA w/ AIX 7.2 32-bit
8/17/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4530, DRBG #2280
1522Blue Cedar
325 Pacific Avenue
San Francisco, CA 94111
USA

FIPS Admin
fips@bluecedar.com
415-329-0401

Blue Cedar Cryptographic Module

2.0.16


The Blue Cedar Cryptographic Module is a general purpose cryptographic module integrated in Blue Cedar's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Nvidia Tegra X1 with PAA w/ Android 8.1
    • Nvidia Tegra X1 without PAA w/ Android 8.1
    • Intel Xeon E5 with PAA w/ Blue Cedar OS 1.0
    • Intel Xeon E5 without PAA w/ Blue Cedar OS 1.0
8/10/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4526, DRBG #2277
1521Q Core Medical Ltd.
29 Yad Harutsim St.
Netanya 4250529
Israel

Nimrod Schweitzer
nimrod.schweitzer@qcore.com
+972-73-2388839
Fax: +972-73-2388800

Lee Aydelotte
laydelotte@silexamerica.com
801-676-8673
Fax: 714-258-0730

QCore OpenSSL FIPS Object Module 2.0.9

2.0.9


QCore OpenSSL FIPS Object Module 2.0.9 is used within various QCore Infusion Pumps for providing secure communication between Infusion pumps and an external server.

    • NXP i.MX280 ARM w/ Linux 2.6.35
8/10/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4525, DRBG #2276
1520Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

66005f41fbc3529ffe8d007708756720529da20d


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • POWER9 with PAA w/ Ubuntu Linux 18.04
    • POWER9 without PAA w/ Ubuntu Linux 18.04
    • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
    • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
8/2/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4509, DRBG #2253
1519BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • ARMv8 w/ Android 8.1.2 on Venturi K502 Android tablet manufactured by Infomark
8/2/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4506, DRBG #2251
1518BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • ARMv8 w/ Android 6.0.1 on BlackBerry Priv
8/2/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4505, DRBG #2250
1517Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.2R1 XLP-MX104

Junos OS 18.2R1 (Firmware)


MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

    • Broadcom XLP432
8/2/2018
  • ECDSA:
    • 186-4:
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
1516Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.2R1 OpenSSL-MX104

Junos OS 18.2R1 (Firmware)


MX104 3D Universal Edge router is a modular, highly redundant, mobile back haul optimized full featured MX series platform built for space and power constrained service provider and enterprise facilities.

    • Freescale P5021
8/2/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4502, DRBG #2248
1515Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4499, DRBG #2246
1514Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4498, DRBG #2245
1513Toshiba Information Systems (UK) Limited
Toshiba Court,
Weybridge Business Park
Addlestone Road
Weybridge, Surrey KT15 2UL
United Kingdom

Simon Lawton
Simon.Lawton@Toshiba.co.uk
+44 07970 083133

Peter Hewson
Peter.Hewson@Toshiba.co.uk
+44 07881 096666

Toshiba GB SMIP Communications Hub SKU 7-12

12.13 (Firmware)


A secure messaging gateway between cellular or mesh wide-area networks and dual band (2.4GHz and sub-GHz) ZigBee home area networks. Part of GB smart metering deployment for energy meter control and data messages exchange between energy supplier or DNOs and customer metering and display devices.

    • ARM 11 core, version 958-B24
7/27/2018
  • ECDSA:
    • 186-4:
      • Signature Verification:
        • P-256 SHA: SHA-256
      • Prerequisite: SHS #4497
1512Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

3218c1db82718a54e4d41de493d006eaa3ba445c


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • POWER9 with PAA w/ Ubuntu Linux 18.04
    • Intel Xeon CPU E5-2680 with PAA w/ Debian Linux 4.9.0 (Rodete)
    • Intel Xeon CPU E5-2680 without PAA w/ Debian Linux 4.9.0 (Rodete)
    • POWER9 without PAA w/ Ubuntu Linux 18.04
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4496, DRBG #2244
1511Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4491, DRBG #2236
1510Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4490, DRBG #2235
1509Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit) - generic CPU

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E3 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4489, DRBG #2234
1508Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4488, DRBG #2233
1507Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (no AVX2, x86_64, 64-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4487, DRBG #2232
1506Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

OpenSSL (Full CPU set, x86_64, 32-bit library) - generic CPU

6.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

    • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4480, DRBG #2225
1505Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Bob Van Andel
bva@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Loren Shade
loren@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Allegro Cryptographic Engine using the EYL QRNG

6.31


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
    • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4478, DRBG #2224
1504Allegro Software Development Corporation
1740 Massachusetts Avenue
Boxborough, MA 01719
USA

Bob Van Andel
bva@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Loren Shade
loren@allegrosoft.com
978-264-6600
Fax: 978-266-1375

Allegro Cryptographic Engine

6.31


The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

    • Intel i7-6770HQ with AES-NI w/ Linux Mint 18
    • Intel i7-6770HQ without AES-NI w/ Linux Mint 18
7/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4477, DRBG #2223
1503Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certification Team
SecurityCertfications@gemalto.com

ProtectServer Internal Express Cryptographic Library

5 (Firmware)


The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
7/20/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4476, DRBG #1704
1502Entrust Datacard Corporation
Two Lincoln Centre
5420 LBJ Freeway Suite 300
Dallas, TX 75240
USA

John Gray
John.Gray@entrustdatacard.com

John Mahoney
John.Mahoney@entrustdatacard.com

Entrust Authority™ Security Toolkit for the Java® Platform EC 1.0

1.0


The Java toolkit is an implementation of cryptographic functions accessible by an object-oriented API. Depending on configuration, the algorithms may be implemented in software, hardware, or both. The industry standard Cryptopki API from PKCS #11 is used.

    • ThinkCenter M910T, Intel Core i7-7700 (3.60GHz, 8 MB), 64-bit w/ Microsoft Windows Server 2016 Standard Edition with Oracle J2RE 8
7/20/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4475, DRBG #2221
1501HP Inc.
11311 Chinden Blvd
Boise, Idaho 83714-0021
USA

Gerardo Colunga
gerardo.del.colunga@hp.com
208-333-5607

Chris Gunning
chris.gunning@hp.com
208-333-6785

HP FutureSmart QuickSec

5.1 (Firmware)


HP FutureSmart firmware for HP Enterprise SFPs, MFPs, and network scanners.

    • Arm Cortex-A8
7/20/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Prerequisite: SHS #4474, DRBG #2220
1500Curtiss-Wright Controls, Inc.
2600 Paramount Place, Suite 200
Fairborn, OH 45324
USA

Paul Davis
pdavis@curtisswright.com
937-252-5601 x 1363
Fax: 937-252-2729

Rich Langley
rlangley@curtisswright.com
937-610-5455
Fax: 937-252-1465

Curtiss-Wright Controls SW OpenSSL

6.0


The OpenSSL software implementation provides cryptographic functionality supporting the CentOS operating system.

    • Intel Atom E3845 w/ CentOS 7.5
    • Intel Core i5-4402E w/ CentOS 7.5
7/20/2018
  • ECDSA:
    • 186-4:
      • Signature Verification:
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4471
1499Nutanix
1740 Technology Drive, Suite 150
San Jose, CA 95110
USA

Eric Hammersley
fips@nutanix.com

Ashutosh Pangasa
fips@nutanix.com

Nutanix Cryptographic Library for OpenSSL

1.0


The Nutanix Cryptographic Library for OpenSSL is a comprehensive suite of FIPS Approved algorithms used for TLS, SSH, and other cryptographic functions.

    • Intel E5-2620 w/PAA w/ CentOS 7.4
7/20/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4465, DRBG #2216
1498Elster GmbH
Strothweg 1
Lotte (Buren) 49504
Germany

Michael Habermann
michael.habermann@honeywell.com
+49-541-1214-215
Fax: +49-541-1214-595

Markus Bölter
markus.boelter@honeywell.com
+49-541-1214-114
Fax: +49-541-1214-595

elster_cv

02.02.01 (Firmware)


elster_cv 02.02.01 is a cryptographic library to be used in residential gas meters.

    • STM32L152RE
7/20/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-256 SHA: SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-256
      • Prerequisite: SHS #4458, DRBG #2210
1497Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Bhanu Parlapalli
bhanu.parlapalli@gigamon.com

Gigamon Linux-Based Cryptographic Module

1.0 (Firmware)


The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

    • Intel Atom C Series
    • P2020
    • P2041
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4457, DRBG #2209
1496SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply Server Engine

2.1


SafeLogic's CryptoComply for Server is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel Atom Rangeley & Intel Xeon Broadwell w/ ArubaOS-CX 10.01
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4455, DRBG #2207
1495Sierra Nevada Corporation
444 Salomon Circle
Sparks, NV 89434
USA

Kevin Streander
Kevin.Streander@sncorp.com
303-566-9687
Fax: 775-331-0370

Red Hat OpenSSL (64bit)

5.0


The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high-level API of the OpenSSL library.

    • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4450, DRBG #2199
1494Sierra Nevada Corporation
444 Salomon Circle
Sparks, NV 89434
USA

Kevin Streander
Kevin.Streander@sncorp.com
303-566-9687
Fax: 775-331-0370

Red Hat NSS Softoken (64bit)

5.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64 bit word size.

    • Intel Atom (E3845) w/ Red Hat Enterprise Linux 7.4
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4449, DRBG #2198
1493Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Chunsheng Xie
chunsheng.xie@gigamon.com

Cavium OpenSSL Library

1.0.2d (Firmware)


The ECC CDH, ECDSA and TLS KDF cryptographic algorithms provided by Cavium OpenSSL Library provide data security across GigaSmart cards in Gigamon HC2 Appliance.

    • Cavium CN6880
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #2023, DRBG #296
1492Gigamon Inc.
3300 Olcott Street
Santa Clara, CA 95054
USA

Bhanu Parlapalli
bhanu.parlapalli@gigamon.com

Gigamon Linux-Based Cryptographic Module

1.0


The cryptographic algorithms provided by the library provide security across Gigamon Appliances.

    • P2020 w/ CentOS 5.8
    • P2041 w/ CentOS 5.8
    • Intel Atom C Series w/ CentOS 6.6
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4447, DRBG #2196
1491Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Allen Ting
yting@juniper.net
408-858-5008

Mounir Hahad
mhahad@juniper.net

CryptoCore

1.0


Cryptographic module to support the cryptographic functionalities for Juniper products.

    • Intel Core i5 w/ Ubuntu Linux 14.04
    • Intel Xeon (Virtual CPU) w/ Ubuntu Linux 14.04 on VMWare ESXi 6
    • Intel Xeon E5 family w/ Ubuntu Linux 14.04
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4446, DRBG #2195
1490BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.2


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ IBM Java 1.8 on Red Hat Enterprise Linux 7
    • Intel Xeon w/ Oracle JRE 1.8 on Windows Server 2016 on VMware ESX 6.5
    • Intel Xeon w/ Oracle JRE 1.8 on SUSE Linux Enterprise 11 on VMware 4.1.5
    • Intel Xeon w/ Oracle JRE 1.8 on Ubuntu Linux 16.04 on VMware ESX 4.1.5
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4445, DRBG #2194
1489Infosec Global Inc.
2225 Sheppard Avenue East
Suite 1402
Toronto, Ontario M2J 5C2
Canada

Brian Neill
brian.neill@infosecglobal.com
416-492-3333
Fax: 647-343-6933

Ian Laidlaw
ian.laidlaw@infosecglobal.com
416-492-3333
Fax: 647-343-6933

AgileSec FIPS Provider 1.0

1.0


AgileSec FIPS Module is a component of AgileSec SDK. It provides secure and optimized implementations of FIPS 140-2 approved cryptographic algorithms. The design of AgileSec SDK uses plug-and-play cryptographic providers, which are sets of cryptographic algorithms implemented to support various international or custom cryptographic standards.

    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Core i5 CPU with AES-NI w/ OSX 10.12
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Windows Server 2012 R2 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Freescale i.MX6 (ARMv7) w/ Linux colibri-imx6 4.1.41-2.7.3+g82f0f4f
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ FreeBSD 11.1-RELEASE-p1 on VMware ESX 6.5.0
    • Intel Core i5 CPU without AES-NI w/ OSX 10.12
    • Qualcomm Snapdragon 800 @ 2.26GHz without AES Acceleration w/ Android 8.1.0
    • Intel Xeon CPU ES-2630 v3 with AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Intel Xeon CPU ES-2630 v3 without AES-NI w/ Ubuntu 18.04 on VMware ESXi 6.5.0
    • Qualcomm Snapdragon 800 @ 2.26GHz with AES Acceleration w/ Android 8.1.0
7/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4441, DRBG #2192
1488Accellion, Inc.
1804 Embarcadero Road
Suite 200
Palo Alto, Ca 94303
USA

Frank Balonis
frank.balonis@accellion.com
650-485-4300

Sim Han Seah
hanseah@accellion.com
+65 6244 5678

Accellion Cryptographic Module

2.0.16


The Accellion Cryptographic Module is a general purpose cryptographic module integrated in Accellion’s products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ CentOS 6
    • Intel Xeon E5 with PAA w/ CentOS 6
7/6/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4440, DRBG #2191
1487SafeLogic, Inc.
530 Lytton Ave
Suite 200
Palo Alto, CA 94301
USA

SafeLogic Inside Sales
sales@safelogic.com
844-436-2797

CryptoComply for Java

3.0.1


SafeLogic's CryptoComply for Java is designed to provide FIPS 140-2 validated cryptographic functionality and is available for licensing.

    • Intel i7 w/ Java SE 8 on Windows Server 2012 R2
    • Intel i7 w/ Java SE 8 on Red Hat Enterprise Linux 7
7/6/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4439, DRBG #2190
1486Virtual Instruments
2331 Zanker Road
San Jose, CA 95131
USA

Susanta Pattanayak
Susanta.pattanayak@virtualinstruments.com
+1 408 579 4000

Jay Nitikman
Jay.nitikman@virtualinstruments.com
+1 408 579 4000

Virtual Instruments VirtualWisdom v5.7 Platform Appliance cryptographic library

v5.7 (Firmware)


The Virtual Instruments Platform Appliance Cryptographic Library provides the main cryptographic functionality for the VirtualWisdom Platform Appliance.

    • Intel Broadwell Xeon without AES-NI
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4436, DRBG #2189
1485Cisco Systems, Inc.
170 W. Tasman Drive
San Jose, CA 95134
USA

Global Certification Team
certteam@cisco.com

Adaptive Security Appliance (ASA)

9.6


The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

    • Intel Core i5 w/ ASA OS 9.6 w/ ESXi 6.0
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4435, DRBG #2188
1484Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Ingrid Barker
ibarker@juniper.net

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

18.1R1 - OpenSSL

18.1R1 (Firmware)


The QFX5200 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

    • Intel Xeon E312xx Sandy Bridge
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4432, DRBG #2184
1483Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - OpenSSL

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7020)
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4431, DRBG #2183
1482Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (3305)

6.4.1.20056.fips.8 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon E5
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4424, DRBG #2181
1481Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (2101)

6.4.1.20056.fips.8 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Xeon D
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4423, DRBG #2180
1480Forcepoint
10900-A Stonelake Blvd.
Ste. 350
Austin, TX 78759
USA

Klaus Majewski
legal@forcepoint.com
1-858-320-8000

Jorma Levomäki
legal@forcepoint.com
1-858-320-8000

Forcepoint NGFW Cryptographic Library Module (1101)

6.4.1.20056.fips.8 (Firmware)


Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

    • Intel Pentium D
6/29/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4422, DRBG #2179
1479Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

OpenSSL - EX4300

Junos OS 17.4 R1-S4 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
6/22/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4421, DRBG #2177
1478Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 17.4R1-S1 RE1800-OpenSSL

Junos OS 17.4 R1-S1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/22/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4409, DRBG #2169
1477Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 RE1800 - OpenSSL

Junos OS 18.1R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Intel Xeon (Jasper Forest Family)
6/22/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4416, DRBG #2173
1476Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 MX: MS MPC-XLP

Junos OS 18.1R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Broadcom XLP832
6/22/2018
  • ECDSA:
    • 186-4:
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4415
1475Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 17.4R1-S1 MX: MS MPC - XLP

Junos OS 17.4 R1-S1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

    • Broadcom XLP832
6/15/2018
  • ECDSA:
    • 186-4:
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4410
1474Silvus Technologies
10990 Wilshire Blvd.
STE 1500
Los Angeles, CA 90024
USA

Ajit Warrier
ajit@silvustechnologies.com
310-479-3333 ext 41
Fax: 310-479-2225

Weijun Zhu
weijun@silvustechnologies.com
310-479-3333 ext 27
Fax: 310-479-2225

Silvus Crypto Module

3.15.1 (Firmware)


The Silvus Crypto Library implements cryptographic functions for use in Silvus Technologies SC4000 Series mesh radios.

    • Xilinx Zynq-7000
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-521
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-384
        • P-384 SHA: SHA-1, SHA-384
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-384
        • P-384 SHA: SHA-1, SHA-384
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4406, DRBG #2167
1473CyberArk Software Ltd.
9 Hapsagot St. Park Ofer 2
P.O.B. 3143
Petach-Tikva 4951040
Israel

Yariv Oren
yariv.oren@gmail.com
+972-3-918-0000x2258
Fax: +972-3-924-0111

Elad Moshe
elad.moshe@cyberark.com
+972-3-918-0000x2378
Fax: +972-3-924-0111

CyberArk Privileged Account Security Cryptographic Library for Windows

1.0


The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

    • Intel Xeon E5 family w/ Windows Server 2012 R2 Datacenter
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4404, DRBG #2162
1472CyberArk Software Ltd.
9 Hapsagot St. Park Ofer 2
P.O.B. 3143
Petach-Tikva 4951040
Israel

Yariv Oren
yariv.oren@gmail.com
+972-3-918-0000x2258
Fax: +972-3-924-0111

Elad Moshe
elad.moshe@cyberark.com
+972-3-918-0000x2378
Fax: +972-3-924-0111

CyberArk Privileged Account Security Cryptographic Library for Linux

1.0


The CyberArk Privileged Account Security Cryptographic Library is a general purpose cryptographic library compiled from the source code of the OpenSSL libcrypto library. It is incorporated into the family of CyberArk applications.

    • Intel Xeon E5 family w/ Red Hat Enterprise Linux 7.4
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4403, DRBG #2161
1471Securosys SA
Forrlibuckstrasse 70
Zurich, Zurich 8005
Switzerland

Marcel Dasen
dasen@securosys.ch
+41 44 552 31 33

Robert Rogenmoser
roro@securosys.ch
+41 44 552 31 11

Primus HSM Cryptographic Library

XC7K160T 2.5.3 (Firmware)


Cryptographic library in an embedded environment. Uses hardware accelerator where it fits. Seeds DRBG from TRNG.

    • Marvell Armada XP PJ4Bv7
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4402, DRBG #2160
1470Trend Micro Inc.
11305 Alterra Parkway
Austin, TX 78758
USA

Paul Tucker
paul_tucker@trendmicro.com
512-633-7945

Trend Micro, TippingPoint Crypto Core OpenSSL

2.0.13


The Trend Micro TippingPoint, Threat Protection System (TPS) Crypto Module is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for Trend Micro TippingPoint security products.

    • Intel Core i3 without AES-NI w/ Linux 4.4
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on KVM 1.5.3 on Red Hat Enterprise Linux (RHEL)7
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 5.5
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.5
    • Intel Xeon E5 with AES-NI w/ Linux 4.4 on ESXi 6.0
    • Intel Xeon E5 with AES-NI w/ Linux 4.4
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4401, DRBG #2159
1469Arista Networks Inc.
5453 Great America Pkwy
Santa Clara, CA 95054
USA

Richard Whitney
rw@arista.com
703-627-6092
Fax: 408-538-8920

Ethan Rahn
erahn@arista.com
408-547-5825

EOS MACsec Hybrid Firmware v1.0

1.0 (Firmware)


The EOS MACSec Hybrid Module is a comprehensive algorithms module used to perform secure encryption, hashing, and random number operations. As a special note, no PAI/PAA functions of the processors are used in the implementation of the software crypto module.

    • Intel Xeon E3
    • AMD GX Series
    • Intel Pentium B9
    • Intel Xeon D-1500
    • AMD GE Series
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4399, DRBG #2158
1468Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.1R1 MTRE-XLP

Junos OS 18.1R1 (Firmware)


Juniper MX and EX9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

    • Broadcom XLP832
6/15/2018
  • ECDSA:
    • 186-4:
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4397, DRBG #2147
1467ViaSat, Inc.
6155 El Camino Real
Carlsbad, CA 92009
USA

David Suksumrit
david.suksumrit@viasat.com
760-476-2200
Fax: 760-929-3941

Lorenzo Page
lorenzo.page@viasat.com
760-893-4198

OpenSSL Algorithms

1.0.2m EBEM Patch 1 (Firmware)


OpenSSL algorithms used by the OpenSSH and NetSNMP modules to provide security for modem configuration and monitoring.

    • IBM PowerPC 405GPr
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4394, DRBG #2154
1466ViaSat, Inc.
6155 El Camino Real
Carlsbad, CA 92009
USA

David Suksumrit
david.suksumrit@viasat.com
760-476-2200
Fax: 760-929-3941

Lorenzo Page
lorenzo.page@viasat.com
760-893-4198

EbemCrypto

13 (Firmware)


Implements key establishment, random number generation, certificate and private key management, and wrap/unwrap of key material, and controls the FPGA implementation of traffic encryption in Viasat's Enhanced Bandwidth Efficient Modem (EBEM).

    • IBM PowerPC 405GPr
6/15/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4393, DRBG #2154
1465Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • PPCe500
    • Intel Xeon w/ ESXI 6.0
6/8/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256
      • Prerequisite: SHS #4392, DRBG #2153
1464Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux 6 NSS without AES-NI

R6-1.0.0


Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
6/8/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4391, DRBG #2151
1463Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Brian Wood
be.wood@samsung.com
+1-973-440-9125

Samsung BoringSSL Cryptographic Module

v1.2.1


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Qualcomm SDM845 w/ Android 8.1
    • Samsung Electronics Exynos 9810 w/ Android 8.1
    • Qualcomm MSM8998 w/ Android 8.1
    • Qualcomm SDM450 w/ Android 8.1
6/8/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4389, DRBG #2149
1462Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Geetha Naik, Certification Program Manager
ngeetha@juniper.net
+91-80-61214404

JUNOS 18.1R1 MTRE-OpenSSL

Junos OS 18.1R1 (Firmware)


Juniper MX and Ex9200 Series are comprehensive, Scalable and secure switching and routing solutions specifically designed to meet the needs of campus, enterprises and service providers. They deliver high performance , reliability and scale to enable a cost effective solution.

    • Intel Xeon CPU E5
6/8/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4387, DRBG #2147
1461Futurex
864 Old Boerne Road
Bulverde, TX 78163
USA

Futurex Security Certifications
certifications@futurex.com
830-980-9782

Futurex Cryptographic Engine

6.2.0.1 (Firmware)


The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

    • TI AM3352
6/8/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4384, DRBG #2145
1460SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5 for TZ, NSA and SuperMassive

6.5.2 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN62XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon II (CN68XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon III (CN71XX)
6/8/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4383, DRBG #2144
1459Taisys Technologies Co. Ltd.
7F., No.56, Lane 321
Yangguang St., Neihu Dist.
Taipei, Taipei 11491
Taiwan (R.O.C.)

Joe Wang
joe.wang@taisys.com
+886-2-26270927x6699
Fax: +886-2-26270619

Kent Horng
kent.horng@taisys.com
+886-2-26562185 #206
Fax: +886-2-26579657

TAISYS JUISE-S2-COS

32 53 (Firmware)


The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

    • SC300
6/1/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4369, DRBG #2134
1458Juniper Networks, Inc
1133 Innovation Way
Sunnyvale, California 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2100

Junos OS 18.1R1 QFX10K-OpenSSL

Junos OS 18.1R1 (Firmware)


The QFX10000 series of fixed and modular data center spine/core Ethernet switches deliver industry-leading scale, flexibility and openness providing seamless transition from 10GbE and 40GbE interface speeds to 100GbE. Based on our custom Q5 ASICs, these high-performance switches scale from 3 to 96 Tbps of throughput.

    • Intel Xeon E3
6/1/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4381, DRBG #2142
1457REDCOM Laboratories, Inc
One REDCOM Center
Victor, NY 14564-0995
United States

Sal Ceravolo
Sal.ceravolo@redcom.com
585-905-0451

Chris Hasenauer
Chris.hasenauer@redcom.com
585-905-0451

REDCOM Encryption 140-2

3.0.1


REDCOM Encryption 140-2 is a FIPS 140-2 validated cryptographic engine for Java and Android based environments. The engine delivers core cryptographic functions including Suite B algorithms. Also, it offloads functions for secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

    • Qualcomm Snapdragon 820 w/ Android Marshmallow (6.0)
    • Qualcomm Snapdragon 835 w/ Android Nougat (7.0)
6/1/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4377, DRBG #2140
1456Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2001

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2001

Junos OS 18.1R1 QuickSec

Junos OS 18.1R1 (Firmware)


The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

    • Intel(R) Xeon(R) CPU E5
5/25/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4376, DRBG #2139
1455Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton
bshelton@juniper.net
408-745-2000
Fax: 408-745-2001

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000
Fax: 408-745-2001

Junos OS 18.1R1 OpenSSL

Junos OS 18.1R1 (Firmware)


The SRX4600 is a high-performance, next-generation firewall supporting cloud-enabled enterprise data center, campus or service provider networks. It offers high-scale security services while providing scalability, ease of management, secure connectivity, and advanced threat mitigation capabilities.

    • Intel(R) Xeon(R) CPU E5
5/25/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4374, DRBG #2138
1454KeyNexus, Inc.
205-2657 Wilfert Road
Victoria, BC V9B6A7
Canada

Jason Novecosky
jason@keynexus.net

KeyNexus Cryptographic Library

1.0


The KeyNexus Cryptographic Library is a comprehensive library of FIPS Approved algorithms that is intended to provide cryptographic support to KeyNexus products.

    • Intel Core i7-870 w/ OpenJDK 1.8.0 on Ubuntu 14.04.1 on VirtualBox 5.1.8
5/25/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4373, DRBG #2137
1453Hypersecu Information System Inc
#206-6191 Westminster Hwy
Richmond, BC V7C 4V4
Canada

James Li
james@hypersecu.com
(604) 279-2000
Fax: (604) 272-1233

HYP ALG Library

V1.0 (Firmware)


The HYP ALG Library contains algorithms are as follows: the AES, TDES, CMAC, KDF, SHA, RSA, ECDSA, DRBG.

    • HSC32K1
5/25/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-256
      • Prerequisite: SHS #4370, DRBG #2135
1452Cisco Systems, Inc.
170 W Tasman Dr
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
tbd

CiscoSSL FIPS Object Module

6.0


The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

    • Apple A10 w/ iOS 11.x
5/25/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4357, DRBG #2121
1451wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

4.0


wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. All key sizes and modes have been implemented to allow flexibility and efficiency.

    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 with AES-NI (PAA) w/ Windows 10 (64-bit)
    • Intel® Core™ i5-5300U CPU @2.30GHz x 4 without AES-NI (PAA) w/ Linux 4.4 (Ubuntu 16.04 LTS)
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4365, DRBG #2131
1450IBM
2455 South Rd
Poughkeepsie, NY 12601
USA

Thomas Morris Jr
tmorrisj@us.ibm.com
845-435-5538

William Santiago
wsf1@us.ibm.com
845-435-9265

Miniboot 6.63 with 00CW683

Andretta 2.0 (00CW683) MB6.63 Hash D608 BCAD (Firmware)


Miniboot Implemented Algorithms with hardware acceleration

    • IBM PowerPC 405
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-521
        • Generation Methods: Testing Candidates
      • Signature Verification:
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #3957, DRBG #2130
1449Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Petra Manche
+44 1189 245470

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle OpenSSL FIPS Object Module

OpenSSL_2.0.13_OracleFIPS_1.0


Oracle OpenSSL FIPS Object Module is a software library providing a Clanguage application program interface (API) for use by processes that require cryptographic services. It is implemented in products such as Oracle Solaris 11, Oracle Integrated Lights Out Manager (ILOM), and Oracle ZFS Storage Appliance.

    • Intel Xeon E7 with PAA w/ Oracle ZFS Storage OS8.8
    • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
    • Intel Xeon E5 without PAA w/ Intel Xeon E5 without PAA
    • Intel Xeon E5 without PAA w/ Oracle ZFS Storage OS 8.8
    • SPARC S7 with PAA w/ Oracle Solaris 11.4
    • SPARC S7 without PAA w/ Oracle Solaris 11.4
    • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
    • Intel Xeon E7 with PAA w/ Oracle® ZFS Storage OS8.8
    • Intel Xeon E5 with PAA w/ Solaris 11.4
    • Intel Xeon E5 with PAA w/ Oracle ZFS Storage OS 8.8
    • Oracle ILOM SP v2 (ARM 5) without PAA w/ Oracle ILOM OS v3.0
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4364, DRBG #2129
1448Unbound Tech
25 Efal Street
Petah Tikva
Israel

Unbound Tech
contact@unboundtech.com
631-316-8114

UnBound EKM Cryptographic Module

2.0.1801.21683


This component carries out the core cryptographic work of the EKM. All cryptographic operations are carried out using secure multiparty computation with the key randomly split, so as to protect it against theft.

    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Mixed Configuration: Entry Point: Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) Partner: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) Auxiliary: Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Mixed Configuration: Entry Point: Windows Server 2016 Standard Evaluation, 64-bit Partner: Red Hat Enterprise Linux Server release 7.3 Auxiliary: Windows Server 2016 Standard Evaluation, 64-bit
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Intel® Xeon® E5450, 3 GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Prerequisite: SHS #4362, DRBG #2126
1447Unbound Tech
25 Efal Street
Petah Tikva
Israel

Unbound Tech
contact@unboundtech.com
631-316-8114

OpenSSL

FIPS 2.0.16


This component is used for communication between EKM servers as well as for low level crypto operations used for the MPC protocol.

    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Intel® Xeon® E5450, 3GHz without AES-NI (PAA) w/ SUSE Linux Enterprise Server Version 12
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz with AES-NI (PAA) w/ Windows Server 2016 Standard Evaluation, 64-bit
    • Intel Core i3 4170 / 1150 Tray 3.7 GHz without AES-NI (PAA) w/ Red Hat Enterprise Linux Server release 7.3
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-224 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4362, DRBG #2126
1446Splunk, Inc.
270 Brannan Street
San Francisco, CA 94107
USA

Robert Truesdell
rtruesdell@splunk.com
412.913.8242

Splunk Phantom Cryptographic Library

1.0


The Splunk Phantom Cryptographic Library provides cryptographic functionality to the Splunk Phantom Cryptographic Module. The associated cryptographic module is a statically linked object module and is classified under FIPS 140-2 as a software based, multi-chip standalone module embodiment.

    • Intel Xeon Silver 4108 with AES-NI w/ CentOS 6
    • Intel Xeon Silver 4108 with AES-NI w/ Red Hat Enterprise Linux Server 7.4
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4361, DRBG #2125
1445Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

CC3135R Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4360, DRBG #2124
1444Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

CC3235SF Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals..

    • n/a
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4359, DRBG #2123
1443Texas Instruments, Inc.
12500 TI Blvd.
Dallas, Texas 75243
USA

Alon Srednizki
alons@ti.com
+972-9-7906059
Fax: +972-9-7906098

Barak Cherches
barakch@ti.com
+972-9-7906238
Fax: +972-9-7906098

TI SimpleLink WiFi Networking Subsystem Crypto Module WolfSSL Component

CC3235S Chip ID 0x311001 4.1.0.16 Chip ID 0x311001 (Firmware)


The TI SimpleLink Wi-Fi Family brings highly secured connectivity solutions for embedded Wi-Fi and Internet of Things applications. It consists of a Wi-Fi network and security processor subsystem, a Wi-Fi driver, multiple internet protocols in ROM and ARM Cortex-M4 application microcontroller with a rich set of peripherals.

    • n/a
5/18/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4358, DRBG #2122
1442Cohesity, Inc.
300 Park Ave
Suite 800
San Jose, CA 95110
USA

Vivek Agarwal
vivek@cohesity.com
+1 (415) 690-7805

Cohesity OpenSSL FIPS Object Module

1.0.2


The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module. It is incorporated into the family of Cohesity storage appliances.

    • Intel Xeon with AES-NI w/ CentOS 7
    • Intel Xeon without AES-NI w/ CentOS 7
5/10/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4353, DRBG #2117
1441Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
+1 (628)-400-2043

SDKMS Crypto Library

1.0.0 (Firmware)


Fortanix Self-Defending Key Management Service (SDKMS) is the world's first cloud service secured with Intel® SGX. With SDKMS, you can securely generate, store and use cryptographic keys & certificates, as well as secrets, such as passwords, API keys or tokens. It provides access control to users & applications to enforce authorized access to keys.

    • Intel® Xeon E3-1230v5 4-Core, 3.40GHz
5/10/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4241, DRBG #2115
1440Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Kevin Meagher
kmeagher@ciena.com
1-410-865-8936

OpenSSL FIPS Object Module

2.0.12


Ciena 3900/5100 Series Packet Networking Platform is a family of standalone network appliances that are used to perform packet switching of network traffic.

    • Intel Xeon D-1500 w/ SAOS 8.6.1
    • AARCH64(arm) w/ SAOS 6.17
    • Cavium 52xx w/ SAOS 6.17
    • ARMv7 w/ SAOS 6.17
5/10/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-512
      • Prerequisite: SHS #4350, DRBG #2114
1439LG Electronics, Inc.
20 Yoido-dong
Youngdungpo-gu
Seoul 152-721
Republic of Korea

Donghoon Shin
hoon.shin@lge.com
82-10-2280-4056

LG BoringSSL

3.0


General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

    • Snapdragon 845 (SDM845) w/ Android 8.0
    • Qualcomm Snapdragon 821 (MSM8996) w/ Android 8.0
    • Snapdragon 835 (MSM8998) w/ Android 8.0
5/10/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4348, DRBG #2112
1438Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - SRX5600 - HW-Authentec

XLP832 17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Broadcom XLP832 accelerator
5/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4288, DRBG #2060
1437Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - SRX550 - HW-Authentec

CN6335 17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon II (CN6335)
5/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4288, DRBG #2060
1436Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - SRX345 - HW-Authentec

CN7130 17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7130)
5/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4288, DRBG #2060
1435Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - SRX320 - HW-Authentec

CN7020 17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon III (CN7020)
5/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4288, DRBG #2060
1434INFINIDAT
500 Totten Pond Road
Waltham, MA 02451
USA

David Hebert
davidh@infinidat.com
+1 860-214-5666

Steve Sullivan
steves@infinidat.com
+1 781-264-1544

INFINIDAT Cryptographic Module (libcrypto)

1.0.2k


The INFINIDAT Crypto Module is a software cryptographic library that performs key management, encryption state management and secure management functionality via TLSv1.2 for the INFINIDAT B-Series and F-Series appliances. This library provides the main cryptographic functionality for the module.

    • Intel Xeon E5-2697 with AES-NI w/ InfiniBox OS 4.7
5/4/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4344, DRBG #2109
1433Fortinet Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

Alan Kaye
akaye@fortinet.com
613-225-9381 x87416
Fax: 613-225-9951

Fortinet FortiGate-VM FIPS Cryptographic Library v5.4

5.4


This document focuses on the software implementation of the Fortinet FortiGate-VM FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

    • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
5/3/2018
  • ECDSA:
    • 186-4:
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4339
1432Fortinet Inc.
1090 Kifer Road
Sunnyvale, CA 94086-5301
USA

Alan Kaye
akaye@fortinet.com
613-225-9381 x87416
Fax: 613-225-9951

Fortinet FortiGate-VM SSL Cryptographic Library v5.4

5.4


This document focuses on the software implementation of the Fortinet FortiGate-VM SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

    • Intel Xeon E3 w/ FortiGate-VM running on FortiHypervisor-500D
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4338
1431Mojo Networks, Inc.
339 N Bernardo Avenue, Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
hemant.chaskar@mojonetworks.com
(650) 961-1111
Fax: (650) 961-1169

Crypto Core

2.0.16-1-01 (Firmware)


Cryptographic library offering various cryptographic mechanisms in sensor and access point.

    • ARMv7
5/3/2018
  • ECDSA:
    • 186-4:
      • Public Key Validation:
        • Curves: P-256
      • Prerequisite: SHS #4165, DRBG #1936
1430Mojo Networks, Inc.
339 N Bernardo Avenue, Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
hemant.chaskar@mojonetworks.com
(650) 961-1111
Fax: (650) 961-1169

Crypto Core

2.0.16-3-00 (Firmware)


Cryptographic library offering various cryptographic mechanisms in server.

    • Intel Xeon
5/3/2018
  • ECDSA:
    • 186-4:
      • Public Key Validation:
        • Curves: P-256, P-384
      • Prerequisite: SHS #4270, DRBG #2049
1429D'Crypt Pte Ltd
28 Sin Ming Lane
#06-133 Midview City
Singapore, Singapore 573953
Singapore

Sales & Marketing
marketing@d-crypt.com
(65) 6933-1800
Fax: (65) 6684-5142

Quek Gim Chye
fips@d-crypt.com
(65) 6933-1823
Fax: (65) 6684-5142

D'Crypt Cryptographic Library

3.8 (Firmware)


The D'Crypt Cryptographic Library provides cryptographic services to higher firmware layers in the D'Crypt Micro O/S, which is a secure operational environment for running high security applications.

    • Intel x86 64 bit
    • ARM Cortex-A
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Verification:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4332, DRBG #2094
1428ClevX, LLC
9306 NE 125th Street
Kirkland, WA 98034
USA

Lev Bolotin
Lev.Bolotin@clevx.com
+1.425.820.9929

Marc Singer
Marc.Singer@clevx.com
425.820.9929

ClevX Datalock Cryptographic Library

ClevX-Datalock-v2.0 (Firmware)


ClevX Datalock Cryptographic Firmware Library

    • STM32L071C
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256
        • Generation Methods: Testing Candidates
      • Prerequisite: DRBG #2077
1427Nationz Technologies Inc.
5F, Building A, IER of Huazhong University of Science and Technology
#9 Yuexing Ave. 3, Nanshan District
Shenzhen, Guangdong 518057
P.R.China

Max Jiang
jiang.zhaolai@nationz.com.cn
+86 185 7675 1645

Nationz Secure IC

v1.1 (Firmware)


The Z32HUB II secure chip is based on the 32bit CPU. Nationz Security IC platform for different applications in the information security fields. They have the features of low power consumption, low cost and high performance, etc.

    • Z32HUB II secure IC, V1.0
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4327, DRBG #2090
1426Nationz Technologies Inc.
5F, Building A, IER of Huazhong University of Science and Technology
#9 Yuexing Ave. 3, Nanshan District
Shenzhen, Guangdong 518057
P.R.China

Max Jiang
jiang.zhaolai@nationz.com.cn
+86 185 7675 1645

Nationz Z32H330TC TPM 2.0 Cryptographic Engine TCE01

v1.1 (Firmware)


Nationz Z32H330TC TPM 2.0 (Trusted Platform Module), Security processor with embedded firmware compliant with TPM Family 2.0 level 00, revision 1.16 Errata Version 1.5.

    • Z32H330TC secure IC, V1.0
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4326, DRBG #2089
1425Nuvoton Technology Corporation
No. 4, Creation Rd. III
Hsinchu Science Park 300
Taiwan, R.O.C.

Yossi Talmi
yossi.talmi@nuvoton.com
+972-9-9702364
Fax: +972-9-9702001

Oren Tanami
oren.tanami@nuvoton.com
+972-9-9702390
Fax: +972-9-9702001

Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

LAG019


Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 00, revision 1.38

    • N/A
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-384
        • P-384 SHA: SHA-1, SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384
        • P-384 SHA: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4325, DRBG #2088
1424Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Bill Shelton, Strategic Delivery Director
bshelton@juniper.net
408-745-2000
Fax: 408-745-2100

Vann (Vanna) Nguyen, Certification Program Manager
vann@juniper.net
408-745-2000
Fax: 408-745-2100

Junos 18.1R1 - OpenSSL

18.1R1 (Firmware)


The EX4300 switches are single rack unit (1U) devices that deliver a compact solution for crowded wiring closets and access switch locations where space and power are at a premium. It offers a full suite of Layer 2 and Layer3 switching capabilities.

    • Intel Xeon E31xx (Sandy Bridge)
    • Freescale e500 dual core (PB0BJSSE1PNB)
5/3/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4324, DRBG #2087
1423Certicom Corp.
4701 Tahoe Blvd, Building A
5th Floor
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder® FIPS Core

6.3.0


Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

    • Intel Atom C3558 without AES-NI w/ QNX SDP 7
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
    • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
    • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
    • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
    • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
    • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
    • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
4/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4321, DRBG #2085
1422Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Pradeepa M R
pradeepam@juniper.net

Junos FIPS Version 17.4R1 - OpenSSL

17.4R1 (Firmware)


Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

    • Cavium Octeon II (CN6335)
    • Cavium Octeon III (CN7130)
    • Intel Xeon C5518
4/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256, SHA-384
      • Prerequisite: SHS #4320, DRBG #2084
1421Ruckus Networks, An ARRIS company
350 W Java Drive
Sunnyvale, CA 94089
USA

Abhi Maras
(650) 265-4200
Fax: (408) 738-2065

Mike Jamison
(678) 473-2907
Fax: (678) 473-8470

Cloudpath Cryptographic Library for Java

1.0


Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

    • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on VMware ESXi 6.5
    • Intel(R) Core(TM) i7-7700 w/ Open JDK 1.7.0 on CentOS 7 on Hyper-V Manager 2016
4/27/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4318, DRBG #2083
1420Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (64 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
4/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4314, DRBG #2081
1419Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1(628)400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4280, DRBG #2073
1418Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1(628)400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service (TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4281, DRBG #2072
1417Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R7-2.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 7.3 64 bit
4/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4312, DRBG #2079
1416IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2o [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
4/13/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-384
        • P-384 SHA: SHA-1, SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384
        • P-384 SHA: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4311, DRBG #2078
1415VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94303
USA

Manoj Maskara
mmaskara@vmware.com
650-427-1000
Fax: 650-475-5001

VMware BC-FJA (Bouncy Castle FIPS Java API)

1.0.0


The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

    • Intel Xeon w/ Windows Server 2016 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ BLUX 4.9 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 7 (32-bit) with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ SLES 12 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2008 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 2.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows 10 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ PhotonOS 1.0 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Windows Server 2012 with JRE 1.8 on ESXi 6.5
    • Intel Xeon w/ Ubuntu 16.04 with JRE 1.8 on ESXi 6.5
4/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4307, DRBG #2076
1414wolfSSL Inc.
10016 Edmonds Way
Suite C-300
Edmonds, WA 98020
USA

Todd Ouska
todd@wolfssl.com
503-679-1859

Larry Stefonic
larry@wolfssl.com
206-369-4800

wolfCrypt

3.14.2


The wolfCrypt module is a comprehensive suite of FIPS Approved algorithms. AES-CBC, AES-GCM, DRBG, DSA, ECDSA, HMAC, RSA, SHA-256, SHA-384, SHA-512, and SP 800-56A KAS have been tested for this project.

    • Intel x86 w/ NetBSD v6.0.1
4/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-512
        • P-384 SHA: SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-512
        • P-384 SHA: SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4306, DRBG #2075
1413Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd.
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ancrypto.dylib

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • ARMv7 w/ iOS 10.3.3
4/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4305, DRBG #2074
1412Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support enabled w/ Ubuntu 16.04
4/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4280, DRBG #2073
1411Fortanix, Inc.
444 Castro Street, #702
Mountain View, CA 94041
USA

Ambuj Kumar
info@fortanix.com
+1 (628) 400-2043

Fortanix Crypto Algorithm Library

2.6.0


Fortanix crypto algorithm library provides cryptographic functionality for Fortanix's Self-Defending Key Management Service(TM).

    • Intel(R) Xeon(R) CPU E3-1230 v5 @ 3.40GHz with AES-NI support disabled w/ Ubuntu 16.04
4/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4281, DRBG #2072
1410Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4278, DRBG #2056
1409Oracle Corporation
500 Oracle Parkway
Redwood Shores, CA 94065
USA

Chris Brych
chris.brych@oracle.com
+1 613.216.3078

Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

R6-1.0.0


Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

    • Intel(R) Xeon(R) Silver 4114 w/ Oracle Linux 6.9 64 bit
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4303, DRBG #2070
1408Bivio Networks, Inc.
4457 Willow Road, Suite 240
Pleasanton, CA 94588
USA

Raj Srinivasan
raj@bivio.net
(925) 924-8608
Fax: (925) 924-8650

OpenSSL

1.0.2k-8


OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements a comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

    • Intel Xeon Skylake w/ RHEL 7.4
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-384
      • Prerequisite: SHS #4301, DRBG #2069
1407Red Hat, Inc.
100 E. Davie Street
Raleigh, NC 27601
USA

Jaroslav Reznik
fips140@redhat.com

Red Hat NSS Softoken (32 bit)

6.0


User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

    • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.5
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4300, DRBG #2068
1406SonicWALL Inc.
5455 Great America Parkway
Santa Clara, CA 95054
USA

George Duo
gduo@sonicwall.com
(408) 962-7049

SonicOS 6.5.1 for TZ, NSA and SuperMassive

6.5.1 (Firmware)


The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

    • Cavium Octeon II (CN68XX)
    • Cavium Octeon II (CN66XX)
    • Cavium Octeon III (CN70XX)
    • Cavium Octeon II (CN62XX)
    • Cavium Octeon III (CN71XX)
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4297, DRBG #2066
1405Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

Aruba Common Cryptographic Module (CCM)

1.0.0


The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

    • Intel Core i7 w/ Windows 10 64-bit User Mode
    • Intel Core i5 w/ Windows 10 32-bit User Mode
    • ARMv7 w/ Android 7.1
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4296, DRBG #2065
1404BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4294, DRBG #2063
1403BlackBerry Certicom
5th Floor, 4701 Tahoe Blvd, Building A
Mississauga, Ontario L4W 0B5
Canada

Certicom Support
support@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Certicom Sales
sales@certicom.com
1-905-507-4220
Fax: 1-905-507-4230

Security Builder GSE-J Crypto Core

2.9.1


Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

    • Intel Xeon w/ Windows Server 2016 with Oracle JRE 1.8.0
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4293, DRBG #2062
1402Certes Networks, Inc.
300 Corporate Center Drive
Suite 140
Pittsburgh, PA 15108
USA

Sean Everson
sean.everson@certesnetworks.com
1.412.357.1130
Fax: 1.412.262.2574

Gary Brunner
gary.brunner@certesnetworks.com
1.412.200.2177
Fax: 1.412.262.2574

Certes Enforcement Point Cryptographic Library

1.0.2l (Firmware)


The Certes Enforcement Point Cryptographic Library provides cryptographic functionality for the Certes CEP appliances.

    • Intel Xeon Processor E3 v5 Family
    • Intel Atom Processor C Series
    • Intel Xeon Processor E5 v4 Family
3/30/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Signature Generation:
        • P-224 SHA: SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4289, DRBG #2061
1401Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

CLint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • Intel Atom
3/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256
      • Prerequisite: SHS #4283, DRBG #2059
1400Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Seyed Safakish
seyeds@juniper.net
408-745-2000
Fax: 408-745-2100

OpenSSL - EX4300

Junos OS 17.4 R1 (Firmware)


Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos

    • Freescale e500mc
3/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4282, DRBG #2058
1399BeyondTrust
5090 N. 40th Street
Suite 400
Phoenix, AZ 85018
USA

David Allen
dallen@beyondtrust.com
1-800-234-9072, 9292

BeyondTrust Cryptographic Library

2.0.10


BeyondTrust updated OpenSSL FIPS Object Module for use within BeyondTrust UVM appliances.

    • Intel Xeon w/ Windows Server 2012 R2 Standard
3/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4279, DRBG #2057
1398Realia Technologies, S.L
Infanta Mercedes 90, 4th floor
Madrid, Madrid 28020
Spain

Jesus Rodriguez
jrodriguez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Luis Jesus Hernandez
ljhernandez@realsec.com
+34 91 449 03 30
Fax: +34 91 579 56 06

Cryptosec Dekaton

1.1


The Cryptosec Dekaton is a high-end cryptographic accelerator card that provides cryptographic services and secure storage of cryptographic keys. The module is built to perform general cryptographic processing and features a tamper-responsive case to physically protect sensitive information contained within the card.

    • N/A
3/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4278, DRBG #2056
1397Digi International, Inc.
11001 Bren Road East
Minnetonka, MN 55343
USA

Donald Schleede
Donald.Scleede@digi.com
952-912-3444

Digi ConnectCore Security Module

1.0


The Digi ConnectCore Security Module provides cryptographic services for Digi International products.

    • ConnectCore 6/6UL SoM (ARMv7) with NEON w/ Yocto Linux 2.4
    • ConnectCore 6/6UL SoM (ARMv7) without NEON w/ Yocto Linux 2.4
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4275, DRBG #2053
1396Mojo Networks, Inc.
339 N Bernardo Avenue, Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
hemant.chaskar@mojonetworks.com
(650) 961-1111
Fax: (650) 961-1169

Crypto Core

2.0.16-3-00 (Firmware)


Cryptographic library offering various cryptographic mechanisms in server.

    • Intel Xeon
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4270, DRBG #2049
1395Cisco Systems, Inc
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL FIPS Object Module

7.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of

    • ARMv8 w/ Android 7.1
    • Intel Core i5 w/ Windows 10 (with AES-NI)
    • Intel Core i7 w/ macOS 10.12 (with AES-NI)
    • Intel Core i5 w/ Windows 10
    • Intel Pentium w/ Linux 3.4
    • ARMv8 w/ iOS 11.2
    • Intel Core i7 w/ macOS 10.12 (without AES-NI)
    • Cavium Octeon II 68XX w/ Wind River Linux 4
    • Intel Xeon w/ SUSE Linux Enterprise 11 (with AES-NI)
    • Intel Xeon w/ SUSE Linux Enterprise 11 on VMware ESXI 6.0
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4267, DRBG #2048
1394Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); MsBignum Cryptographic Implementations

10.0.15063.728


The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4253, DRBG #2037
1393Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4266, DRBG #2047
1392Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4265, DRBG #2046
1391Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - Quicksec

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
      • Prerequisite: SHS #4264, DRBG #2045
1390Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1


The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

    • Intel Xeon E5 w/ Junos OS 17.4R1-S1 on VMware ESXi v6.0
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4263, DRBG #2044
1389Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1 (Firmware)


The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E5
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4262, DRBG #2043
1388Juniper Networks, Inc.
1133 Innovation Way
Sunnyvale, CA 94089
USA

Pradeepa M R
pradeepam@juniper.net

Vann (Vanna) Nguyen
vann@juniper.net
408-745-2000

Junos OS 17.4R1-S1 - OpenSSL

Junos OS 17.4R1-S1 (Firmware)


The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

    • Intel Xeon E3
3/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4261, DRBG #2042
1387Ciena Corporation
7035 Ridge Road
Hanover, MD 21076
USA

Patrick Scully
613-670-3207

Ciena Waveserver

1.5.1 (Firmware)


The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

    • Xilinx XC7Z030
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4254, DRBG #2038
1386Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Education, S, Mobile, Surface Hub Creators Update (version 1703); SymCrypt Cryptographic Implementations

10.0.15063.728


The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
    • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
    • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
    • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
    • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
    • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
    • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
    • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
    • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
    • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4253, DRBG #2037
1385Gemalto
20 Colonnade Road, Suite 200
Ottawa, ON K2E7M6
Canada

Security and Certifications Team
SecurityCertifications@gemalto.com

ProtectServer Internal Express Cryptographic Library

5.01 (Firmware)


The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

    • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4252, DRBG #1704
1384Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Enterprise LTSB, Mobile Anniversary Update and Windows Server 2016, Windows Storage Server 2016 (version 1607); MsBignum Cryptographic Implementations

10.0.14393.1770


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise Anniversary Update (x86)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Standard Edition (x64)
    • AMD A4 with AES-NI w/Windows Server 2016 Standard Edition (x64)
    • Intel Xeon with AES-NI w/ Windows Storage Server 2016 (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home Anniversary Update (x86)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
    • Intel Core i7 with AES-NI w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Home Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro Anniversary Update (x86)
    • Intel Xeon with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows Server 2016 Datacenter Edition (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise Anniversary Update (x64)
    • Intel Xeon with AES-NI w/ Windows 10 Pro Anniversary Update (x64)
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4250, DRBG #2036
1383Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Enterprise LTSB (version 1507); MsBignum Cryptographic Implementations

10.0.10240.17643


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise LTSB (x86)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise LTSB (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise LTSB (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise LTSB (x64)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise LTSB (x64)
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4248, DRBG #2035
1382Google, Inc.
1600 Amphitheatre Parkway
Mountain View, CA 94043
USA

Adam Langley
security@chromium.org

BoringCrypto

ed3d82f35eb0aa9d81f2398c2142ba07dfc1acee


A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

    • MSM8998 w/ Android 8.1.0 with Linux 4.4.88
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4247, DRBG #2034
1381Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
USA

Mike Grimm
FIPS@microsoft.com
800-Microsoft

Windows 10 Home, Pro, Enterprise, Mobile, Surface Hub November Update (version 1511); MsBignum Cryptographic Implementations

10.0.10586.1176


The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Home November Update (x86)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Pro November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Windows 10 Home November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Enterprise November Update (x86)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Pro November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Book w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i3 without AES-NI w/ Windows 10 Pro November Update (x86)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise November Update (x64)
    • Qualcomm Snapdragon 400 (A7) w/ Microsoft Lumia 635 w/ Windows 10 Mobile November Update (ARMv7)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Hub 55" w/ Windows 10 November Update for Surface Hub (x64)
    • AMD A4 with AES-NI w/ Windows 10 Home November Update (x64)
    • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile November Update (ARMv7)
    • Intel x64 Processor with AES-NI w/ Microsoft Surface Pro w/ Windows 10 Enterprise November Update (x64)
    • Intel Core i7 with AES-NI w/ Microsoft Surface Hub 84" w/ Windows 10 November Update for Surface Hub (x64)
    • Intel Core i5 with AES-NI w/ Microsoft Surface Pro 2 w/ Windows 10 Pro November Update (x64)
    • Intel Atom x7 with AES-NI w/ Microsoft Surface 3 w/ Windows 10 Enterprise November Update (x64)
    • AMD A4 with AES-NI w/ Windows 10 Pro November Update (x64)
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-384
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4246, DRBG #2033
1380Docker, Inc.
144 Townsend Street
San Francisco, California 94107
USA

Rahim Ibrahim
security-team@docker.com
415-941-0376

Docker Enterprise Edition Crypto Library v 1.0

1.0


The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

    • Dual Intel E5-2670v3 w/ Red Hat Enterprise Linux v7.3
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4245, DRBG #2032
1379Docker, Inc.
144 Townsend Street
San Francisco, California 94107
USA

Rahim Ibrahim
security-team@docker.com
415-941-0376

Docker Enterprise Edition Crypto Library v 1.0

1.0


The Docker Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between Datacenter components, users, and external IT entities.

    • Dual Intel E5-2670v3 w/ CentOS v7.3
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4244, DRBG #2031
1378DocuSign, Inc.
221 Main St.
Suite 1000
San Francisco, CA 94105
USA

Ezer Farhi
Ezer.Farhi@docusign.com
+972-39279529
Fax: +972-39230864

Moshe Harel
Moshe.Harel@docusign.com
+972-39279578
Fax: +972-39230864

PrivateServer

5.0.3 (Firmware)


PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

    • Intel® E3-1268LV3 Quad-Core
3/9/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4242, DRBG #2030
1377Splunk, Inc.
270 Brannan Street
San Francisco, CA 94107
USA

Michael Arrowsmith
415-848-8400

Splunk Cryptographic Module

2.0.16


The Splunk Cryptographic Module is a general purpose cryptographic module integrated in Splunk's products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.

    • Intel Xeon E5 without PAA w/ Ubuntu 16.04
    • Intel Xeon E5 with PAA w/ Ubuntu 16.04
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits, Testing Candidates
      • Public Key Validation:
        • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4238, DRBG #2019
1376Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
USA

Clint Winebrenner
cwinebre@cisco.com
(919) 392-6520

CiscoSSL with FOM 6.0

6.0


The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco Products

    • Intel Xeon w/ ADE-OS v3.0
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-384, SHA-512
        • P-521 SHA: SHA-512
      • Prerequisite: SHS #4237, DRBG #2018
1375Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS OpenSSL Module

ArubaOS 6.5.1 (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ8064
    • Qualcomm IPQ4029
    • NXP QorIQ T1024
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4236, DRBG #2017
1374Aruba, a Hewlett Packard Enterprise company
3333 Scott Blvd
Santa Clara, CA 95054
USA

Steve Weingart
steve.weingart@hpe.com
512-319-2480

ArubaOS Crypto Module

ArubaOS 6.5.1 (Firmware)


The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

    • Qualcomm IPQ4029
    • Qualcomm IPQ8064
    • NXP QorIQ T1024
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4235
1373IBM Corporation
1787 Sentry Pkwy West
Building 18, Suite 200
Blue Bell, PA 19422
USA

Sandeep Singhal
Sandeep.Singhal1@ibm.com
215-664-1614

OpenSSL [1] with the OpenSSL FIPS Object Module [2]

1.0.2n [1]; 2.0.13 [2]


The open source OpenSSL library along with the OpenSSL FIPS Object Module provides a cryptographic library used by the MaaS360 Cloud Extender.

    • Intel Core i3-2120 w/ Microsoft Windows Server 2012 R2 (x64)
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-1, SHA-256, SHA-384
        • P-384 SHA: SHA-1, SHA-256, SHA-384
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-256, SHA-384
        • P-384 SHA: SHA-1, SHA-256, SHA-384
      • Prerequisite: SHS #4234, DRBG #2016
1372Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A9 single core (ARMv7 32-bit) w/ Linux version 3.10.73, 32-bit
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4233, DRBG #2015
1371Hangzhou Hikvision Digital Technology Co., Ltd.
No.555 Qianmo Road, Binjiang District
Hangzhou, Zhejiang 310052
China

Jiadong Chen
chenjiadong@hikvision.com
+86 136 5663 1443

HikSSL Library

1.0.0


The HikSSL Library module is a software library embedded into Hikvision Network Camera and Network Video Recorder (NVR) products, that provides Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms.

    • ARM Cortex-A17 (ARMv7 32-bit) w/ Linux version 3.10.0, 32-bit
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384, P-521
        • Generation Methods: Testing Candidates
      • Public Key Validation:
        • Curves: P-256, P-384, P-521
      • Signature Generation:
        • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4232, DRBG #2012
1370Cisco Systems, Inc
170 W Tasman Drive
San Jose, California 95134
USA

Clint Winebrenner
cwinebre@cisco.com
919.392.6250

IOS Common Cryptographic Module (IC2M)

Rel5 (Firmware)


The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

    • ARMv8
2/23/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-256, P-384
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-256, P-384
      • Signature Generation:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256
      • Signature Verification:
        • P-256 SHA: SHA-256
        • P-384 SHA: SHA-256
      • Prerequisite: SHS #4231, DRBG #2011
1369Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.2


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Samsung Electronics Exynos7883 w/ Android 8.0
    • Qualcomm MSM8998 w/ Android 8.0
    • Qualcomm MSM8996 w/ Android 8.0
    • Qualcomm SDM845 w/ Android 8.0
    • Samsung Electronics Exynos8890 w/ Android 8.0
    • Samsung Electronics Exynos9810 w/ Android 8.0
    • Samsung Electronics Exynos8895 w/ Android 8.0
    • Samsung Electronics Exynos7570 w/ Android 8.0
    • Samsung Electronics Exynos7884 w/ Android 8.0
2/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4230, DRBG #2010
1368Mocana Corporation
150 Mathilda Place
Suite 208
Sunnyvale, CA 94086
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.5.1f


The Mocana Cryptographic Module is the engine of Mocana's Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

    • Intel Atom E3800 w/ Wind River Linux 6.0
2/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4229, DRBG #2009
1367
2/16/2018
    1366Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Marks
    seceval_us@oracle.com
    650-506-0391

    Oracle Acme Packet Cryptographic Library

    ECz8.0.0 (Firmware)


    The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

      • Intel Core i3
      • Intel Core i7
    2/16/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4225, DRBG #2007
    1365Gemalto
    Avenue du Jujubier
    Z.I Athelia IV
    La Ciotat, 13705
    France

    Frederic Garnier
    Frederic.Garnier@gemalto.com
    +33 442364368
    Fax: +33 442366953

    Didier Bonnet
    Didier.Bonnet@gemalto.com
    +33 442366803
    Fax: +33 442365545

    Gemalto Cryptographic library for IDCore 3130 on SLE78

    Infineon SLE78CLFX400VPHM 1.9 (Firmware)


    IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

      • Infineon SLE78 chip (M7892)
    2/16/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-224 SHA: SHA-224
          • P-256 SHA: SHA-224, SHA-256
          • P-384 SHA: SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1
          • P-224 SHA: SHA-1, SHA-224
          • P-256 SHA: SHA-1, SHA-224, SHA-256
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4221, DRBG #2005
    1364Evertz Microsystems
    5292 John Lucas Dr.
    Burlington, Ontario L7L 5Z9
    Canada

    Naveed Afzal
    nafzal@evertz.com
    905-335-3700

    EXE OpenSSL Cryptographic Module

    2v0_b1 (Firmware)


    Card for 6RU Shelf loaded with Evertz IPX

      • MPC8377E
    2/16/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4220, DRBG #2004
    1363Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Patrick Scully
    pscully@ciena.com
    613-670-3207

    Ciena 6500 Flex3 WaveLogic 3e OCLD Boot Loader

    1.00 (Firmware)


    The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service.

      • HunQ v3 ASIC
    2/9/2018
    • ECDSA:
      • 186-4:
        • Signature Verification:
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4219
    1362Silver Spring Networks
    230 W Tasman Drive
    San Jose, CA 95134
    USA

    Andrew Pendray
    support@ssni.com
    +1 669 770 4000
    Fax: +1 886 776 0015

    Silver Spring Networks Endpoint Security Module

    130-0117-03 82136; 1.00 (Firmware)


    Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

      • ESM instruction manager processor
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4148, DRBG #1906
    1361Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet Cryptographic Library

    E-CZ 8.0.0


    The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4216, DRBG #2002
    1360Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet Cryptographic Library

    E-CZ 8.0.0 (Firmware)


    The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon D-1548 (Intel Broadwell-DE)
      • Intel Atom C2358
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4215, DRBG #2001
    1359Certicom Corp.
    4701 Tahoe Blvd, Building A
    5th Floor
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder® FIPS Core

    6.3.0


    Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

      • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
      • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
      • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
      • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      • Intel Atom C3558 without AES-NI w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
      • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4210, DRBG #1996
    1358IBM Corporation
    222 South Riverside Plaza
    Ste 1700
    Chicago, IL 60606
    USA

    Mark Seaborn
    mseaborn@us.ibm.com
    +1 312 423 6640x2354

    IBM Cloud Object Storage System's™ FIPS Cryptographic Module

    1.1


    The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

      • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
      • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4209, DRBG #1995
    1357Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    ancrypto.dylib

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • ARMv7 w/ iOS 10.3.3
    2/9/2018
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: P-256, P-384
    1356Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    libancrypto.so

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Linux 2.6 64-bit
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4208, DRBG #1994
    1355Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    ancrypto.dll

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Windows 7 64-bit User Mode
      • Intel Core i5 w/ Windows 7 32-bit User Mode
    2/9/2018
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: P-256, P-384
    1354Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    libancrypto.so

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba's networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • ARMv7 w/ Android 6.0.1
      • Intel Core i5 w/ Linux 2.6 32-bit
    2/9/2018
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: P-256, P-384
    1353Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4207, DRBG #1993
    1352Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4204, DRBG #1988
    1351Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1P w/ watchOS 4
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4203, DRBG #1987
    1350Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4202, DRBG #1984
    1349Gallagher Group
    181 Kahikatea Drive
    Hamilton 3206
    New Zealand

    Andrew Scothern
    andrew.scothern@gallagher.com
    +64-7-838-9800

    Simon Lawrence
    simon.lawrence@gallagher.com
    +64-7-838-9800

    Gallagher OpenSSL Cryptographic Module

    2.0.12


    Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

      • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4196, DRBG #1978
    1348Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4194, DRBG #1976
    1347Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.5
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4193, DRBG #1975
    1346Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4191, DRBG #1972
    1345Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4189, DRBG #1959
    1344Centrify Corporation
    3300 Tannery Way
    Santa Clara, California 95054
    USA

    Kitty Shih
    kitty.shih@centrify.com
    669-444-5238

    Centrify Cryptographic Library

    2.1


    Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

      • Intel Xeon X5650 x86_64 w/ RHEL 7.2
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4185, DRBG #1956
    1343Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung SCrypto Library

    v2.2


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4184, DRBG #1955
    1342Datrium
    385 Moffett Park Dr #205
    Sunnyvale, CA 94089
    USA

    R. Hugo Patterson
    info@datrium.com
    +1 (669) 721-9444

    Datrium FIPS Object Module

    2.0.12


    The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

      • Intel Xeon E5-2618L v4 w/ Linux 3.10
      • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
      • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4182, DRBG #1953
    1341Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4180, DRBG #1951
    1340SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Sales
    sales@safelogic.com

    CryptoComply® Server

    2.1


    CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

      • Intel i7 w/ Windows Server 2012 R2
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4177, DRBG #1947
    1339Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.14


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
      • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4175, DRBG #1946
    1338Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.13


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4174, DRBG #1945
    1337Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Java API

    1.0.0


    Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4173, DRBG #1944
    1336Mojo Networks, Inc.
    339 N Bernardo Avenue, Suite 200
    Mountain View, CA 94043
    USA

    Hemant Chaskar
    hemant.chaskar@mojonetworks.com
    (650) 961-1111
    Fax: (650) 961-1169

    Crypto Core

    2.0.16-1-01 (Firmware)


    Cryptographic library offering various cryptographic mechanisms in sensor and access point.

      • ARMv7
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256
          • Generation Methods: Testing Candidates
        • Prerequisite: DRBG #1936
    1335Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11 Fusion
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4164, DRBG #1935
    1334Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4163, DRBG #1934
    1333Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4162, DRBG #1933
    1332Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4161, DRBG #1932
    1331Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4160, DRBG #1931
    1330Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4159, DRBG #1930
    1329Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4158, DRBG #1929
    1328Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4157, DRBG #1928
    1327Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10X w/ tvOS 11 Fusion
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4155, DRBG #1925
    1326Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4152, DRBG #1918
    1325Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S1P w/ watchOS 4
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4151, DRBG #1917
    1324Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Timothy McDonough
    timothy.mcdonough@hpe.com

    Hewlett Packard Enterpprise SSL Crypto Module

    2.1


    Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

      • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4147, DRBG #1905
    1323Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
      • Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz with AES-NI w/ CentOS 6.8 on KVM on Ubuntu 16.04.2 LTS
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4146, DRBG #1904
    1322Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
      • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4145, DRBG #1903
    1321Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Access Point SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade's worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

      • Qualcomm IPQ8068
      • Qualcomm IPQ8064
      • Qualcomm IPQ8065
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4144, DRBG #1902
    1320Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (678) 473-2907
    Fax: (678) 473-8470

    Mike Jamison
    (678) 473-2907
    Fax: (678) 473-8470

    Cloudpath Cryptographic Library

    1.0


    Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4143, DRBG #1901
    1319Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    JUNOS 17.3R2 RE1800 - OpenSSL

    17.3R2 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4138, DRBG #1895
    1318Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4137, DRBG #1894
    1317Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S1P w/ watchOS 4
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4136, DRBG #1893
    1316Private Machines, Inc
    164 20th Street
    4A-4B
    Brooklyn, NY 11232
    USA

    Sumeet Bajaj
    sumeet@privatemachines.com

    Radu Sion
    sion@privatemachines.com

    Private Machines Enforcer LIBUCL

    L4-1 2.5.13 (Firmware)


    The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

      • MAX32550 Cortex M3
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4131, DRBG #1879
    1315SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sanagala
    usanagala@sonicwall.com
    408-962-6248
    Fax: 408-745-9300

    SonicWall Crypto Library

    SonicOS 6.2.5 (Firmware)


    SonicWall Crypto Library

      • Cavium Octeon
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Verification:
          • P-256 SHA: SHA-256
        • Prerequisite: SHS #4130, DRBG #1887
    1314Infineon Technologies AG
    Alter Postweg 101
    Augsburg, BY 86159
    Germany

    Roland Ebrecht
    Roland.Ebrecht@infineon.com
    +49-821-25851-68
    Fax: +49-821-25851-40

    Thomas Hoffmann
    Thomas.Hoffmann@infineon.com
    +49-821-25851-24
    Fax: +49-821-25851-40

    Trusted Platform Module 2.0 SLB 9670

    SLB 9670 7.83 (Firmware)


    Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

      • Infineon SLB 9670 security controller IC
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256
        • Signature Generation:
          • P-256 SHA: SHA-256
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256
        • Prerequisite: SHS #4129, DRBG #1886
    1313Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i7 w/ macOS 10.13
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4127, DRBG #1885
    1312Huawei Technologies Co., Ltd
    Huawei Industrial Base, Bantian Longgang
    Shenzhen, Guangdong 518129
    China

    SPENCER HE
    heshunbin@huawei.com
    +86-755-28979041

    EulerOS 2.0

    EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

      • Intel Xeon w/ EulerOS 2.0
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4126, DRBG #1884
    1311Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4124, DRBG #1880
    1310Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Core M w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4122, DRBG #1874
    1309Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i5 w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4121, DRBG #1873
    1308Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Xeon w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4120, DRBG #1872
    1307Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4119, DRBG #1871
    1306Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Core M w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4118, DRBG #1870
    1305Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4117, DRBG #1869
    1304Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS 10.13
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4116, DRBG #1868
    1303Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    Qualcomm Trusted Execution Environment (QTEE) Secure App Software Crypto 64 bit Module

    TZ.XF.5.0.1-00033


    QTEE Secure App Software Crypto Module provides various software cryptographic functionalities to the 64bit QTEE Trusted Applications.

      • Snapdragon 845 w/ Qualcomm Trusted Execution Environment (QTEE)
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • Prerequisite: SHS #4115, DRBG #885
    1302Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    Qualcomm Trusted Execution Environment (QTEE) Secure App Software Crypto 32 bit Module

    TZ.XF.5.0.1-00033


    QTEE Secure App Software Crypto Module provides various software cryptographic functionalities to the 32bit QTEE Trusted Applications.

      • Snapdragon 845 w/ Qualcomm Trusted Execution Environment (QTEE)
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • Prerequisite: SHS #4114, DRBG #885
    1301Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    JUNOS Version 17.3R2 - OpenSSL

    17.3R2 (Firmware)


    The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

      • Intel Xeon D
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4112, DRBG #1867
    1300Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4110, DRBG #1866
    1299SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    George Duo
    gduo@sonicwall.com
    (408) 962-7049

    SonicOS 6.5.0 for TZ, NSA and SuperMassive

    FW Version 6.5.0 (Firmware)


    The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

      • Cavium OCTEON III (CN7XXX)
      • Cavium OCTEON II (CN6XXX)
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-192, P-224, P-256, P-384, P-521
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4109, DRBG #1865
    1298Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4106, DRBG #1861
    1297Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4105, DRBG #1859
    1296Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4102, DRBG #1856
    1295Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4101, DRBG #1855
    1294Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10X Fusion w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4100, DRBG #1854
    1293Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4099, DRBG #1853
    1292Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4098, DRBG #1852
    1291Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4097, DRBG #1851
    1290Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4096, DRBG #1850
    1289Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4095, DRBG #1849
    1288Samsung Electronics Co., Ltd.
    1-1, Samsungjeonja-ro
    Hwaseong-si, Gyeonggi-do 18448
    KOREA

    Jisoo Kim
    jisoo74.kim@samsung.com
    82-31-8096-2832
    Fax: 823180008000(+62832)

    EPiC2 ECDSA P-224 Library

    EPiC2_ECDSA_P224_V1.0 (Firmware)


    PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

      • Cortex R7 ARM-based CPU
    12/15/2017
    • ECDSA:
      • 186-4:
        • Signature Verification:
          • P-224 SHA: SHA-256
        • Prerequisite: SHS #4072
    1287McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Andy Nissen
    andy.nissen@intel.com
    651-770-6151

    McAfee Advanced Threat Defense

    4.0


    A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

      • Intel Xeon w/ Linux 4.4.27
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4090, DRBG #1843
    1286SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    OpenJDK

    1.8.0-jdk8u152-b01-20170213 (Firmware)


    CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc..

      • Intel Xeon with AES-NI
      • Intel Core i5 with AES-NI
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4089, DRBG #1836
    1285SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    libcrypto

    1.0.2k (Firmware)


    OpenSSL v1.0.2k with minor patches.

      • Intel Core i5 with AES-NI
      • Intel Xeon with AES-NI
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4088, DRBG #1836
    1284Certes Networks, Inc.
    300 Corporate Center Drive
    Suite 140
    Pittsburgh, PA 15108
    USA

    Sean Everson
    sean.everson@certesnetworks.com
    1.412.357.1130
    Fax: 1.412.262.2574

    Gary Brunner
    gary.brunner@certesnetworks.com
    1.412.200.2177
    Fax: 1.412.262.2574

    CryptoFlow Net Creator Java Crypto Module

    1.0


    The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

      • Intel Xeon E3-1270v5 w/ CentOS 6.7
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4087, DRBG #1842
    1283RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    FIPS Program
    fips-program@rsa.com

    RSA BSAFE® Crypto-J JSAFE and JCE Software Module

    6.2.4


    RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

      • Intel Core i5 w/ Windows 10 (64-bit)
      • Intel Xeon w/ CentOS 7.3
      • Qualcomm Snapdragon w/ Android 7.1.2
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4085, DRBG #1841
    1282Ruckus Wireless, Inc.
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Suneetha Sarala
    Suneetha.Sarala@arris.com
    650-265-4200

    Julie Lu
    Julie.Lu@arris.com
    650-265-4200

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • ARM Cortex A9
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4081, DRBG #1837
    1281Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    SafeXcel 1746 Chip

    SF914-17060-100B


    The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

      • N/A
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4080, DRBG #1704
    1280Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    Luna K6 Cryptographic Library

    6.24.6 (Firmware)


    The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4080, DRBG #1704
    1279Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

      • Apple A10X w/ tvOS 11 Fusion
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4076, DRBG #1832
    1278Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    Luna G5 Cryptographic Library

    6.24.6 (Firmware)


    The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4075, DRBG #1704
    1277Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto Virtual

    F6.2


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Xeon E series w/ ESXi 6.0, Intel Xeon D series w/ ESXi 6.0, Intel Xeon D series w/ NFVIS 3.5, Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ NFVIS 3.5, Intel Xeon Scalable series w/ ESXi 6.0
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4074, DRBG #1828
    1276Cavium, Inc.
    2315 N 1st Street
    San Jose, CA 95131
    USA

    Tejinder Singh
    Tejinder.Singh@caviumnetworks.com
    408-943-7403
    Fax: 408-577-1992

    Phanikumar Kancharla
    Pkkancharla@caviumnetworks.com
    408-943-7496

    ngfips_ecc

    CN52XX 1.0.1 (Firmware)


    The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

      • Cavium Networks OCTEON CN52XX Processor with NITROX CN16XX
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #1165, DRBG #32
    1275Brocade Communications Systems LLC
    120 Holger Way
    San Jose, CA 95110
    USA

    Hamid Sabouti
    hamid.sobouti@broadcom.com
    408-333-4150
    Fax: 408-333-3844

    Brocade Fabric OS FIPS Cryptographic Module

    8.2.0


    Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

      • NXP Semiconductors T1042 (e5500 core) w/ Fabric OS 8.2
      • NXP Semiconductors MPC8548 (e500v2 core) w/ Fabric OS 8.2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4071, DRBG #1827
    1274SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 with AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4070, DRBG #1826
    1273SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 without AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4069, DRBG #1825
    1272SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS z13

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • z13 w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4068, DRBG #1824
    1271Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    ProtectServer Internal Express Cryptographic Library

    5 (Firmware)


    The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4067, DRBG #1704
    1270Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    SafeXcel 1746 Chip

    SF914-17060-100B


    The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

      • N/A
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4050, DRBG #1704
    1269Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell MV78460-B0 w/ Lexmark Linux v4
    11/22/2017
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Signature Verification:
          • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4064, DRBG #1821
    1268Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell 88PA6270C0 w/ Lexmark Linux v4
    11/22/2017
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Signature Verification:
          • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4063, DRBG #1820
    1267Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - HW-Authentec

    CN7130 15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4030, DRBG #1769
    1266Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    Luna IS Cryptographic Library

    6.3.2 (Firmware)


    The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module's firmware or associated co-processor.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    11/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4050, DRBG #1704
    1265Cisco Systems, Inc.
    170 W Tasman Dr
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6520

    CiscoSSL FIPS Object Module

    6.0 (Firmware)


    The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

      • Apple A10 on iOS 10.x
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-192, P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-384, SHA-512
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-384, SHA-512
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4046, DRBG #1787
    1264Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4033, DRBG #1770
    1263Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations

    6.3.9600


    The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
      • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #2373, DRBG #489
    1262Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4028, DRBG #1767
    1261Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple 10X Fusion w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4027, DRBG #1766
    1260Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4026, DRBG #1765
    1259Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4025, DRBG #1764
    1258Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4024, DRBG #1762
    1257Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4023, DRBG #1761
    1256Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4022, DRBG #1759
    1255Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4021, DRBG #1758
    1254Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto

    F6.2 (Firmware)


    The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

      • Intel Atom C2xxx Family, Intel Xeon 34xx Family
      • Intel Xeon E Family
      • Intel Xeon D Family
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4012, DRBG #1735
    1253Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub Virtual TPM Implementations

    10.0.15063.674


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Prerequisite: SHS #4011, DRBG #1734
    1252Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

    10.0.16299


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Prerequisite: SHS #4009, DRBG #1733
    1251Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub MsBignum Cryptographic Implementations

    10.0.15063.674


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4011, DRBG #1732
    1250Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub SymCrypt Cryptographic Implementations

    10.0.15063.674


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4011, DRBG #1732
    1249Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

    10.0.15254


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4010, DRBG #1731
    1248Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

    10.0.15254


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4010, DRBG #1731
    1247Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

    10.0.16299


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4009, DRBG #1730
    1246Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

    10.0.16299


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Standard Core (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R740 Server w/ Windows Server Datacenter Core (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5290 w/ Windows 10 Pro Fall Creators Update (x64)
    11/9/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4009, DRBG #1730
    1245Monkton, Inc
    2236 Central Ave
    Tysons, VA 22182
    USA

    Harold E. Smith III
    harold@monkton.io
    571-527-6680

    OpenSSL

    1.0.2L


    Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton's Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

      • Apple A10 Fusion w/ iOS 10.3.2
      • Apple A10X w/ iOS 10.3.2
    11/9/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4008, DRBG #1632
    1244Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Kevin Meagher
    KMeagher@ciena.com

    Ciena 6500 Packet Optical Family

    12.3


    Ciena's Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

      • PowerQUICC II w/ VxWorks 6.1
      • PowerQUICC II w/ VxWorks 6.3
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #3992, DRBG #1706
    1243Hewlett Packard Enterprise
    8000 Foothills Blvd.
    Roseville, CA 95747
    USA

    Susan Scotten
    susan.scotten@hpe.com
    1-916-540-1109

    Aruba Campus Switch Series Crypto Library

    16.04 (Firmware)


    Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

      • Freescale P2020 Dual Core
      • Dual Core ARM Coretex
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384
        • Prerequisite: DRBG #1705
    1242Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    SafeXcel 3120 Chip

    SF114-011206-001A, v2.9.5


    The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

      • N/A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-224
          • P-256 SHA: SHA-224, SHA-256
          • P-384 SHA: SHA-224, SHA-256, SHA-384
        • Signature Verification:
          • P-192 SHA: SHA-1
          • P-224 SHA: SHA-1, SHA-224
          • P-256 SHA: SHA-1, SHA-224, SHA-256
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • Prerequisite: SHS #3988, DRBG #1704
    1241Cisco Systems, Inc
    170 W Tasman Drive
    San Jose, California 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6250

    IOS Common Cryptographic Module (IC2M)

    Rel 5 (Firmware)


    The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

      • MIPS64
      • Intel Atom
      • Intel Xeon
      • Intel Xeon on ESXi 5.5
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
        • Prerequisite: SHS #3760, DRBG #1529
    1240Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    Natalya Robert
    natalya.robert@thalesesec.com
    954-888-6268

    Robert Burns
    robert.burns@thalesesec.con
    954-888-6215

    Vormetric Data Security Manager Virtual Appliance Module

    6.0.0


    The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

      • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3987, DRBG #1703
    1239Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    Natalya Robert
    natalya.robert@thalesesec.com
    954-888-6268

    Robert Burns
    robert.burns@thalesesec.con
    954-888-6215

    Vormetric Data Security Manager Module

    6.0.0 (Firmware)


    The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

      • Intel Xeon
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3986, DRBG #1702
    1238F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP vCMP on B4450 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3983, DRBG #1700
    1237SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE libgcrypt using generic C implementation

    3.0


    This test covers generic C implementation of multiple algorithms.

      • z13 w/ SUSE Linux Enterprise Server 12 SP2
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-256
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
          • P-521 SHA: SHA-256
        • Signature Verification:
          • P-224 SHA: SHA-256
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
          • P-521 SHA: SHA-256
        • Prerequisite: SHS #3982, DRBG #1699
    1236F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP vCMP on B2250 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3981, DRBG #1698
    1235F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP 10350F TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3980, DRBG #1697
    1234F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP B4450N TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3979, DRBG #1696
    1233F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038
    Fax: ~

    BigIP B2250 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3978, DRBG #1695
    1232F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP vCMP on B4450 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3977, DRBG #1694
    1231F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP B4000 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3976, DRBG #1693
    1230F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP i5820 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3975, DRBG #1692
    1229F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP B7000 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E3-1275
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3974, DRBG #1691
    1228F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP i7820 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1650
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3976, DRBG #1693
    1227F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP i4000 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3972, DRBG #1689
    1226F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B4450N OpenSSL Software Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3971, DRBG #1688
    1225F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B2250 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3970, DRBG #1687
    1224F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP 10350F OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3969, DRBG #1686
    1223F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP vCMP on B2250 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3968, DRBG #1685
    1222F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B4000 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3967, DRBG #1684
    1221F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP i4000 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3966, DRBG #1683
    1220F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP i7820 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1650
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3965, DRBG #1682
    1219F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP i5820 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3964, DRBG #1681
    1218F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B7000 OpenSSL Software Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

      • Intel(R) Xeon(R) CPU E3-1275
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3963, DRBG #1680
    1217
    10/27/2017
      1216Synopsys, Inc.
      690 East Middlefield Road
      Mountain View, CA 94043
      USA

      Dana Neustadter
      danan@synopsys.com
      +1(613)595-9836

      DWC Cryptography Software Library

      4.2.0


      The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

        • ARC® EM7D Processor with CryptoPack w/ n/a
      10/20/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3958, DRBG #1676
      1215IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      1-845-435-5538

      William Santiago
      wsf1@us.ibm.com
      1-845-435-9265

      Miniboot 1.30 with 00CW683

      Andretta 2.0 (00CW683) MB1.30 Hash E215 7B6F (Firmware)


      Miniboot implemented algorithms with hardware acceleration

        • IBM PowerPC 405
      10/20/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3957, DRBG #1675
      1214IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      1-845-435-5538

      William Santiago
      wsf1@us.ibm.com
      1-845-435-9265

      Miniboot 1.30 with 00KP899

      Andretta 2.0 (00KP899) MB1.30 Hash E215 7B6F (Firmware)


      Miniboot implemented algorithms with hardware acceleration

        • IBM PowerPC 405
      10/20/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3956, DRBG #1674
      1213Infoblox
      3111 Coronado Drive
      Santa Clara, CA 95054
      USA

      Dave Funk
      dfunk@infoblox.com
      408-986-5591

      NIOS Cryptographic Library

      2.0 (Firmware)


      Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

        • Intel Xeon w/ VMware ESXi 5
        • Intel Xeon
        • Intel Xeon w/ VMware ESXi 6
        • Intel Core i3
      10/13/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3953, DRBG #1671
      1212Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Common Cryptographic Module

      AOS VMC 6.4.2.0-1.3-FIPS (Firmware)


      Linux on Intel

        • Intel x86, i7
      10/13/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1211Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • NXP QorIQ P10XX Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1210Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ8068
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1209Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Broadcom BCM53014A
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1208Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • XLP400 Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1207Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • XLP300 Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1206Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • XLP200 Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1205Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      JUNOS Version 17.3R1-OpenSSL

      17.3R1 (Firmware)


      The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

        • Intel Xeon D-1531
      10/6/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #3939, DRBG #1666
      1204SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Sales
      na

      CryptoComply Server Engine

      2.1


      CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

        • Intel i7 w/ CentOS 7
      9/29/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3929, DRBG #1662
      1203MediaTek Inc.
      No.1, Dusing Rd. 1, Hsinchu Science Park
      Hsinchu, Taiwan 30078
      Taiwan

      William Cheng
      William.cheng@mediatek.com
      +1-858-731-9200
      Fax: +1-858-731-9201

      MingHsien Hsieh
      minghsien.hsieh@mediatek.com
      +886-3-567-0766
      Fax: +886-3-578-7610

      MTK CryptoCore V1.0 Secure Core

      MTK CryptoCoreV1.0 S Core sw-cc710tee-2.0.5.1279 (Firmware)


      The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

        • ARM TrustZone-Enabled Cortex-A Series CPU
      9/29/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3927, DRBG #1661
      1202Sonus Networks, Inc.
      4 Technology Park Drive
      Westford, MAS 01886
      USA

      Keith Conger
      kconger@sonusnet.comkconger@sonusnet.com
      978-614-8115

      Adam Elshama
      aelshama@sonusnet.com
      978-614-8327

      Sonus Cryptographic Library version 3.0

      5.1.2


      Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

        • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3836, DRBG #1588
      1201Hewlett-Packard Development Company, L.P.
      11445 Compaq Center Drive W
      Houston, TX 77070
      USA

      Hridya Valakkadavil Thilakan
      hridya-valakkadavil.thilakan@hpe.com

      Aprana Shrivastava
      aprana.shrivastava@hpe.com

      HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

      4.71 (Firmware)


      The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

        • PowerPC 440EPx
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3920, DRBG #1654
      1200FireEye, Inc.
      1440 McCarthy Boulevard
      Milipitas, CA 90655
      USA

      Steve Lanser
      steve.lanser@fireeye.com
      508-983-2505

      FireEye Cryptographic Implementation

      1.0


      The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

        • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3919, DRBG #1653
      1199Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Linda Gallops
      linda.gallops@oracle.com
      +1 704.972.5018
      Fax: +1 980.355.5399

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 NSS without AES-NI

      R6-1.0.0


      Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3918, DRBG #1652
      1198IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL for the IBM MaaS360 Cloud Extender

      2.91


      The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #3914, DRBG #1650
      1197Cisco Systems, Inc.
      170 West Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Cisco Security Crypto Virtual

      F6.0


      FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

        • Intel Xeon E series w/ ESXi 6.0
        • Intel Xeon E series w/ ESXi 5.5
      9/15/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3913, DRBG #1649
      1196Bomgar Corporation
      578 Highland Colony Parkway
      Paragon Centre, Suite 300
      Ridgeland, MS 39157
      USA

      Faye Santangelo
      FSantangelo@bomgar.com
      6016078322

      Bomgar Cryptographic Engine

      2.0.13 (Firmware)


      The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

        • Intel® Xeon E5-2640 v3
      9/15/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3912, DRBG #1648
      1195SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE libgcrypt using generic C implementation

      3.0


      This test covers generic C implementation of multiple algorithms.

        • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
      9/8/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-256
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
            • P-521 SHA: SHA-256
          • Signature Verification:
            • P-224 SHA: SHA-256
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
            • P-521 SHA: SHA-256
          • Prerequisite: SHS #3910, DRBG #1644
      1194Lenovo Group Limited
      7001 Development Drive
      Morrisville, NC 27560
      USA

      James Takahashi
      jtakahashi2@lenovo.com
      503-643-8308

      Taylor Greenwood
      tgreenwood@lenovo.com
      515-450-7432

      Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

      1.0


      The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

        • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
      9/8/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3905, SHS #3906, SHS #3907, DRBG #1641
      1193FireEye, Inc.
      1440 McCarthy Boulevard
      Milipitas, CA 90655
      USA

      Steve Lanser
      steve.lanser@fireeye.com
      508-983-2505

      FireEye SSL

      1.0 (Firmware)


      The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

        • Intel Xeon
        • Intel Xeon with ESXi 6.5
        • Intel Atom
        • AMD Opteron
      9/8/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • Prerequisite: SHS #3904, DRBG #1638
      1192VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      Michael McKay
      mmckay@vmware.com
      650-427-3615
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3902, DRBG #1637
      1191Legion of the Bouncy Castle Inc.
      85 The Crescent
      Ascot Vale, Victoria 3032
      Australia

      David Hook
      dgh@bouncycastle.org
      +61438170390

      Jon Eaves
      jon@bouncycastle.org
      +61417502969

      Bouncy Castle FIPS Java API

      1.0.1


      The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

        • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
        • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3901, DRBG #1636
      1190Software Diversified Services
      1322 81st Ave NE
      Minneapolis, MN 55432
      USA

      Tim Full
      cavp@sdsusa.com

      SDS Cryptographic Module

      1.0


      Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

        • Intel i7 with AES-NI w/ Windows Server 2012 R2
        • Intel i7 with AES-NI w/ Windows Server 2016
        • Intel i7 with AES-NI w/ RedHat 6.9
        • Intel i7 with AES-NI w/ RedHat 7.4
        • POWER8 w/ AIX 6.1
        • POWER8 w/ AIX 7.2
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3898, DRBG #1635
      1189Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      Luna K7 Cryptographic Library

      7.0.1 (Firmware)


      The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

        • PowerPC 476
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Prerequisite: DRBG #200556-0-N-00
      1188Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      Luna K7 Accelerated Cryptographic Library

      7.0.1 (Firmware)


      The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

        • PowerPC 476
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3896, DRBG #1634
      1187A10 Networks, Inc.
      3 West Plumeria Drive
      San Jose, CA 95134
      USA

      John Chiong
      +1 408 325-8668

      A10 Networks Data Plane FIPS Software Library

      3.0.0 (Firmware)


      The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

        • Intel Xeon E3-1275v2 with AES-NI
        • Intel Xeon E5-1650v3 with AES-NI
        • Intel Xeon E5-2697v2 with AES-NI
        • Intel Xeon E5-2697v4 with AES-NI
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #2013, DRBG #1633
      1186Monkton, Inc
      2236 Central Ave
      Tysons, VA 22182
      USA

      Harold E. Smith III
      harold@monkton.io
      571-527-6680

      OpenSSL

      1.0.2L


      Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton's Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

        • Apple A10X w/ iOS 10.3.2
        • Apple A10 Fusion w/ iOS 10.3.2
      8/25/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • B-233 SHA: SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-233 SHA: SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3894, DRBG #1632
      1185SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      Ray Potter
      ray@safelogic.com
      650-646-1702

      CryptoComply Server Engine

      2.2


      CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

        • Intel Celeron w/ CentOS 7.3
      8/25/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3893, DRBG #1631
      1184ARM Ltd
      110 Fulbourn Road
      Cambridge CB1 9NJ
      United Kingdom

      Leo Dorrendorf
      leo.dorrendorf@arm.com
      +972-52-6818594
      Fax: +972-73-2558808

      Udi Maor
      udi.maor@arm.com
      +972-54-4205101
      Fax: +972-73-2558808

      ARM TrustZone Cryptocell 712 TEE

      CC 712 TEE


      ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3892, DRBG #1630
        1183Nuvoton Technology Corporation
        No. 4, Creation Rd. III
        Hsinchu Science Park 300
        Taiwan, R.O.C.

        Yossi Talmi
        yossi.talmi@nuvoton.com
        +972-9-9702364
        Fax: +972-9-9702001

        Oren Tanami
        oren.tanami@nuvoton.com
        +972-9-9702390
        Fax: +972-9-9702001

        Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

        LAG019


        Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Library Family 2.0, Level 00, Revision 01.16

          • N/A
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-256, SHA-384
            • Prerequisite: SHS #3890, DRBG #1628
        1182Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Red Hat NSS Softoken (64 bit)

        5.0


        User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3885, DRBG #1626
        1181Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        Red Hat NSS Softoken (32 bit)

        5.0


        User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

          • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3884, DRBG #1625
        1180IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core without PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • SPARC T4 w/ Solaris(R) 11 64-bit
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3883, DRBG #1624
        1179IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • SPARC T4 w/ Solaris(R) 11 64-bit
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3882, DRBG #1623
        1178IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core without PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3881, DRBG #1622
        1177IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3879, DRBG #1620
        1176IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core without PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3878, DRBG #1619
        1175IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3877, DRBG #1618
        1174IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core without PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3876, DRBG #1617
        1173IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3875, DRBG #1616
        1172IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3874, DRBG #1615
        1171IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3872, DRBG #1613
        1170IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3871, DRBG #1612
        1169IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3870, DRBG #1611
        1168IBM(R) Corporation
        Seabank Centre
        12 - 14 Marine Parade
        Southport, QLD 4215
        Australia

        Peter Waltenberg
        pwalten@au1.ibm.com
        +61 7 5552 4016
        Fax: +61 7 5571 0420

        ICC Algorithmic Core with PAAs

        8.6.0.0


        ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

          • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3869, DRBG #1610
        1167Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49-D100- OpenSSL-vSRX

        15.1X49-D100


        The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

          • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3865, DRBG #1609
        1166Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49-D100- Quicksec

        15.1X49-D100


        The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

          • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
        8/18/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3864, DRBG #1608
        1165Yubico
        420 Florence St, Ste 200
        Palo Alto, CA 94301
        USA

        Jerrod Chong
        jerrod@yubico.com

        Jakob Ehrensvard
        jakob@yubico.com

        Yubico HW/FW ECC

        SLE78CLUFX3000PH e58230b8 with Infineon CL70 1.03.006 (Firmware)


        This module contains three parts: 1) ECC core hardware/firmware implementation via Infineon CL70 crypto library; 2) High-level firmware implementation for key generation and ECDSA signature generation; 3) ECC curve domain parameters

          • Infineon SLE78V2
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Prerequisite: DRBG #1604
        1164Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49-D100-QuickSec

        15.1X49-D100 (Firmware)


        The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

          • Intel Xeon E5
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3857, DRBG #1603
        1163Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49-D100-OpenSSL

        15.1X49-D100 (Firmware)


        The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

          • Intel Xeon E3
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3856, DRBG #1602
        1162Hewlett Packard Enterprise Storage
        4209 Technology Drive
        Fremont, CA 94538
        USA

        Kurt Heberlein
        kurt.w.heberlein@hpe.com
        +1 512 319 1294

        David Heisser
        david.heisser@hpe.com
        +1 650 209 0937

        HPE-3PAR SSMC 3.2 with Java JCE v1.8

        HPE-3PAR SSMC 3.2


        HPE-3PAR StoreServ Management Console (SSMC) 3.2 running on Windows 2012 R2, Windows 2016, RHEL7.3, or hpelinux (Debian 8) in a Java 1.8 JVM with BouncyCastle JCE provider v156 on any Intel E5 family CPU.

          • Intel Xeon E5 Family w/ Windows 2012
          • Intel Xeon E5 Family w/ Windows 2016
          • Intel Xeon E5 Family w/ hpelinux (Debian 8)
          • Intel Xeon E5 Family w/ RHEL 7.3
        8/11/2017
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3852
        1161Trend Micro Inc.
        11305 Alterra Parkway
        Austin, TX 78758
        USA

        Paul Tucker
        paul_tucker@trendmicro.com
        512-633-7945

        TippingPoint Crypto Core OpenSSL

        2.0.13


        The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

          • Intel Core i3 without PAA w/ Linux 4.4
          • Intel Xeon with PAA w/ Linux 4.4
          • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3850, DRBG #1601
        1160SafeLogic, Inc.
        530 Lytton Ave
        Suite 200
        Palo Alto, CA 94301
        USA

        SafeLogic Inside Sales
        sales@safelogic.com
        (844) 436-2797

        CryptoComply Java Engine

        3.0.1


        CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

          • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3849, DRBG #1600
        1159LG Electronics, Inc.
        20 Yoido-dong
        Youngdungpo-gu
        Seoul 152-721
        Republic of Korea

        Jongseong Kim
        jongseong.kim@lge.com
        82-10-4535-0110
        Fax: 82-2-6950-2080

        LG BoringSSL

        2.0


        General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

          • Snapdragon 835 (MSM8998) w/ Android 7.1.2
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3841, DRBG #1592
        1158NetBrain Technologies, Inc
        15 Network Drive 2nd Floor
        Burlington, Massachusetts 01803
        United States

        Michael Passanisi
        Michael.Passanisi@netbraintech.com
        781-221-7199 (x2055)
        Fax: +1 (781) 998-5800

        Boyang Zhang
        boyang.zhang@netbraintech.com
        781-221-7199 (x2059)

        NetBrain OpenSSL Cryptographic Module

        1.0


        The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

          • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3840, DRBG #1591
        1157Taisys Technologies Co. Ltd.
        7F., No.56, Lane 321
        Yangguang St., Neihu Dist.
        Taipei, Taipei 11491
        Taiwan (R.O.C.)

        Joe Wang
        joe.wang@taisys.com
        +886-2-26270927x6699
        Fax: +886-2-26270619

        Kent Horng
        kent.horng@taisys.com
        +886-2-26562185 #206
        Fax: +886-2-26579657

        TAISYS JUISE-S2

        ST33G1M2


        The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

          • N/A
        8/11/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3838, DRBG #1590
        1156Thales e-security
        900 South Pine Island Road
        Suite 710
        Plantation, Florida 33324
        USA

        Thales Sales
        sales@thalesesec.com
        888-744-4976

        TASP-ECDSA

        V1.0(Hardware) V1.0 (Firmware)


        ECDSA for TASP Bootstrap

          • NXP QorIQ T4081
        8/11/2017
        • ECDSA:
          • 186-4:
            • Signature Generation:
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3829
        1155Cisco Systems, Inc.
        170 W Tasman Dr
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        CiscoSSL FIPS Object Module

        6.0 (Firmware)


        The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Intel Xeon on VMware ESXi 5.5
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3831, DRBG #1583
        1154Cisco Systems, Inc.
        170 W Tasman Dr
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        CiscoSSL FIPS Object Module

        6.0 (Firmware)


        The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Intel Xeon
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3830, DRBG #1581
        1153Qualcomm Technologies, Inc.
        5775 Morehouse Dr
        San Diego, CA 92121
        USA

        Yin Ling Liong
        yliong@qti.qualcomm.com
        858-651-7034
        Fax: 858-845-1523

        Qualcomm Secure Execution Environment (QSEE) Secure App Software Crypto 64bit Module

        TZ.BF.4.0.6-00128


        App Software Crypto Module provides various software cryptographic functionalities to the 64bit QSEE Trusted Applications.

          • Snapdragon 835 w/ Qualcomm Secure Execution Environment (QSEE)
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • Prerequisite: SHS #3826, DRBG #1455
        1152Qualcomm Technologies, Inc.
        5775 Morehouse Dr
        San Diego, CA 92121
        USA

        Yin Ling Liong
        yliong@qti.qualcomm.com
        858-651-7034
        Fax: 858-845-1523

        Qualcomm Secure Execution Environment (QSEE) Secure App Software Crypto 32 bit Module

        TZ.BF.4.0.6-00128


        QSEE Secure App Software Crypto Module provides various software cryptographic

          • Snapdragon 835 w/ Qualcomm Secure Execution Environment (QSEE)
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • Prerequisite: SHS #3825, DRBG #1455
        1151Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        OpenSSL (no AVX2, x86_64, 32-bit library)

        5.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3824, DRBG #1579
        1150Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        OpenSSL (no AVX2, x86_64, 64-bit library)

        5.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3823, DRBG #1578
        1149RSA, The Security Division of EMC
        174 Middlesex Turnpike
        Bedford, MA 01730
        USA

        Rohit Mathur
        rohit.mathur@rsa.com
        +61730325220

        RSA BSAFE Crypto-C Micro Edition

        4.1.3.2


        RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

          • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3822, DRBG #1577
        1148Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        OpenSSL (Full CPU set, x86_64, 32-bit library)

        5.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3821, DRBG #1576
        1147Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        GnuTLS_x86_64_C

        5.0


        GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

          • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3818, DRBG #1575
        1146Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        GnuTLS_x86_C

        5.0


        GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

          • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3817, DRBG #1574
        1145Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Linda Gallops
        linda.gallops@oracle.com
        +1 704.972.5018
        Fax: +1 980.355.5399

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux 7 NSS without AES-NI

        R7-2.0.0


        Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

          • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3808, DRBG #1568
        1144Red Hat, Inc.
        100 E. Davie Street
        Raleigh, NC 27601
        USA

        Jaroslav Reznik
        jreznik@redhat.com

        OpenSSL (Full CPU set, x86_64, 64-bit library)

        5.0


        The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

          • Intel(R) Xeon(R) E5 w/ Red Hat Enterprise Linux 7.4
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3807, DRBG #1567
        1143DocuSign, Inc.
        221 Main St.
        Suite 1000
        San Francisco, CA 94105
        USA

        Ezer Farhi
        ezer@arx.com
        972-39279529
        Fax: 972-39230864

        Moshe Harel
        Moshe.Harel@docusign.com
        972-3-9279578
        Fax: 972-3-9230864

        PrivateServer

        5.0.2 (Firmware)


        PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

          • Intel Xeon Quad-Core
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3804, DRBG #1565
        1142Trusted Concepts
        205 Van Buren St
        Suite 440
        Herndon, VA 20170
        USA

        Chris Greenlee
        chris.greenlee@trustedconcepts.com
        202.680.3718

        TrustedKeep Encryption Module

        1.8.3


        TrustedKeep is a secure object storage and sharing solution.

          • Intel Core i7 w/PAA w/ CentOS 7.3
          • Intel Core i7 w/o PAA w/ CentOS 7.3
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
            • Prerequisite: SHS #3801, DRBG #1563
        1141Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49-D100-QuickSec

        15.1X49-D100 (Firmware)


        The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

          • Intel Xeon E3
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3798, DRBG #1560
        1140Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49-D100-OpenSSL

        15.1X49-D100 (Firmware)


        The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

          • Intel Xeon E5
        8/4/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3795, DRBG #1559
        1139Google, Inc.
        1600 Amphitheatre Parkway
        Mountain View, CA 94043
        USA

        Titan Key FIPS officer
        titan-key-fips-officer@google.com

        Titan Key

        1.0


        Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

          • N/A
        7/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256
            • Signature Generation:
              • P-256 SHA: SHA-256
            • Signature Verification:
              • P-256 SHA: SHA-256
            • Prerequisite: SHS #3794, DRBG #1558
        1138Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Oracle Security Evaluations
        Seceval_us@oracle.com
        +1.800.392.299

        Chris Brych
        +1 613.216.3078

        Oracle ILOM OpenSSL FIPS Object Module

        2.0.10


        Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 140-2 as a software module, multichip standalone module

          • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
          • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
          • Oracle ILOM SP V4 (ARM V5) without PAA w/ Oracle ILOM OS v3.0
        7/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3793, DRBG #1557
        1137Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiOS SSL Cryptographic Library

        5.4 (Firmware)


        This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

          • ARM v5 Compatible (SoC2)
          • ARM v7 Compatible (SoC3)
          • Intel Celeron
          • Intel Xeon E5
          • Intel i3
          • Intel i5
          • Intel i7
        7/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3792, DRBG #1543
        1136Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

        10.0.15063


        The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
        7/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Prerequisite: SHS #3790, DRBG #1556
        1135Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations

        10.0.15063


        The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
          • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
          • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
          • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
        7/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3790, DRBG #1555
        1134Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        Madhu Mathiyalagan
        madhu.mathiyalagan@oracle.com
        (781) 578-7514

        Chris Brych
        chris.brych@oracle.com
        (613) 216-3078

        Oracle Acme Packet OpenSSL Cryptographic Library

        ECz 7.5.0


        The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
        7/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3754, DRBG #1524
        1133Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Mike Grimm
        FIPS@microsoft.com
        800-Microsoft

        Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

        10.0.15063


        The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
          • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
          • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
          • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
          • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
          • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
          • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
          • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
          • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
          • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
        7/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3790, DRBG #1555
        1132Hewlett-Packard Development Company, L.P.
        11445 Compaq Center Drive W
        Houston, TX 77070
        USA

        Timothy McDonough
        timothy.mcdonough@hpe.com

        Hewlett Packard Enterprise SSL Crypto Module Engine

        2.1


        Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

          • ARM i.MX6 w/ Yocto Linux 3.0.35
        7/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3790, DRBG #1554
        1131SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

        3.0


        This test covers assembler implementation of AES, SHA and GHASH.

          • z13 w/ SUSE Linux Enterprise Server 12 SP2
        7/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3788, DRBG #1552
        1130Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiASIC CP9 Cryptographic Library v5.4

        CP7


        The Fortinet CP9 is a proprietary ASIC providing hardware based cryptographic acceleration for Fortinet products.

          • N/A
        7/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3781, DRBG #1543
        1129Fortinet Inc.
        1090 Kifer Road
        Sunnyvale, CA 94086-5301
        USA

        Alan Kaye
        akaye@fortinet.com
        613-225-9381 x87416
        Fax: 613-225-9951

        Fortinet FortiOS FIPS Cryptographic Library

        5.4 (Firmware)


        This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

          • ARM v5 Compatible (SoC2)
          • ARM v7 Compatible (SoC3)
          • Intel Celeron
          • Intel Xeon E5
          • Intel i3 Series
          • Intel i5 Series
          • Intel i7 Series
        7/14/2017
        • ECDSA:
          • 186-4:
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3777, DRBG #1543
        1128Hewlett Packard Enterprise
        1160 Enterprise Way
        Sunnyvale, CA 94089
        USA

        Indra Fitzgerald
        indra.fitzgerald@hpe.com
        541-360-6218

        HPE Atalla Cryptographic Subsystem

        1.20 (Firmware)


        The Atalla Cryptographic Subsytem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities.

          • Cavium Octeon III CN73xx, 16 cores, 1.8 Ghz
        7/14/2017
        • ECDSA:
          • 186-4:
            • Signature Verification:
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3776, DRBG #1542
        1127SUSE, LLC
        10 Canal Park, Suite 200
        Cambridge, MA 02141
        USA

        Andreas Stieger
        astieger@suse.com
        +49 911 74053 384

        Thomas Biege
        thomas@suse.de
        +49 911 74053 500

        SUSE OpenSSL using SHA assembler

        3.0


        This test covers generic assembler implementation of SHA.

          • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
        7/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3771, DRBG #1539
        1126Forcepoint LLC
        10900-A Stonelake Blvd
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (3305)

        2.0


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
        7/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3767, DRBG #1534
        1125Forcepoint LLC
        10900-A Stonelake Blvd
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (2105)

        2.0


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
        7/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3766, DRBG #1533
        1124Forcepoint LLC
        10900-A Stonelake Blvd
        Ste. 350
        Austin, TX 78759
        USA

        Klaus Majewski
        legal@forcepoint.com
        1-858-320-8000

        Jorma Levomäki
        legal@forcepoint.com
        1-858-320-8000

        Forcepoint NGFW Cryptographic Library Module (325)

        2.0


        Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

          • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
        7/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3765, DRBG #1532
        1123IBM Corporation
        2455 South Road
        Poughkeepsie, New York 12601-5400
        USA

        John Monti
        jmonti@us.ibm.com
        845-435-4164

        IBM z/OS(R) Cryptographic Services ICSF PKCS #11

        OA52336


        ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

          • IBM z13 w/ IBM z/OS(R) v2.2
        7/8/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3761, DRBG #1530
        1122Cisco Systems, Inc
        170 W Tasman Drive
        San Jose, California 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6250

        IOS Common Cryptographic Module (IC2M)

        Rel5 (Firmware)


        The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

          • MIPS64
          • Intel Atom
          • Intel Xeon on ESXi 5.5
          • PPC405
          • PPCe500
          • PPCe5500
          • Intel Core i3
          • Intel Pentium
          • Intel Xeon
          • PPC465
        7/8/2017
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256
            • Prerequisite: SHS #3760, DRBG #1529
        1121L3 Communications Canada / Targa Systems Division
        2081 Merivale Road
        Ottawa, ON K2G1G9
        Canada

        Dave Saunders
        Dave.Saunders@l-3com.com
        613-727-9876
        Fax: 613-727-1705

        Series 4 Gen 3 DTU

        1.0.0-32004093 (Firmware)


        Network Attached Storage device with removable storage.

          • Freescale P1022
        6/30/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3755, DRBG #1525
        1120F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        Ravi Kasinadhuni
        R.Kasinadhuni@f5.com
        206-272-7467

        Crypto for BIG-IP with AES and SHA assembler

        12.1.3.4


        Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

          • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3753, DRBG #1523
        1119F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        Ravi Kasinadhuni
        R.Kasinadhuni@f5.com
        206-272-7467

        Crypto for BIG-IP with AES and SHA assembler

        12.1.3.4


        Cryptographic library offering various cryptographic mechanisms to BigIP product.

          • Intel E5-2658 v3 w/ BIG-IP 12.1.3.4
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3750, DRBG #1520
        1118F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        Ravi Kasinadhuni
        R.Kasinadhuni@f5.com
        206-272-7467

        Crypto for BIG-IP with AES and SHA assembler

        12.1.3.4


        Cryptographic library offering various cryptographic mechanisms to BigIP product.

          • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3749, DRBG #1519
        1117F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        Ravi Kasinadhuni
        R.Kasinadhuni@f5.com
        206-272-7467

        Crypto for BIG-IP with AES and SHA assembler

        12.1.3.4


        Cryptographic library offering various cryptographic mechanisms to BigIP product.

          • Intel E5-2658 v2 w/ BIG-IP 12.1.3.4
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3747, DRBG #1517
        1116F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        Ravi Kasinadhuni
        R.Kasinadhuni@f5.com
        206-272-7467

        Crypto for BIG-IP with AES and SHA assembler

        12.1.3.4


        Cryptographic library offering various cryptographic mechanisms to BigIP product.

          • Intel E5-1650 v4 w/ BIG-IP 12.1.3.4
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3745, DRBG #1515
        1115F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        Ravi Kasinadhuni
        R.Kasinadhuni@f5.com
        206-272-7467

        Crypto for BIG-IP with AES and SHA assembler

        12.1.3.4


        Cryptographic library offering various cryptographic mechanisms to BigIP product.

          • Intel E5-1630 v4 w/ BIG-IP 12.1.3.4
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3743, DRBG #1513
        1114Futurex
        864 Old Boerne Road
        Bulverde, TX 78163
        USA

        Futurex Security Certifications
        certifications@futurex.com
        830-980-9782

        OpenSSL

        6.2.0.0 (Firmware)


        The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

          • TI AM3352
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3741, DRBG #1511
        1113Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Kelvin Desplanque
        kdesplan@cisco.com
        6137887216

        CiscoSSL FIPS Object Module

        6.0 (Firmware)


        The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Intel Xeon
        6/23/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3739, DRBG #1509
        1112Google, Inc.
        1600 Amphitheatre Parkway
        Mountain View, CA 94043
        USA

        Adam Langley
        security@chromium.org

        BoringCrypto

        24e5886c0edfc409c8083d10f9f1120111efd6f5


        A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

          • POWER9 w/ Ubuntu Linux 17.04
          • POWER8 w/ Ubuntu Linux 17.04
          • Intel Xeon E5 w/ Ubuntu Linux 16.04
          • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
          • POWER8 without PAA w/ Ubuntu Linux 15.04
        6/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3736, DRBG #1507
        1111Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
        312 Kings Way
        South Melbourne, Victoria 3025
        Australia

        John Weston
        john.weston@senetas.com
        +61 3 9868 4555
        Fax: +61 3 9821 4899

        CN9000 Series Common Crypto Library

        3.0.1 (Firmware)


        The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

          • ARM Cortex A9
        6/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3734, DRBG #1506
        1110Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
        312 Kings Way
        South Melbourne, Victoria 3025
        Australia

        John Weston
        john.weston@senetas.com
        +61 3 9868 4555
        Fax: +61 3 9821 4899

        CN6000 Series Common Crypto Library

        3.0.1 (Firmware)


        The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

          • Intel ATOM
        6/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3733, DRBG #1505
        1109Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
        312 Kings Way
        South Melbourne, Victoria 3205
        Australia

        John Weston
        john.weston@senetas.com
        +61 3 9868 4555
        Fax: +61 3 9821 4899

        CN8000 Series Common Crypto Library

        3.0.1 (Firmware)


        The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

          • Intel Xeon
        6/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3732, DRBG #1504
        1108Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
        312 Kings Way
        South Melbourne, Victoria 3025
        Australia

        John Weston
        john.weston@senetas.com
        +61 3 9868 4555
        Fax: +61 3 9821 4899

        CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

        3.0.1 (Firmware)


        The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

          • ARM Cortex A9
        6/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3731, DRBG #1503
        1107Bivio Networks, Inc.
        4457 Willow Road, Suite 240
        Pleasanton, CA 94588
        USA

        Raj Srinivasan
        raj@bivio.net
        (925) 924-8608
        Fax: (925) 924-8650

        OpenSSL

        1.0.1e-51


        OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

          • Intel® Atom™ CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
        6/16/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-384
            • Prerequisite: SHS #3727, DRBG #1500
        1106Oracle Communications
        100 Crosby Drive
        Bedford, MA 01730
        USA

        Madhu Mathiyalagan
        madhu.mathiyalagan@oracle.com
        (781) 578-7514

        Chris Brych
        chris.brych@oracle.com
        (613) 216-3078

        Oracle Acme Packet OpenSSL Cryptographic Library

        ECz 7.5.0 (Firmware)


        The Acme Packet 1100 and 3900 feature Oracle's purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

          • Intel Atom C2358
          • Intel Xeon D-1548 (Intel Broadwell-DE)
        6/16/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3725, DRBG #1499
        1105Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Linda Gallops
        linda.gallops@oracle.com
        +1 704.972.5018
        Fax: +1 980.355.5399

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

        R7-2.0.0


        Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

          • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
        6/16/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3719, DRBG #1495
        1104Oracle Corporation
        500 Oracle Parkway
        Redwood Shores, CA 94065
        USA

        Linda Gallops
        linda.gallops@oracle.com
        +1 704.972.5018
        Fax: +1 980.355.5399

        Chris Brych
        chris.brych@oracle.com
        +1 613.216.3078

        Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

        R6-1.0.0


        Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

          • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
        6/16/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3718, DRBG #1494
        1103Palo Alto Networks
        4301 Great America Parkway
        Santa Clara, California 95054
        USA

        Richard Bishop
        rbishop@paloaltonetworks.com
        408-753-4000

        Jake Bajic
        jbajic@paloaltonetworks.com
        408-753-3901

        Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

        8.0 (Firmware)


        The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

          • Cavium Octeon MIPS64
          • Cavium MIPS64
          • Intel Multi Core Xeon
          • Intel Celeron
          • Intel i7
        6/9/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3713, DRBG #1489
        1102Amazon Web Services, Inc.
        410 Terry Ave N
        Ste 1200
        Seattle, WA 98109-5210
        USA

        Kelvin Yiu
        kelvinyi@amazon.com

        Ken Beer
        nbeer@amazon.com

        AWS Key Management Service Cryptographic Algorithm Library

        1.0.0 (Firmware)


        The AWS Key Management Service Cryptographic Algorithm Library provides cryptographic functionality for the AWS Key Management Service Hardware Security Module.

          • Intel Xeon E5-2640v4
        6/9/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        1101Palo Alto Networks
        4301 Great America Parkway
        Santa Clara, California 95054
        USA

        Richard Bishop
        rbishop@paloaltonetworks.com
        408-753-4000

        Jake Bajic
        jbajic@paloaltonetworks.com
        408-753-3901

        Palo Alto Networks Crypto Module (PA VM-series)

        8.0


        The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

          • Intel Multi Core Xeon w/ VMware ESXi 5.5
          • Intel Multi Core Xeon w/ Centos 7.2 - KVM
          • Intel Multi Core Xeon w/ Hyper-V 2012 r2
          • Intel Multi Core Xeon w/ AWS EC2
          • Intel Multi Core Xeon w/ Azure
        6/2/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3707, DRBG #1486
        1100Hewlett Packard Enterprise Company
        3000 Hanover Street
        Palo Alto, CA 94304
        USA

        Luis Luciani
        luis.luciani@hpe.com
        281-518-6762

        Edward Newman
        edward.newman@hpe.com
        281-514-2713

        iLO SSL Firmware Crypto Library

        iLO 5 v1.11 (Firmware)


        HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

          • Cortex A9
        6/2/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3706, DRBG #1485
        1099Symantec Corporation
        350 Ellis Street
        Mountain View, CA 94043
        USA

        Jordan Saxonberg
        jordan_saxonberg@symantec.com
        424-750-7052
        Fax: 424-750-8107

        Symantec SymSSLf Cryptographic Module

        Intel Xeon 1.0.1


        Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

          • Intel Xeon with AES-NI w/ Windows 7 SP1
        5/19/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3704, DRBG #1477
        1098Symantec Corporation
        350 Ellis Street
        Mountain View, CA 94043
        USA

        Jordan Saxonberg
        jordan_saxonberg@symantec.com
        424-750-7052
        Fax: 424-750-8107

        Symantec SymSSLf Cryptographic Module

        Intel Xeon 1.0.1


        Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

          • Intel Xeon without AES-NI w/ Windows 7 SP1
        5/19/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3703, DRBG #1476
        1097Intel Corporation
        2200 Mission College Blvd.
        Santa Clara, California 95054
        USA

        Mark Hanson
        mark.hanson@intel.com
        972.963.7326

        McAfee OpenSSL FIPS Object Module

        1.0.0


        The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

          • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
        5/19/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
            • Prerequisite: SHS #3699, DRBG #1474
        1096VT iDirect
        13681 Sunrise Valley Drive, Suite 300
        Herndon, VA 20171
        USA

        Chris Gormont
        CGormont@idirectgov.com
        703.880.6257

        iDirect Cloak Algorithm Module 1.0

        1.0.2.0 (Firmware)


        VT iDirect, Inc's firmware cryptographic library provides all cryptographic operations for the support of iDirect's Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data.

          • Altera Cyclone V
        5/12/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256
            • Signature Generation:
              • P-256 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-512
            • Prerequisite: SHS #3698, DRBG #1473
        1095Guardtime
        5151 California Ave.
        Suite 210
        Irvine, CA 92617
        USA

        Christian Bravo
        christian.bravo@guardtime.com
        310-227-6558

        Guardtime Cryptographic Support Library (CSL) Direct

        1.0.0 (Firmware)


        Cryptographic library for Guardtime products.

          • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
          • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
        5/12/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3697, DRBG #1472
        1094Flonidan A/S
        Islandsvej 29
        Horsens, Denmark DK-8700
        Denmark

        Tonny Frederiksen
        twf@flonidan.dk
        +45 75 61 88 88

        Kenneth Sørensen
        ks@flonidan.dk
        +45 75 61 88 88

        Flonidan Smart Meter mbedTLS Module

        2.4.0 (Firmware)


        Crypto module used in Flonidan smart meters

          • ARM Cortex
        5/12/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256
            • Signature Generation:
              • P-256 SHA: SHA-256
            • Signature Verification:
              • P-256 SHA: SHA-256
            • Prerequisite: SHS #3696, DRBG #1471
        1093Cog Systems / HTC
        Level 1
        277 King Street
        Newton
        Sydney, NSW 2042
        Australia

        Daniel Potts
        danielp@cog.systems
        +1 855 662 7234

        D4Secure Boring/OpenSSL FIPS Module

        FIPS Module 2.0.14


        The D4Secure Boring/OpenSSL FIPS Module is an implementation of the FIPS Object Module, FIPS canister in Android.

          • Snapdragon 617 (MSM8952) w/ Android 6.0.1 - HTC Software Version 1.57.617.52
        5/5/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3686, DRBG #1456
        1092Ciena Corporation
        7035 Ridge Road
        Hanover, MD 21076
        USA

        Kevin Meagher
        KMeagher@ciena.com

        Ciena 8700 Packetwave Platform

        8.5


        The 8700 Packetwave Platform is a multi-terabit programmable Ethernet-overdense wavelength division multiplexing (DWDM) packet switch.

          • NXP QorIQ P4080 w/ SAOS 8.5
        4/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-512
            • Prerequisite: SHS #3682, DRBG #1454
        1091OpenSSL Validation Services, Inc.
        1829 Mount Ephraim Road
        Adamstown, MD 21710
        USA

        Steve Marquess
        marquess@veridicalsystems.com
        301-874-2571

        OpenSSL FIPS Object Module

        2.0.16


        The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

          • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.18
          • Intel Atom C2558 (x86) with AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
          • Intel Atom C2558 (x86) without AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
          • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
          • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
          • NXP T2080 (PPC) w/ Linux 3.12
        4/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3681, DRBG #1451
        1090Trustonic
        20 Station Road
        Cambridge CB1 2JD
        UK

        Alec Edgington
        alec.edgington@trustonic.com
        +44 1223 347864

        Mark Wooding
        mark.wooding@trustonic.com
        +44 1223 3478534

        TRICX

        1.0


        TRICX is a static library providing an extensive suite of FIPS-approved cryptographic algorithms and supporting a range of key sizes and modes.

          • ARM Cortex-A53 without PAA w/ Trustonic Kinibi 400A
          • ARM Cortex-A53 with PAA w/ Trustonic Kinibi 400A
        4/21/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3680, DRBG #1450
        1089Axway Inc.
        6811 E Mayo Blvd.
        Ste. 400
        Phoenix, AZ 85054
        USA

        Katrin Rosenke
        krosenke@axway.com
        480-627-1800
        Fax: 480-627-1801

        Kartik Krishnan
        kkrishnan@axway.com
        480-627-2649
        Fax: 480-627-1801

        Axway Security Kernel

        3.0.2


        Axway Validation Authority Suite: a collection of products that provide flexible and robust OCSP/SCVP certificate validation for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions.

          • Intel® Xeon® E5-2620 w/ Microsoft Windows 2012 64-bit
          • Intel® Xeon® E5-2620 w/ RHEL 6.3 64-bit
          • Sun UltraSparc T1 w/ Solaris 64-bit
        4/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, P-192, P-224, P-256, P-384
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3678, DRBG #1449
        1088Silver Spring Networks
        230 W Tasman Drive
        San Jose, CA 95134
        USA

        Jeff Ebert
        jebert@ssni.com
        16697704000
        Fax: 18667760015

        Silver Spring Networks Endpoint Security Module

        130-0117-01.ESM 82136+98519 (Firmware)


        Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN's Gen5 endpoint and infrastructure products.

          • ESM instruction manager processor embedded in SSN ARNIE SoC
        4/14/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3677, DRBG #1448
        1087A10 Networks, Inc.
        3 West Plumeria Drive
        San Jose, CA 95134
        USA

        John Chiong
        +1 408 325-8668

        A10 Networks SSL FIPS Library

        2.0.0 (Firmware)


        The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

          • Intel Xeon E3-1275v2 with AES-NI
          • Intel Xeon E5-1650v3 with AES-NI
          • Intel Xeon E5-2697v2 with AES-NI
          • Intel Xeon E5-2697v4 with AES-NI
        4/7/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3674, DRBG #1447
        1086Gemalto
        525 Avenue du Pic de Bertagne
        CS 12023
        Gemenos 13881
        France

        Security and Certifications Team
        SecurityCertifications@gemalto.com

        Sylvain Lhostis
        Sylvain.Lhostis@gemalto.com
        +33 (0)4 42 36 60 62

        MultiAppIDV4.0 Cryptographic library

        Infineon SLE78 M7892 chip family 4.0 (Firmware)


        MultiAppIDV4.0 is a highly secured smartcard platform compliant with the Javacard 3.0.4, GP 2.2.1, Amdt D standards, designed to operate with the Infineon SLE78 M7892 chips. It supports: TDES, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF SP800-108 & DRBG SP800-90A algorithms.

          • Infineon SLE78 M7892 chip family
        4/7/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-224 SHA: SHA-224
              • P-256 SHA: SHA-224, SHA-256
              • P-384 SHA: SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1
              • P-224 SHA: SHA-1, SHA-224
              • P-256 SHA: SHA-1, SHA-224, SHA-256
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3670, DRBG #1444
        1085Persistent Systems LLC
        303 Fifth Ave
        Suite 207
        New York, NY 10016
        USA

        Helson Maria
        hmaria@persistentsystems.com
        212-561-5895

        Dr. David Holmer
        dholmer@persistentsystems.com
        212-561-5895

        Wave Relay® Cryptographic Library

        2.0 (Firmware)


        The Wave Relay® Mobile Ad Hoc Network (MANET) is a peer-to-peer wireless networking solution that allows a distributed group of mobile users to communicate continuously without fixed infrastructure. The Wave Relay® Cryptographic Library provides module integrity assurance and management security.

          • NXP i.MX 6
        4/7/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3667, DRBG #1443
        1084HUAWEI TECHNOLOGIES Co. Ltd.
        Yuhuatai District
        101 Software Avenue
        HANGZHOU, ZHEJIANG 310000
        CHINA

        Yang Ze
        yangze1@huawei.com
        86 15919432118

        Bai Wenxin
        baiwenxin@huawei.com
        86 18969126628

        VPP

        V300R003C26SPC101B130 (Firmware)


        VPP Cryptographic Library provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

          • Cavium CN7015
          • Cavium CN6645
          • Cavium CN6880
          • Freescale SC411912C
          • Freescale MPC8572E
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3664, DRBG #1442
        1083Ciena Corporation
        7035 Ridge Road
        Hanover, MD 21076
        USA

        Patrick Scully
        613-670-3207

        Ciena Waveserver

        1.4 (Firmware)


        The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

          • Xilinx XC7Z030
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3660, DRBG #1439
        1082ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel POONATHAN
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS9900 ECDSA-GCM-TDES-RSA-PSS)

        AOS 8.3.1.R01


        ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

          • Intel Atom C2518 w/ AOS 8.3.1.R01
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3526, DRBG #1111
        1081ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel POONATHAN
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch (OS6900 PowerPC P2040 ECDSA-GCM-TDES-RSA-PSS)

        AOS 8.3.1.R01


        ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

          • PowerPC P2040 w/ AOS 8.3.1.R01
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3525, DRBG #1347
        1080INTEGRITY Security Services (ISS)
        7585 Irvine Center Driver
        Suite 250
        Irvine, California 91618
        USA

        David Sequino
        dsequino@ghs.com
        206-310-6795
        Fax: 978-383-0560

        Douglas Kovach
        dkovach@ghs.com
        727-781-4909
        Fax: 727-781-2915

        Crestron Control Engine

        3.0 (Firmware)


        Porting of the ISS Embedded Cryptographic Toolkit (ECT) to the Crestron Control Engine.

          • iMX53
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3658, DRBG #1437
        1079ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel POONATHAN
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch (OS6900 Freescale PowerPC MPC8572 ECDSA-GCM-TDES-RSA-PSS)

        AOS 8.3.1.R01


        ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

          • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3524, DRBG #1111
        1078ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel POONATHAN
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6860 ECDSA-GCM-TDES-RSA-PSS)

        AOS 8.3.1.R01


        ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

          • Cortex ARM 9 w/ AOS 8.3.1.R01
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3523, DRBG #1111
        1077ALE (Alcatel Lucent Enterprise)
        26801 Agoura Road
        Calabasas, CA 91301
        USA

        Tao Shen
        tao.shen@al-enterprise.com
        818-878-5038

        Vadivel POONATHAN
        vadivel.poonathan@al-enterprise.com
        818-878-4601

        Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS10K ECDSA-GCM-TDES-RSA-PSS)

        AOS 8.3.1.R01


        ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

          • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3520, DRBG #1111
        1076F5 Networks
        401 Elliott Avenue West
        Seattle, WA 98119
        USA

        Maryrita Steinhour
        m.steinhour@f5.com
        206-272-7351

        John Hughes
        j.hughes@f5.com
        206-272-6038

        Cryptographic Module for BIG-IP with AES and SHA assembler

        12.1.2 HF1


        Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

          • Intel Xeon X5650 w/ BIG-IP 12.1.2 HF1
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3656, DRBG #1436
        1075Aruba, a Hewlett Packard Enterprise company
        1344 Crossman Avenue
        Sunnyvale, CA 94089
        USA

        Steve Weingart
        fips@arubanetworks.com
        512-319-2480
        Fax: 408-227-4500

        ArubaOS Crypto Module

        6.5.1-FIPS (Firmware)


        The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

          • Broadcom BCM53014
        3/31/2017
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-256, P-384
        1074Samsung Electronics Co., Ltd,
        416 Maetan-3dong, Yeongtong-gu
        Suwon-si, Gyeonggi-do 443-742
        South Korea

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung BoringSSL Cryptographic Module

        v1.1


        The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

          • Samsung Electronics Exynos8895 w/ Android 7.0
          • Qualcomm MSM8998 w/ Android 7.0
          • Samsung Electronics Exynos7570 w/ Android 7.0
          • Qualcomm MSM8917 w/ Android 7.0
          • Qualcomm MSM8996 w/ Android 7.0
          • Samsung Electronics Exynos8890 w/ Android 7.0
          • Samsung Electronics Exynos7420 w/ Android 7.0
          • Samsung Electronics Exynos7870 w/ Android 7.1
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3650, DRBG #1431
        1073Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Gokul Karthik Balaswamy
        gokulk@microsoft.com
        425-706-8583
        Fax: 425-708-0107

        Christine Ahonen
        chrisah@microsoft.com
        425-706-8675
        Fax: 425-936-7329

        Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

        7.00.2872


        The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

          • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
          • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
          • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
          • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
          • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
        3/31/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256
              • P-384 SHA: SHA-1, SHA-384
              • P-521 SHA: SHA-1, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256
              • P-384 SHA: SHA-1, SHA-384
              • P-521 SHA: SHA-1, SHA-512
            • Prerequisite: SHS #3649, DRBG #1430
        1072Microsoft Corporation
        One Microsoft Way
        Redmond, WA 98052-6399
        USA

        Gokul Karthik Balaswamy
        gokulk@microsoft.com
        425-706-8583
        Fax: 425-708-0107

        Christine Ahonen
        chrisah@microsoft.com
        425-706-8675
        Fax: 425-936-7329

        Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

        8.00.6246


        The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

          • Texas Instruments EVM3730 w/ Windows Embedded Compact 2013 (ARMv7)
          • MSTI PDX-600 w/ Windows Embedded Compact 2013 (x86)
        3/24/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-1, SHA-256
              • P-384 SHA: SHA-1, SHA-384
              • P-521 SHA: SHA-1, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256
              • P-384 SHA: SHA-1, SHA-384
              • P-521 SHA: SHA-1, SHA-512
            • Prerequisite: SHS #3648, DRBG #1429
        1071IBM Corporation
        222 South Riverside Plaza
        Ste 1700
        Chicago, IL 60606
        USA

        Mark Seaborn
        mseaborn@us.ibm.com
        +1 312 423 6640x2354

        Jasopn Resch
        jresch@us.ibm.com

        Cleversafe FIPS Cryptographic Module

        1.1


        The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe's ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

          • Intel Xeon without AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
          • Intel Xeon with AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
        3/24/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384
              • B-283 SHA: SHA-224, SHA-256, SHA-384
              • B-409 SHA: SHA-224, SHA-256, SHA-384
              • B-571 SHA: SHA-224, SHA-256, SHA-384
              • K-233 SHA: SHA-224, SHA-256, SHA-384
              • K-283 SHA: SHA-224, SHA-256, SHA-384
              • K-409 SHA: SHA-224, SHA-256, SHA-384
              • K-571 SHA: SHA-224, SHA-256, SHA-384
              • P-224 SHA: SHA-224, SHA-256, SHA-384
              • P-256 SHA: SHA-224, SHA-256, SHA-384
              • P-384 SHA: SHA-224, SHA-256, SHA-384
              • P-521 SHA: SHA-224, SHA-256, SHA-384
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3640, DRBG #1428
        1070Attivo Networks, Inc.
        47697 Westinghouse Drive, Suite 201
        Fremont, CA 94539
        USA

        Satya Das
        510 623-1000

        Attivo Cryptographic Provider

        1.0 (Firmware)


        Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

          • Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
          • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3638, DRBG #1426
        1069Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        919.392.6520

        CiscoSSL FOM

        6.0


        The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Apple A8 w/ iOS 9.3
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3470, DRBG #1316
        1068NXP Semiconductors
        6501 William Cannon Drive West
        Austin, TX 78735
        USA

        Geoffrey Waters
        geoffrey.waters@nxp.com
        512-895-2069

        Tom Tkacik
        tom.tkacik@nxp.com
        480-814-3299

        DMPR 40301443

        CAVP_DMPR_40301443 (Firmware)


        NXP's DMPR 40301443 is included in multiple QorIQ and Layerscape processors including: LS1023A, LS1026A, LS1043A, LS1046A, LS1048A, and LS1088A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

          • Cadence IES 15.10.009 Verilog simulator
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #2110, DRBG #349
        1067NXP Semiconductors
        6501 William Cannon Drive West
        Austin, TX 78735
        USA

        Geoffrey Waters
        geoffrey.waters@nxp.com
        512-895-2069

        Tom Tkacik
        tom.tkacik@nxp.com
        480-814-3299

        DMPR 40251443

        CAVP_DMPR_40251443 (Firmware)


        NXP's DMPR 40251443 is included in multiple QorIQ and Layerscape processors including: LS1012A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

          • Cadence IES 15.10.009 Verilog simulator
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #2110, DRBG #349
        1066NXP Semiconductors
        6501 William Cannon Drive West
        Austin, TX 78735
        USA

        Geoffrey Waters
        geoffrey.waters@nxp.com
        512-895-2069

        Tom Tkacik
        tom.tkacik@nxp.com
        480-814-3299

        DMPR 40241443

        CAVP_DMPR_40241443 (Firmware)


        NXP's DMPR 40241443 is included in multiple QorIQ and Layerscape processors including: T1013, T1014, T1023 and T1024. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

          • Cadence IES 15.10.009 Verilog simulator
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3187, DRBG #1101
        1065NXP Semiconductors
        6501 William Cannon Drive West
        Austin, TX 78735
        USA

        Geoffrey Waters
        geoffrey.waters@nxp.com
        512-895-2069

        Tom Tkacik
        tom.tkacik@nxp.com
        480-814-3299

        DMPR 40303443

        CAVP_DMPR_40303443 (Firmware)


        NXP's DMPR 40303443 is included in multiple QorIQ and Layerscape processors including: LS2044A, LS2045A, LS2048A, LS2084A, LS2085A and LS2088A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

          • Cadence IES 15.10.009 Verilog simulator
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #2110, DRBG #349
        1064NXP Semiconductors
        6501 William Cannon Drive West
        Austin, TX 78735
        USA

        Geoffrey Waters
        geoffrey.waters@nxp.com
        512-895-2069

        Tom Tkacik
        tom.tkacik@nxp.com
        480-814-3299

        DMPR 31231342

        CAVP_DMPR_31231342 (Firmware)


        NXP's DMPR 31231342 is included in multiple QorIQ and Layerscape processors including: LS1020A, LS1021A and LS1022A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

          • Cadence IES 15.10.009 Verilog simulator
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #2110, DRBG #349
        1063Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        FMC FOM Virtual

        6.0


        A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

          • Intel Xeon E5 w/ ESXi 5.5
          • Intel Xeon Eseries w/ ESXi 5.5
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3637, DRBG #1425
        1062Elster
        Timisoara Airport Park, DJ 691 km 8+775 m, Comuna Giarmata
        udetul Timis, Romania 307210
        Romania

        VLADIMIR DIATLOV
        VLADIMIR.DIATLOV@Honeywell.com
        +40 374 475 828
        Fax: +40 256 493 737

        SMETS2 AS302P

        1.1 (Firmware)


        The algorithms are implemented in an Electricity smart meter, for deployment in the UK Smart Metering Implementation Programme.

          • ARM 32-bit Cortex-M3
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256
              • Generation Methods: Extra Random Bits
            • Signature Verification:
              • P-256 SHA: SHA-256
            • Prerequisite: SHS #3636, DRBG #1424
        1061Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Global Certification Team
        certteam@cisco.com

        CiscoSSL FIPS Object Module

        6.0 (Firmware)


        The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco's networking and collaboration products.

          • Cavium CN52xx
          • Intel Xeon X5650
          • Intel Xeon E5-2609 v3
          • Intel Xeon E5-2680 v3
          • Marvell A390
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3635, DRBG #1422
        1060HUAWEI TECHNOLOGIES Co. Ltd.
        328# XINGHU Avenue
        SUZHOU, JIANGSU 215000
        CHINA

        Yang Ze
        yangze@huawei.com
        8615919432118

        Ji Xiang
        maximus.ji@huawei.com
        8615261806635

        Huawei FIPS Cryptographic Library (HFCL) for WLAN

        V300R003C22SPC806 (Firmware)


        Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

          • Qualcomm IPQ8068
          • Qualcomm QCA9550 series
          • Qualcomm IPQ40X8
          • Qualcomm QCA9531
          • Freescale P1025
          • Cavium CN6130
          • Cavium CN6335
        3/6/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3634, DRBG #1421
        1059Cisco Systems, Inc.
        170 West Tasman Drive
        San Jose, CA 95134
        USA

        Clint Winebrenner
        cwinebre@cisco.com
        1 919 392 6520

        CiscoSSL FIPS Object Module

        11.7


        tbd

          • Snapdragon 820 w/ Android version 6
        2/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3478, DRBG #1320
        1058Forcepoint LLC
        10900-A Stonelake Blvd
        Ste. 350
        Austin, TX 78759
        USA

        Matt Sturm
        msturm@forcepoint.com
        858-320-9444

        Matthew Noland
        matthew.noland@forcepoint.com
        512-644-1214

        Forcepoint C Cryptographic Module

        2.0.5


        Forcepoint produces a family of web, e-mail and data security solutions that can be deployed on pre-configured, security hardened hardware or as customer installable software. The Forcepoint C Crypto Module provides support for cryptographic and secure communications services for these solutions.

          • Forcepoint V10000 G4 Appliance on Intel Xeon E5-2620v3 w/ CentOS 7.2
        2/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3628, DRBG #1419
        1057HUAWEI TECHNOLOGIES Co., Ltd.
        Yuhuatai District
        101 Software Avenue
        NANJING, JIANGSU 210000
        CHINA

        Yang Ze
        yangze1@huawei.com
        8615919432118

        Liu Pinping
        liupinping@huawei.com
        8615850529039

        Huawei FIPS Cryptographic Library (HFCL) for Switches

        V300R003C22SPC805 (Firmware)


        Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

          • Cavium CN5020
          • BROADCOM 56340/56342
          • MARVELL 98DX3333/98DX3336
          • FREESCALE P2041
          • FREESCALE SC411231C
          • MARVELL 98DX3245/98DX3246/98DX3247
        2/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
              • P-521 SHA: SHA-512
            • Prerequisite: SHS #3627, DRBG #1418
        1056Citrix Systems, Inc.
        851 Cypress Creek Road
        Fort Lauderdale, FL 33309
        USA

        Ben Tucker
        Ben.Tucker@citrix.com
        954-267-3094

        Jonathan Andersen
        Jonathan.Andersen@citrix.com
        954-940-7737

        Citrix FIPS Cryptographic Module - ECDSA

        1.0


        Citrix FIPS Cryptographic Module provides cryptographic services for various Citrix products.

          • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ iOS 10 64-bit
          • ARM v7-A with NEON extensions w/ Android 5
          • Intel Core i7 [4th Generation] with AES-NI w/ Windows 10 32-bit
          • ARM v7-A with NEON extensions w/ Android 6
          • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 6
          • Intel Core i7 [6th Generation] with AES-NI w/ Windows 10 64-bit
          • ARM v8-A w/ Windows 10 Mobile 32-bit
          • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under XenServer 6, 64-bit
          • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under ESXi 5, 64-bit
          • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under Hyper-V on Windows Server 2012 R2, 64-bit
          • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 32-bit
          • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 64-bit
          • Intel Core i7 [6th Generation] with AES-NI w/ Linux 3.13 64-bit
          • ARM v7-A with NEON extensions w/ Android 4.4
          • ARM v7-A with NEON extensions w/ Android 7
          • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 7
          • Intel Core i7 with AES-NI w/ Mac OS X 10.12 64-bit
          • ARM v8-A with NEON extensions w/ ViewSonic Thin OS
          • Intel Xeon E55xx Series w/ Linux 3.13 under XenServer 6
        2/28/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3626, DRBG #1417
        1055Information Security Corporation
        1011 Lake St. Suite 425
        Oak Park, IL 60118
        USA

        Jonathan Schulze-Hewett
        schulze-hewett@infoseccorp.com
        708-445-1704
        Fax: 708-445-9705

        Michael Markowitz
        markowitz@infoseccorp.com
        708-445-1704
        Fax: 708-445-9705

        ISC Cryptographic Development Kit (CDK)

        8.0


        The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

          • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3625, DRBG #1416
        1054Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49- OpenSSL

        15.1X49-D75 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Intel Xeon (C5518)
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3622, DRBG #1415
        1053Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Pradeepa M R
        pradeepam@juniper.net

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        JUNOS FIPS Version 15.1X49- Authentec

        Broadcom XLP832 15.1X49-D75 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Broadcom XLP832
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3621, DRBG #1415
        1052Juniper Networks, Inc.
        1133 Innovation Way
        Sunnyvale, CA 94089
        USA

        Vann (Vanna) Nguyen
        vann@juniper.net
        408-745-2000

        Pradeepa M R
        pradeepam@juniper.net

        Junos FIPS Version Junos 15.1 X49 - Authentec_XLP

        15.1 X49-D60 (Firmware)


        Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

          • Broadcom XLP832
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256, SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-256, SHA-384
            • Prerequisite: SHS #3588, DRBG #1400
        1051NXP Semiconductors
        Stresemannallee 101
        Hamburg, Hamburg 22529
        Germany

        Dr. Almar Kaid
        almar.kaid@nxp.com
        + 49 (40) 5613 5123
        Fax: + 49 (40) 5613 62773

        P73N2M0 Crypto Library CAVP Wrapper

        p73n2m0b0.200 1.0.0


        The NXP Crypto Library CAVP Wrapper on the p73n2m0 HW-platform builds on the P73N2M0 Crypto Library V1.0.8. It contains CMAC, RSA and ESCDA implementations to illustrate how to meet the CAVP FAQ Gen.2 requirement based on the NXP Crypto Library within an operating system.

          • NXP p73n2m0 w/ n/a
        2/10/2017
        • ECDSA:
          • 186-4:
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3615, DRBG #1410
        1050OpenSSL Validation Services, Inc.
        1829 Mount Ephraim Road
        Adamstown, MD 21710
        USA

        Steve Marquess
        info@openssl.com
        301-874-2571

        OpenSSL FIPS Object Module

        2.0.15


        The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

          • TI c64 w/ SurfWare 7.2
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3620, DRBG #1414
        1049Samsung Electronics Co., Ltd.
        416, Maetan 3-Dong Youngton Gu
        Suwon, Gyeonggi 152-848
        South Korea

        Brian Wood
        be.wood@samsung.com
        +1-973-440-9125

        Jung Ha Paik
        jungha.paik@samsung.com
        +82-10-8861-0858

        Samsung SCrypto Library

        2.0


        Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

          • Samsung Electronics Exynos8895 w/ Kinibi 400A (32-bit)
          • Qualcomm MSM8998 w/ QSEE 4.0 (32-bit)
          • Qualcomm MSM8998 w/ QSEE 4.0 (64-bit)
          • Samsung Electronics Exynos7870 w/ Kinibi 310 (32-bit)
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Public Key Validation:
              • Curves: P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3618, DRBG #1412
        1048Information Security Corporation
        1011 Lake St. Suite 425
        Oak Park, IL 60118
        USA

        Jonathan Schulze-Hewett
        schulze-hewett@infoseccorp.com
        708-445-1704
        Fax: 708-445-9705

        Michael Markowitz
        markowitz@infoseccorp.com
        708-445-1704
        Fax: 708-445-9705

        ISC OpenSSL FIPS Object Module

        1.0


        ISC OpenSSL module based on the OpenSSL FIPS Object Module version 2.0.

          • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
          • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384, P-521
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384, P-521
            • Signature Generation:
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3616, DRBG #1411
        1047NXP Semiconductors
        Stresemannallee 101
        Hamburg, Hamburg 22529
        Germany

        Dr. Almar Kaid
        almar.kaid@nxp.com
        + 49 (40) 5613 5123
        Fax: + 49 (40) 5613 62773

        P73N2M0 Crypto Library

        p73n2m0b0.200 1.0.8


        The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

          • NXP p73n2m0 w/ n/a
        2/10/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Extra Random Bits
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-384, SHA-512
            • Prerequisite: SHS #3615, DRBG #1410
        1046Secusmart GmbH
        Heinrichstrasse 155
        Düsseldorf, NRW 40239
        Germany

        Thomas Schetelig
        thomas.schetelig@secusmart.com
        +49211447399701

        Markus Hauenstein
        markus.hauenstein@secusmart.com
        +49211447399157

        SecuSUITE Client OpenSSL FIPS Object Module

        2.0.12


        SecuSUITE Client OpenSSL FIPS Object Module

          • Samsung Exynos 8890 w/ Android 6.0.1
          • Apple A8 w/ iOS 9.3.5
          • Qualcomm MSM8960 w/ BlackBerry OS 10.3.3
          • Qualcomm MSM8974 w/ BlackBerry OS 10.3.3
        2/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Extra Random Bits, Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3610, DRBG #1408
        1045Secusmart GmbH
        Heinrichstrasse 155
        Düsseldorf, NRW 40239
        Germany

        Thomas Schetelig
        thomas.schetelig@secusmart.com
        +49211447399701

        Markus Hauenstein
        markus.hauenstein@secusmart.com
        +49211447399157

        secuSUITE SIP Server OpenSSL FIPS Object Module

        2.0.12


        secuSUITE SIP Server OpenSSL FIPS Object Module

          • Intel Xeon E5-2620v3 CPU w/ Linux/CentOS v7
        2/3/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-256, P-384
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-256, P-384
            • Signature Generation:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Signature Verification:
              • P-256 SHA: SHA-256
              • P-384 SHA: SHA-384
            • Prerequisite: SHS #3609, DRBG #1407
        1044
        2/3/2017
          1042Aruba, a Hewlett Packard Enterprise company
          1344 Crossman Avenue
          Sunnyvale, CA 94089
          USA

          Steve Weingart
          fips@arubanetworks.com
          512-319-2480
          Fax: 408-227-4500

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • Qualcomm Atheros QCA9344
          1/27/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1041Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version Junos 15.1 X49 - Authentec_CN7130

          15.1 X49-D60 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • CN7130
          1/27/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3582, DRBG #1398
          1040Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version Junos 15.1 X49 - Authentec_CN7020

          15.1 X49-D60 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • CN7020
          1/27/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3582, DRBG #1398
          1039Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version Junos 15.1 X49 - Authentec_CN6335

          15.1 X49-D60 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • CN6335
          1/27/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3582, DRBG #1398
          1038Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version Junos 15.1 X49 - OpenSSL

          15.1X49-D60


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • CN7020
            • CN7130
            • CN6335
          1/27/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-256
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256
              • Signature Verification:
                • P-224 SHA: SHA-256
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
                • P-521 SHA: SHA-256
              • Prerequisite: SHS #3600, DRBG #1398
          1037Canonical Ltd.
          5th Floor, Blue Fin Building, 110 Southwark Street
          London SE1 0SU
          United Kingdom

          Joy Latten
          joy.latten@canonical.com

          Andrew Cloke
          andrew.cloke@canonical.com

          OpenSSL using SHA assembler

          1.0


          The test covers assembler of SHA for OpenSSL.

            • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
          1/27/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-5