Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Algorithm Validation Program

ECDSA Validation List

This list identifies implementations that have been validated as conforming to the Elliptic Curve Digital Signature Algorithm (ECDSA), as specified in Federal Information Processing Standard (FIPS) 186-2 with Change Notice 1 and FIPS 186-4, using tests described in the (186-2) Elliptic Curve Digital Signature Algorithm Validation System (ECDSAVS) and (186-4) Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS).

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths and the CMVP Implementation Guidance (IG) W.2 Validating the Transition from FIPS 186-2 to FIPS 186-4, the use of curve sizes providing less than 112 bits of security strength (P-192, K-163, and B-163), and the use of SHA-1 with Digital Signature Generation excluding use with protocols, is no longer approved.

As of January 1, 2016, in accordance with the SP800-131A Revision 1 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, the use of RNGs specified in FIPS 186-2, [X9.31], and the 1998 version of [X9.62] as a prerequisite for validation testing is no longer approved.

Formerly validated implementation capabilities that are no longer approved are identified in the list below by strikethrough text.

No. Vendor Implementation Operational Environments Validated Capabilities
1369Samsung Electronics Co., Ltd
416 Maetan-3dong, Yeongtong-gu
Suwon, Gyeonggi 152-848
South Korea

Jung Ha Paik
jungha.paik@samsung.com
+82-10-8861-0858

Samsung BoringSSL Cryptographic Module

v1.2


The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

    • Samsung Electronics Exynos7883 w/ Android 8.0
    • Qualcomm MSM8998 w/ Android 8.0
    • Qualcomm MSM8996 w/ Android 8.0
    • Qualcomm SDM845 w/ Android 8.0
    • Samsung Electronics Exynos8890 w/ Android 8.0
    • Samsung Electronics Exynos9810 w/ Android 8.0
    • Samsung Electronics Exynos8895 w/ Android 8.0
    • Samsung Electronics Exynos7570 w/ Android 8.0
2/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4230, DRBG #2010
1368Mocana Corporation
150 Mathilda Place
Suite 208
Sunnyvale, CA 94086
USA

Srinivas Kumar
fips@mocana.com
1-415-617-0055
Fax: 1-415-617-0056

Mocana Cryptographic Library

6.5.1f


The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

    • Intel Atom E3800 w/ Wind River Linux 6.0
2/16/2018
  • ECDSA:
    • 186-4:
      • Key Pair Generation:
        • Curves: P-224, P-256, P-384, P-521
        • Generation Methods: Extra Random Bits
      • Public Key Validation:
        • Curves: P-192, P-224, P-256, P-384, P-521
      • Signature Generation:
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Signature Verification:
        • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
      • Prerequisite: SHS #4229, DRBG #2009
1367
2/16/2018
    1366Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Marks
    seceval_us@oracle.com
    650-506-0391

    Oracle Acme Packet OpenSSL Cryptographic Library

    ECz8.0.0 (Firmware)


    The Acme Packet 4600 and 6300 feature Oracle’s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications – voice, video, and application data sessions – across Internet Protocol (IP) network borders.

      • Intel Core i3
      • Intel Core i7
    2/16/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4225, DRBG #2007
    1365Gemalto
    Avenue du Jujubier
    Z.I Athelia IV
    La Ciotat, 13705
    France

    Frederic Garnier
    Frederic.Garnier@gemalto.com
    +33 442364368
    Fax: +33 442366953

    Didier Bonnet
    Didier.Bonnet@gemalto.com
    +33 442366803
    Fax: +33 442365545

    Gemalto Cryptographic library for IDCore 3130 on SLE78

    1.9 (Firmware)


    IDCore 3130 is a highly secured smartcard platform with dual interfaces compliant with Javacard 3.0.5, Global Platform 2.2.1 standards, designed to operate with Infineon SLE78 chip (M7892). The library implements TDEA, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF CMAC-AES, KAS OnePassDH and SP800-90A RNG algorithms.

      • Infineon SLE78 chip (M7892)
    2/16/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-224 SHA: SHA-224
          • P-256 SHA: SHA-224, SHA-256
          • P-384 SHA: SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1
          • P-224 SHA: SHA-1, SHA-224
          • P-256 SHA: SHA-1, SHA-224, SHA-256
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4221, DRBG #2005
    1364Evertz Microsystems
    5292 John Lucas Dr.
    Burlington, Ontario L7L 5Z9
    Canada

    Naveed Afzal
    nafzal@evertz.com
    905-335-3700

    EXE OpenSSL Cryptographic Module

    2v0_b1 (Firmware)


    Card for 6RU Shelf loaded with Evertz IPX

      • MPC8377E
    2/16/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4220, DRBG #2004
    1363Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Patrick Scully
    pscully@ciena.com
    613-670-3207

    Ciena 6500 Flex3 WaveLogic 3e OCLD Boot Loader

    1.00 (Firmware)


    The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service.

      • HunQ v3 ASIC
    2/9/2018
    • ECDSA:
      • 186-4:
        • Signature Verification:
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4219
    1362Silver Spring Networks
    230 W Tasman Drive
    San Jose, CA 95134
    USA

    Andrew Pendray
    support@ssni.com
    +1 669 770 4000
    Fax: +1 886 776 0015

    Silver Spring Networks Endpoint Security Module

    82136; 1.00 (Firmware)


    Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

      • ESM instruction manager processor
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4148, DRBG #1906
    1361Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet OpenSSL Cryptographic Library

    ECz 8.0.0


    The Acme Packet VME is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4216, DRBG #2002
    1360Oracle Communications
    100 Crosby Drive
    Bedford, MA 01730
    USA

    George Guo
    george.guo@oracle.com
    (781) 538-7399

    Chris Marks
    chris.marks@oracle.com
    (650) 506-0391

    Oracle Acme Packet OpenSSL Cryptographic Library

    ECz 8.0.0 (Firmware)


    The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

      • Intel Xeon D-1548 (Intel Broadwell-DE)
      • Intel Atom C2358
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4215, DRBG #2001
    1359Certicom Corp.
    4701 Tahoe Blvd, Building A
    5th Floor
    Mississauga, Ontario L4W 0B5
    Canada

    Certicom Support
    support@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Certicom Sales
    sales@certicom.com
    1-905-507-4220
    Fax: 1-905-507-4230

    Security Builder® FIPS Core

    6.3.0


    Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based appliations for FIPS 140-2 and Suite B security.

      • Qualcomm MSM8953 (ARMv8) without NEON w/ Android 7.1.2
      • Qualcomm MSM8953 (ARMv8) with NEON w/ Android 7.1.2
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 6.6
      • Freescale i.MX6 ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 6.6
      • TI AM335x ARM Cortex-A8 (ARMv7) without NEON w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) without NEON w/ QNX SDP 7
      • TI AM335x ARM Cortex-A8 (ARMv7) with NEON w/ QNX SDP 7
      • Intel Atom C3558 without AES-NI w/ QNX SDP 7
      • Renesas R-Car M3 ARM Cortex-A57 (ARMv8) with NEON w/ QNX SDP 7
      • Intel Atom C3558 with AES-NI w/ QNX SDP 7
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4210, DRBG #1996
    1358IBM Corporation
    222 South Riverside Plaza
    Ste 1700
    Chicago, IL 60606
    USA

    Mark Seaborn
    mseaborn@us.ibm.com
    +1 312 423 6640x2354

    IBM Cloud Object Storage System's™ FIPS Cryptographic Module

    1.1


    The IBM Cloud Object Storage System’s™ FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

      • Intel Xeon with AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
      • Intel Xeon without AES-NI w/ ClevOS 3.12.2.40-FIPS-EDITION
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4209, DRBG #1995
    1357Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    ancrypto.dylib

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • ARMv7 w/ iOS 10.3.3
    2/9/2018
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: P-256, P-384
    1356Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    libancrypto.so

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Linux 2.6 64-bit
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4208, DRBG #1994
    1355Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    ancrypto.dll

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • Intel Core i7 w/ Windows 7 64-bit User Mode
      • Intel Core i5 w/ Windows 7 32-bit User Mode
    2/9/2018
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: P-256, P-384
    1354Aruba, a Hewlett Packard Enterprise company
    3333 Scott Blvd
    Santa Clara, CA 95054
    USA

    Steve Weingart
    steve.weingart@hpe.com
    512-319-2480

    libancrypto.so

    1.0.0


    The Aruba Common Cryptographic Module (CCM) is a software crypto library that powers a variety of Aruba''s networking and security products. The module does not implement any protocols directly, but provides cryptographic primitives and functions that software developers build upon to implement various security protocols.

      • ARMv7 w/ Android 6.0.1
      • Intel Core i5 w/ Linux 2.6 32-bit
    2/9/2018
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: P-256, P-384
    1353Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4207, DRBG #1993
    1352Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S3 w/ watchOS 4
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4204, DRBG #1988
    1351Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple S1 w/ watchOS 4
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4203, DRBG #1987
    1350Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (no AVX2, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4202, DRBG #1984
    1349Gallagher Group
    181 Kahikatea Drive
    Hamilton 3206
    New Zealand

    Andrew Scothern
    andrew.scothern@gallagher.com
    +64-7-838-9800

    Simon Lawrence
    simon.lawrence@gallagher.com
    +64-7-838-9800

    Gallagher OpenSSL Cryptographic Module

    2.0.12


    Gallagher creates and delivers integrated security solutions to meet varying needs, from basic access control right through to high security alarm systems. The Gallagher OpenSSL Cryptographic Module provides cryptographic services for a range of Gallagher products.

      • ARM926EJ-S(ARMv5TEJ) w/ Linux 4.9
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4196, DRBG #1978
    1348Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 32-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/9/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4194, DRBG #1976
    1347Red Hat, Inc.
    100 E. Davie Street
    Raleigh, NC 27601
    USA

    Jaroslav Reznik
    fips140@redhat.com

    OpenSSL (Full CPU set, x86_64, 64-bit library)

    6.0


    The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

      • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.5
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4193, DRBG #1975
    1346Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4191, DRBG #1972
    1345Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4189, DRBG #1959
    1344Centrify Corporation
    3300 Tannery Way
    Santa Clara, California 95054
    USA

    Kitty Shih
    kitty.shih@centrify.com
    669-444-5238

    Centrify Cryptographic Library

    2.1


    Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

      • Intel Xeon E5620 x86_64 w/ RHEL 7.2
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4185, DRBG #1956
    1343Samsung Electronics Co., Ltd
    416 Maetan-3dong, Yeongtong-gu
    Suwon, Gyeonggi 152-848
    South Korea

    Brian Wood
    be.wood@samsung.com
    +1-973-440-9125

    Jung Ha Paik
    jungha.paik@samsung.com
    +82-10-8861-0858

    Samsung SCrypto Library

    v2.2


    Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

      • Samsung Electronics Exynos9810 w/ Kinibi 400A (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (32-bit)
      • Qualcomm SDM845 w/ QSEE 5.0 (64-bit)
    2/2/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4184, DRBG #1955
    1342Datrium
    385 Moffett Park Dr #205
    Sunnyvale, CA 94089
    USA

    R. Hugo Patterson
    info@datrium.com
    +1 (669) 721-9444

    Datrium FIPS Object Module

    2.0.12


    The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

      • Intel Xeon E5-2618L v4 w/ Linux 3.10
      • Intel Xeon Gold 6148 w/ Redhat Enterprise Linux 7.3
      • Intel Xeon Gold 6148 w/ VMWare ESXi 6.5 u1
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4182, DRBG #1953
    1341Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple ibridgeOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within.

      • Apple T2 (iBridge2,1) w/ iBridgeOS (15P2064)
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4180, DRBG #1951
    1340SafeLogic, Inc.
    530 Lytton Ave
    Suite 200
    Palo Alto, CA 94301
    USA

    SafeLogic Sales
    sales@safelogic.com

    CryptoComply® Server

    2.1


    CryptoComply® Server is a standards-based "drop-in compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation.

      • Intel i7 w/ Windows Server 2012 R2
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4177, DRBG #1947
    1339Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.14


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 v2 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v3 w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon E5 v4 w/ Debian 9 based OS with Linux 4.9
      • Intel Pentium D w/ Debian 9 based OS with Linux 4.9
      • Intel Xeon D w/ Debian 9 based OS with Linux 4.9
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4175, DRBG #1946
    1338Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Object Module

    2.0.13


    Forcepoint NGFW FIPS Object Module is a software module that provides cryptographic services required by the Forcepoint NGFW product.

      • Intel Xeon E5 w/ CentOS 6 based OS with Linux 2.6.32
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4174, DRBG #1945
    1337Forcepoint
    10900-A Stonelake Blvd.
    Ste. 350
    Austin, TX 78759
    USA

    Klaus Majewski
    legal@forcepoint.com
    1-858-320-8000

    Jorma Levomäki
    legal@forcepoint.com
    1-858-320-8000

    Forcepoint NGFW FIPS Java API

    1.0.0


    Forcepoint NGFW FIPS Java API is a software module that provides cryptographic services required by the Forcepoint NGFW product

      • Intel Xeon E5 w/ Java 8 on Linux 2.6.32
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4173, DRBG #1944
    1336Mojo Networks, Inc.
    339 N Bernardo Avenue, Suite 200
    Mountain View, CA 94043
    USA

    Hemant Chaskar
    hemant.chaskar@mojonetworks.com
    (650) 961-1111
    Fax: (650) 961-1169

    Crypto Core

    2.0.16-1-00 (Firmware)


    Cryptographic library offering various cryptographic mechanisms in sensor and access point.

      • ARMv7
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256
          • Generation Methods: Testing Candidates
        • Prerequisite: DRBG #1936
    1335Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11 Fusion
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4164, DRBG #1935
    1334Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A11 Bionic w/ iOS 11
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4163, DRBG #1934
    1333Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A10 Fusion w/ iOS 11
    1/26/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4162, DRBG #1933
    1332Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9X w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4161, DRBG #1932
    1331Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A9 w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4160, DRBG #1931
    1330Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8X w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4159, DRBG #1930
    1329Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A7 w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4158, DRBG #1929
    1328Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple Secure Key Store. The testing is applicable to the SEP implementation.

      • Apple A8 w/ iOS 11
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4157, DRBG #1928
    1327Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple Secure Key Store CoreCrypto Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10X w/ tvOS 11 Fusion
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4155, DRBG #1925
    1326Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4152, DRBG #1918
    1325Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within watchOS.

      • Apple S1 w/ watchOS 4
    1/19/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4151, DRBG #1917
    1324Hewlett-Packard Development Company, L.P.
    11445 Compaq Center Drive W
    Houston, TX 77070
    USA

    Timothy McDonough
    timothy.mcdonough@hpe.com

    Hewlett Packard Enterprise Synergy Interconnect Module

    2.1


    Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

      • Broadcom XLP108 w/ Linux kernel v 3.10.101 with GNU C library v 2.21
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4147, DRBG #1905
    1323Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40GHz with AES-NI w/ CentOS 6.8 on VMware ESXi 6.5.0
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4146, DRBG #1904
    1322Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Smartzone SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our SmartZone and Virtual SmartZone offer maximum flexibility with the ultimate enterprise /carrier grade feature set.

      • Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz with AES-NI
      • mIntel(R) Xeon(R) CPU E5-2695 v3 @ 2.30GHz with AES-NI
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4145, DRBG #1903
    1321Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (650) 265-4200
    Fax: (408) 738-2065

    Mukunda Chikkeralli
    +91 80 49134180

    Ruckus Access Point SSL Crypto Library

    1.0 (Firmware)


    The Ruckus Wi-Fi, switching and software portfolio builds on more than a decade''s worth of patented technologies to offer better connections that enable awesome customer experiences—at a fraction of the cost of alternatives. Our indoor and outdoor wireless access points fit just about any budget, performance requirement or deployment scenario.

      • Qualcomm IPQ8068
      • Qualcomm IPQ8064
      • Qualcomm IPQ8065
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4144, DRBG #1902
    1320Ruckus Networks, An ARRIS company
    350 W Java Drive
    Sunnyvale, CA 94089
    USA

    Abhi Maras
    (678) 473-2907
    Fax: (678) 473-8470

    Mike Jamison
    (678) 473-2907
    Fax: (678) 473-8470

    Cloudpath Cryptographic Library

    1.0


    Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired & wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network & secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access.

      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on VMware ESXi 6.5
      • Intel(R) Core(TM) i7-7700 with AES-NI w/ CentOS 7 on Hyper-V Manager 2016
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4143, DRBG #1901
    1319Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Seyed Safakish
    seyeds@juniper.net
    408-745-2000
    Fax: 408-745-2100

    JUNOS 17.3R2 RE1800 - OpenSSL

    17.3R2 (Firmware)


    Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

      • Intel Xeon LC5518
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4138, DRBG #1895
    1318Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S3 w/ watchOS 4
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4137, DRBG #1894
    1317Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple watchOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within watchOS.

      • Apple S1 w/ watchOS 4
    1/12/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4136, DRBG #1893
    1316Private Machines, Inc
    164 20th Street
    4A-4B
    Brooklyn, NY 11232
    USA

    Sumeet Bajaj
    sumeet@privatemachines.com

    Radu Sion
    sion@privatemachines.com

    Private Machines Enforcer LIBUCL

    2.5.13 (Firmware)


    The Private Machines Enforcer is general-purpose, tamper-proof cryptographic module. In addition to FIPS level 4 physical tamper protection, the Enforcer module also provides firmware-based cryptographic services via FIPS 140-2 approved algorithms.

      • MAX32550 Cortex M3
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4131, DRBG #1879
    1315SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sanagala
    usanagala@sonicwall.com
    408-962-6248
    Fax: 408-745-9300

    SonicWall Crypto Library

    SonicOS 6.2.5 (Firmware)


    SonicWall Crypto Library

      • Cavium Octeon
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Verification:
          • P-256 SHA: SHA-256
        • Prerequisite: SHS #4130, DRBG #1887
    1314Infineon Technologies AG
    Alter Postweg 101
    Augsburg, BY 86159
    Germany

    Roland Ebrecht
    Roland.Ebrecht@infineon.com
    +49-821-25851-68
    Fax: +49-821-25851-40

    Thomas Hoffmann
    Thomas.Hoffmann@infineon.com
    +49-821-25851-24
    Fax: +49-821-25851-40

    Trusted Platform Module 2.0 SLB 9670

    7.83 (Firmware)


    Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

      • Infineon SLB 9670 security controller IC
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256
        • Signature Generation:
          • P-256 SHA: SHA-256
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256
        • Prerequisite: SHS #4129, DRBG #1886
    1313Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i7 w/ macOS 10.13 on Macbook Pro
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4127, DRBG #1885
    1312Huawei Technologies Co., Ltd
    Huawei Industrial Base, Bantian Longgang
    Shenzhen, Guangdong 518129
    China

    SPENCER HE
    heshunbin@huawei.com
    +86-755-28979041

    EulerOS 2.0

    n/a


    EulerOS v2.0, is a general purpose, multi-user, multi-tasking Linux based operating system. It provides a platform for a variety of applications, including services for cloud environments.

      • Intel Xeon w/ EulerOS 2.0
    1/5/2018
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4126, DRBG #1884
    1311Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Ubuntu 14.04.5 running on VMWare ESXi 6.0.0
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4124, DRBG #1880
    1310Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Core M w/ macOS 10.13 on Mac mini
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4122, DRBG #1874
    1309Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel i5 w/ macOS 10.13 on Macbook
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4121, DRBG #1873
    1308Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • intel Xeon w/ macOS 10.13 on iMac Pro
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4120, DRBG #1872
    1307Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i7 w/ macOS 10.13 on Macbook Pro
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4119, DRBG #1871
    1306Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Core M w/ macOS 10.13 on Mac mini
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4118, DRBG #1870
    1305Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel Xeon w/ macOS 10.13 on iMac Pro
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4117, DRBG #1869
    1304Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple macOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Intel i5 w/ macOS 10.13 on Macbook
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4116, DRBG #1868
    1303Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    Qualcomm Trusted Execution Environment (QTEE) Secure App Software Crypto 64 bit Module

    TZ.XF.5.0.1-00033


    QTEE Secure App Software Crypto Module provides various software cryptographic functionalities to the 64bit QTEE Trusted Applications.

      • Snapdragon 845 w/ Qualcomm Trusted Execution Environment (QTEE)
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • Prerequisite: SHS #4115, DRBG #885
    1302Qualcomm Technologies, Inc.
    5775 Morehouse Dr
    San Diego, CA 92121
    USA

    Yin Ling Liong
    yliong@qti.qualcomm.com
    858-651-7034
    Fax: 858-845-1523

    Qualcomm Trusted Execution Environment (QTEE) Secure App Software Crypto 32 bit Module

    TZ.XF.5.0.1-00033


    QTEE Secure App Software Crypto Module provides various software cryptographic functionalities to the 32bit QTEE Trusted Applications.

      • Snapdragon 845 w/ Qualcomm Trusted Execution Environment (QTEE)
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • Prerequisite: SHS #4114, DRBG #885
    1301Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Bill Shelton
    bshelton@juniper.net
    408-745-2000

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    JUNOS Version 17.3R2 - OpenSSL

    17.3R2 (Firmware)


    The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

      • Intel Xeon D-1531
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4112, DRBG #1867
    1300Hewlett Packard Enterprise
    8 Technology Drive
    Westborough, MA 01581
    USA

    Aftab Alan
    aftab.alan@hpe.com
    917 576-6680

    OmniStack Cryptographic Library

    2.1


    The SimpliVity OmniStack Cryptographic Library provides the cryptographic functionality necessary to support TLS-secured communications between components of their hyperconverged infrastructure solutions, which are designed to meet the needs of IT environments from branch offices to enterprises.

      • Intel Xeon w/ Windows Server 2012 R2 running on VMWare ESXi 6.0.0
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4110, DRBG #1866
    1299SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    George Duo
    gduo@sonicwall.com
    (408) 962-7049

    SonicOS 6.5.0 for TZ, NSA and SuperMassive

    FW Version 6.5.0 (Firmware)


    The SonicWall family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

      • Cavium OCTEON III (CN7XXX)
      • Cavium OCTEON II (CN6XXX)
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-192, P-224, P-256, P-384, P-521
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4109, DRBG #1865
    1298Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Kernel Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software within tvOS.

      • Apple A10X Fusion w/ tvOS 11
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4106, DRBG #1861
    1297Oracle Corporation
    500 Oracle Parkway
    Redwood Shores, CA 94065
    USA

    Chris Brych
    chris.brych@oracle.com
    +1 613.216.3078

    Oracle Linux 7 GnuTLS C Implementation

    R7-2.0.0


    GnuTLS is a set of libraries implementing general purpose cryptographic algorithms and network protocols such as TLS and DTLS.

      • Intel(R) Xeon(R) E5-2699 v4 w/ Oracle Linux 7.3 64 bit
    12/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4105, DRBG #1859
    1296Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4102, DRBG #1856
    1295Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4101, DRBG #1855
    1294Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A10X Fusion w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4100, DRBG #1854
    1293Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4099, DRBG #1853
    1292Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4098, DRBG #1852
    1291Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4097, DRBG #1851
    1290Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4096, DRBG #1850
    1289Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Kernel Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    12/15/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4095, DRBG #1849
    1288Samsung Electronics Co., Ltd.
    1-1, Samsungjeonja-ro
    Hwaseong-si, Gyeonggi-do 18448
    KOREA

    Jisoo Kim
    jisoo74.kim@samsung.com
    82-31-8096-2832
    Fax: 823180008000(+62832)

    EPiC2 ECDSA P-224 Library

    EPiC2_ECDSA_P224_V1.0 (Firmware)


    PM1723b Series is high-performance Self-Encrypting SSD supporting NVMe Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and Hash_DRBG for key generation.

      • Cortex R7 ARM-based CPU
    12/15/2017
    • ECDSA:
      • 186-4:
        • Signature Verification:
          • P-224 SHA: SHA-256
        • Prerequisite: SHS #4072
    1287McAfee, Inc.
    2821 Mission College Blvd.
    Santa Clara, CA 95054
    USA

    Andy Nissen
    andy.nissen@intel.com
    651-770-6151

    McAfee Advanced Threat Defense

    4.0


    A cryptographic library compiled for Linux 4.4.27 on Intel Xeon

      • Intel Xeon w/ Linux 4.4.27
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4090, DRBG #1843
    1286SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    OpenJDK

    1.8.0-jdk8u152-b01-20170213 (Firmware)


    CPU optimizations used where appropriate: AESNI, RDRAND, SSE, AVX, etc..

      • Intel Xeon with AES-NI
      • Intel Core i5 with AES-NI
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4089, DRBG #1836
    1285SonicWALL Inc.
    5455 Great America Parkway
    Santa Clara, CA 95054
    USA

    Usha Sangala
    usanagala@SonicWALL.com
    408-962-6248
    Fax: 408-745-9300

    Mike Vache
    mvache@sonicwall.com
    408-962-6760
    Fax: 408-745-9300

    libcrypto

    1.0.2k (Firmware)


    OpenSSL v1.0.2k with minor patches.

      • Intel Core i5 with AES-NI
      • Intel Xeon with AES-NI
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4088, DRBG #1836
    1284Certes Networks, Inc.
    300 Corporate Center Drive
    Suite 140
    Pittsburgh, PA 15108
    USA

    Sean Everson
    sean.everson@certesnetworks.com
    1.412.357.1130
    Fax: 1.412.262.2574

    Gary Brunner
    gary.brunner@certesnetworks.com
    1.412.200.2177
    Fax: 1.412.262.2574

    CryptoFlow Net Creator Java Crypto Module

    1.0


    The CryptoFlow Net Creator Java Crypto library performs all cryptographic functionality for the CryptoFlow Net Creator management software, including asymmetric key generation, symmetric encryption, hashing, and digital signatures. The module supports the TLSv1.2 protocol.

      • Intel Xeon E3-1270v5 w/ CentOS 6.7
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4087, DRBG #1842
    1283RSA Security LLC
    174 Middlesex Turnpike
    Bedford, MA 01730
    USA

    FIPS Program
    fips-program@rsa.com

    RSA BSAFE® Crypto-J JSAFE and JCE Software Module

    6.2.4


    RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. It supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements.

      • Intel Core i5 w/ Windows 10 (64-bit)
      • Intel Xeon w/ CentOS 7.3
      • Qualcomm Snapdragon w/ Android 7.1.2
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4085, DRBG #1841
    1282Brocade Communications Systems, Inc.
    130 Holger Way
    San Jose, CA 95134
    USA

    Suneetha Sarala
    ssarala@brocade.com
    408-333-4090

    Chris Marks
    marksc@brocade.com
    408-333-0480

    BRCD-IP-CRYPTO-VER-4.0

    BRCD-IP-CRYPTO-VER-4.0 (Firmware)


    Firmware algorithm for the Brocade FastIron Series

      • ARM Cortex A9
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
        • Prerequisite: SHS #4081, DRBG #1837
    1281Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    SafeXcel 1746 Chip

    The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

      • N/A
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4080, DRBG #1704
    1280Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    Luna K6 Cryptographic Library

    6.24.6 (Firmware)


    The K6 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    12/8/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4080, DRBG #1704
    1279Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple tvOS CoreCrypto Module v8.0 (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software within tvOS.

      • Apple A10X w/ tvOS 11 Fusion
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4076, DRBG #1832
    1278Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    Luna G5 Cryptographic Library

    6.24.6 (Firmware)


    The G5 Cryptographic Library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4075, DRBG #1704
    1277Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto Virtual

    F6.2


    The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

      • Intel Xeon E series w/ ESXi 6.0
      • Intel Xeon E series w/ ESXi 5.5
      • Intel Xeon E series w/ NFVIS
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4074, DRBG #1828
    1276Cavium, Inc.
    2315 N 1st Street
    San Jose, CA 95131
    USA

    Tejinder Singh
    Tejinder.Singh@caviumnetworks.com
    408-943-7403
    Fax: 408-577-1992

    Phanikumar Kancharla
    Pkkancharla@caviumnetworks.com
    408-943-7496

    ngfips_ecc

    1.0.1 (Firmware)


    The NITROX XL 1600-NFBE HSM adapter family delivers the world's fastest FIPS 140-2 Level 3 Hardware Security Module (HSM) with PCIe Gen 2.0. The NITROX XL family of adapters offers up to 9,000 RSA 2k operations per second and 5 Gbps of bulk crypto.

      • CN52XX
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
        • Signature Generation:
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #1165, DRBG #32
    1275Brocade Communications Systems LLC
    120 Holger Way
    San Jose, CA 95110
    USA

    Hamid Sabouti
    hamid.sobouti@broadcom.com
    408-333-4150
    Fax: 408-333-3844

    Brocade Fabric OS FIPS Cryptographic Module

    8.2.0


    Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

      • e500v2 w/ Fabric Operating System(FOS) v8.2.0
      • e500mc w/ Fabric Operating System(FOS) v8.2.0
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4071, DRBG #1827
    1274SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 with AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4070, DRBG #1826
    1273SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS on x86 without AES-NI

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4069, DRBG #1825
    1272SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE NSS z13

    2.0


    SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

      • z13 w/ SUSE Linux Enterprise Server 12 SP2
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4068, DRBG #1824
    1271Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    ProtectServer Internal Express Cryptographic Library

    5 (Firmware)


    The SafeNet PSI-E cryptographic library provides a wide range of cryptographic functions.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4067, DRBG #1704
    1270Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    SafeXcel 1746 Chip

    The SafeXcel 1746 allows host processors to offload packet processing and crypto computations, providing acceleration of IPsec, TLS/SSL/DTLS, SRTP, and MACsec security protocol functions, as well as acceleration of the latest cipher and hash cryptographic algorithms, including Suite B.

      • N/A
    11/30/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4050, DRBG #1704
    1269Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell MV78460-B0 w/ Lexmark Linux v4
    11/22/2017
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Signature Verification:
          • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4064, DRBG #1821
    1268Lexmark International, Inc.
    740 West New Circle Road
    Lexington, KY 40550
    USA

    Graydon Dodson
    gdodson@lexmark.com
    +1 859 232-6483

    Crypto Module (user)

    3.2


    Lexmark Crypto Module (user)

      • Marvell 88PA6270C0 w/ Lexmark Linux v4
    11/22/2017
    • ECDSA:
      • 186-4:
        • Public Key Validation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
        • Signature Verification:
          • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4063, DRBG #1820
    1267Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - HW-Authentec

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4030, DRBG #1769
    1266Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    Luna IS Cryptographic Library

    6.3.2 (Firmware)


    The Luna IS cryptographic library provides a broad suite of high-performance cryptographic operations. All cryptographic algorithms are implemented within the module''s firmware or associated co-processor.

      • AMCC 440EPx Power PC (PPC440EPx) Embedded Processor
    11/22/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4050, DRBG #1704
    1265Cisco Systems, Inc
    170 W Tasman Dr
    San Jose, CA 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6520

    CiscoSSL FIPS Object Module

    6.0 (Firmware)


    The Cisco FIPS Object Module (FOM) is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

      • Apple A10 on iOS 10.x
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-192, P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-384, SHA-512
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-384, SHA-512
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4046, DRBG #1787
    1264Juniper Networks, Inc.
    1133 Innovation Way
    Sunnyvale, CA 94089
    USA

    Vann (Vanna) Nguyen
    vann@juniper.net
    408-745-2000

    Pradeepa M R
    pradeepam@juniper.net

    Junos FIPS Version 15.1X49 - SRX345 - OpenSSL

    15.1 X49-D110 (Firmware)


    Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

      • Cavium Octeon III (CN7130)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #4033, DRBG #1770
    1263Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Windows 8.1, Microsoft Windows Server 2012 R2, Microsoft Windows Storage Server 2012 R2, Microsoft Windows RT 8.1, Microsoft Surface with Windows RT 8.1, Microsoft Surface Pro with Windows 8.1, Microsoft Surface 2, Microsoft Surface Pro 2, Microsoft Surface Pro 3, Microsoft Windows Phone 8.1, Microsoft Windows Embedded 8.1 Industry and Microsoft StorSimple 8100 MsBignum Cryptographic Implementations

    6.3.9600


    The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 Datacenter with Windows Hyper-V enabled (x64)
      • Intel Core i5 with AES-NI w/ Windows Server 2012 R2 with Windows Hyper-V enabled (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #2373, DRBG #489
    1262Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A11 Bionic w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4028, DRBG #1767
    1261Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A7 w/ iOS 11 Fusion
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4027, DRBG #1766
    1260Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9X w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4026, DRBG #1765
    1259Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A10 Fusion w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4025, DRBG #1764
    1258Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8X w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4024, DRBG #1762
    1257Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A9 w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4023, DRBG #1761
    1256Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A7 w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4022, DRBG #1759
    1255Apple Inc.
    1 Infinite Loop
    Cupertino, CA 95014
    USA

    Shawn Geddis
    geddis@apple.com
    (669)227-3579
    Fax: (866)315-1954

    Apple iOS CoreCrypto v8 Userspace Module (Generic Software Implementation)

    8.0


    Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

      • Apple A8 w/ iOS 11
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits, Testing Candidates
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4021, DRBG #1758
    1254Cisco Systems, Inc.
    170 West Tasman Dr.
    San Jose, CA 95134
    USA

    Global Certification Team
    certteam@cisco.com

    Cisco Security Crypto

    F6.2 (Firmware)


    The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

      • Intel Atom C2xxx Family
      • Intel Xeon 34xx Family
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4012, DRBG #1735
    1253Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub Virtual TPM Implementations

    10.0.15063.674


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Prerequisite: SHS #4011, DRBG #1734
    1252Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); Virtual TPM Implementations

    10.0.16299


    The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Prerequisite: SHS #3790, SHS #4009, DRBG #1733
    1251Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub MsBignum Cryptographic Implementations

    10.0.15063.674


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #3790, SHS #4011, DRBG #1732
    1250Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Microsoft Surface Hub SymCrypt Cryptographic Implementations

    10.0.15063.674


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4011, DRBG #1732
    1249Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Mobile (version 1709) SymCrypt Cryptographic Implementations

    10.0.15254


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4010, DRBG #1731
    1248Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Mobile (version 1709) MsBignum Cryptographic Implementations

    10.0.15254


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile (ARMv7)
      • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile (ARMv7)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4010, DRBG #1731
    1247Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); MsBignum Cryptographic Implementations

    10.0.16299


    The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
    11/17/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #3790, SHS #4009, DRBG #1730
    1246Microsoft Corporation
    One Microsoft Way
    Redmond, WA 98052-6399
    USA

    Mike Grimm
    FIPS@microsoft.com
    800-Microsoft

    Windows 10 Home, Pro, Enterprise, Education, Windows 10 S Fall Creators Update and Windows Server, Windows Server Datacenter (version 1709); SymCrypt Cryptographic Implementations

    10.0.16299


    The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server Datacenter (x64)
      • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book 2 w/ Windows 10 Enterprise Fall Creators Update (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Fall Creators Update on Hyper-V on Windows Server 2016 (x64)
      • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Fall Creators Update (x86)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server on Hyper-V on Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server (x64)
      • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows Server (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows Server Datacenter (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Xeon with AES-NI and without SHA Extensions w/ Windows Server Datacenter on Hyper-V on Windows Server (x64)
      • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Fall Creators Update (x64)
      • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Fall Creators Update (x64)
    11/9/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-384
          • P-521 SHA: SHA-512
        • Prerequisite: SHS #4009, DRBG #1730
    1245Monkton, Inc
    2236 Central Ave
    Tysons, VA 22182
    USA

    Harold E. Smith III
    harold@monkton.io
    571-527-6680

    OpenSSL

    1.0.2L


    Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton''s Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

      • Apple A10 Fusion w/ iOS 10.3.2
      • Apple A10X w/ iOS 10.3.2
    11/9/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-224, P-256, P-384, P-521
        • Signature Generation:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #4008, DRBG #1632
    1244Ciena Corporation
    7035 Ridge Road
    Hanover, MD 21076
    USA

    Kevin Meagher
    KMeagher@ciena.com

    Ciena 6500 Packet Optical Family

    12.3


    Ciena''s Converged Packet Optical products integrate comprehensive Ethernet, TDM, and WDM capabilities in single platforms for cost-effective delivery of emerging and existing services, from the access edge, along the backbone core, and across ocean floors.

      • PowerQUICC II w/ VxWorks 6.1
      • PowerQUICC II w/ VxWorks 6.3
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384, P-521
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384, P-521
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-256, SHA-384, SHA-512
        • Signature Verification:
          • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
        • Prerequisite: SHS #3992, DRBG #1706
    1243Hewlett Packard Enterprise
    8000 Foothills Blvd.
    Roseville, CA 95747
    USA

    Susan Scotten
    susan.scotten@hpe.com
    1-916-540-1109

    Aruba Campus Switch Series Crypto Library

    16.04 (Firmware)


    Crypto library to support Aruba Campus Swtich Series (2930F, 2930M, 3810M and 5400R).

      • Freescale P2020 Dual Core
      • Dual Core ARM Coretex
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384
        • Prerequisite: DRBG #1705
    1242Gemalto
    20 Colonnade Road, Suite 200
    Ottawa, ON K2E7M6
    Canada

    Security and Certifications Team
    SecurityCertifications@gemalto.com

    SafeXcel 3120 Chip

    The Gemalto SafeXcel-3120 is a highly integrated device designed for modest performance and high security, where power and cost-sensitivity are a priority at the network edge. The embedded ARM processor, via a digital signature, will allow customer-specific application code to execute, enabling the device to implement a complete product solution.

      • N/A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-224
          • P-256 SHA: SHA-224, SHA-256
          • P-384 SHA: SHA-224, SHA-256, SHA-384
        • Signature Verification:
          • P-192 SHA: SHA-1
          • P-224 SHA: SHA-1, SHA-224
          • P-256 SHA: SHA-1, SHA-224, SHA-256
          • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
        • Prerequisite: SHS #3988, DRBG #1704
    1241Cisco Systems, Inc
    170 W Tasman Drive
    San Jose, California 95134
    USA

    Clint Winebrenner
    cwinebre@cisco.com
    919.392.6250

    IOS Common Cryptographic Module (IC2M)

    Rel 5 (Firmware)


    The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

      • MIPS64
      • Intel Atom
      • Intel Xeon
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
        • Signature Verification:
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
        • Prerequisite: SHS #3760, DRBG #1529
    1240Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    Natalya Robert
    natalya.robert@thalesesec.com
    954-888-6268

    Robert Burns
    robert.burns@thalesesec.con
    954-888-6215

    Vormetric Data Security Manager Virtual Appliance Module

    6.0.0


    The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

      • Intel Xeon w/ Centos 7.2 on VMware ESXi 6.5.
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3987, DRBG #1703
    1239Thales e-Security Inc.
    900 South Pine Island Road
    Suite 710
    Plantation, FL 33324
    USA

    Natalya Robert
    natalya.robert@thalesesec.com
    954-888-6268

    Robert Burns
    robert.burns@thalesesec.con
    954-888-6215

    Vormetric Data Security Manager Module

    6.0.0 (Firmware)


    The Vormetric Data Security Manager is a multi-chip standalone cryptographic module. The Vormetric Data Security Manager is the central point of management for the Vormetric Data Security product. It manages keys and policies, and controls Vormetric Encryption Expert Agents.

      • Intel Xeon
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Extra Random Bits
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3986, DRBG #1702
    1238F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP vCMP on B4450 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3983, DRBG #1700
    1237SUSE, LLC
    10 Canal Park, Suite 200
    Cambridge, MA 02141
    USA

    Andreas Stieger
    astieger@suse.com
    +49 911 74053 384

    Thomas Biege
    thomas@suse.de
    +49 911 74053 500

    SUSE libgcrypt using generic C implementation

    3.0


    This test covers generic C implementation of multiple algorithms.

      • z13 w/ SUSE Linux Enterprise Server 12 SP2
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-224, P-256, P-384, P-521
          • Generation Methods: Testing Candidates
        • Signature Generation:
          • P-224 SHA: SHA-256
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
          • P-521 SHA: SHA-256
        • Signature Verification:
          • P-224 SHA: SHA-256
          • P-256 SHA: SHA-256
          • P-384 SHA: SHA-256
          • P-521 SHA: SHA-256
        • Prerequisite: SHS #3982, DRBG #1699
    1236F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP vCMP on B2250 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3981, DRBG #1698
    1235F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP 10350F TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3980, DRBG #1697
    1234F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP B4450N TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3979, DRBG #1696
    1233F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038
    Fax: ~

    BigIP B2250 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3978, DRBG #1695
    1232F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP vCMP on B4450 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3977, DRBG #1694
    1231F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP B4000 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3976, DRBG #1693
    1230F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP i5820 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3975, DRBG #1692
    1229F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP B7000 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E3-1275
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3974, DRBG #1691
    1228F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP i7820 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1650
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3976, DRBG #1693
    1227F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BigIP i4000 TMM Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3972, DRBG #1689
    1226F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B4450N OpenSSL Software Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658A
    11/3/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3971, DRBG #1688
    1225F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B2250 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3970, DRBG #1687
    1224F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP 10350F OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3969, DRBG #1686
    1223F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP vCMP on B2250 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-2658
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3968, DRBG #1685
    1222F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B4000 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall firmware running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3967, DRBG #1684
    1221F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP i4000 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3966, DRBG #1683
    1220F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP i7820 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1650
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3965, DRBG #1682
    1219F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP i5820 OpenSSL Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP.

      • Intel(R) Xeon(R) CPU E5-1630
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3964, DRBG #1681
    1218F5 Networks
    401 Elliott Avenue West
    Seattle, WA 98119
    USA

    Maryrita Steinhour
    m.steinhour@f5.com
    206-272-7351

    John Hughes
    j.hughes@f5.com
    206-272-6038

    BIGIP B7000 OpenSSL Software Implementation

    13.1.0 (Firmware)


    F5® BIG-IP® Application Delivery Controller and Firewall software running on F5 BIG-IP and VIPRION hardware

      • Intel(R) Xeon(R) CPU E3-1275
    10/27/2017
    • ECDSA:
      • 186-4:
        • Key Pair Generation:
          • Curves: P-256, P-384
          • Generation Methods: Testing Candidates
        • Public Key Validation:
          • Curves: P-256, P-384
        • Signature Generation:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Signature Verification:
          • P-256 SHA: SHA-256, SHA-384
          • P-384 SHA: SHA-256, SHA-384
        • Prerequisite: SHS #3963, DRBG #1680
    1217
    10/27/2017
      1216Synopsys, Inc.
      690 East Middlefield Road
      Mountain View, CA 94043
      USA

      Dana Neustadter
      danan@synopsys.com
      +1(613)595-9836

      DWC Cryptography Software Library

      4.2.0


      The DesignWare Cryptography Software Library offers a comprehensive suite of the most widely used symmetric and asymmetric cryptography algorithms and certificate processing functions. The library features optimized designs for embedded applications targeting many CPU variants (e.g. ARC,ARM,x86) and environments (e.g. Linux,Android,iOS,Windows).

        • ARC® EM7D Processor with CryptoPack w/ n/a
      10/20/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3958, DRBG #1676
      1215IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      1-845-435-5538

      William Santiago
      wsf1@us.ibm.com
      1-845-435-9265

      Miniboot 1.30 with 00CW683

      MB1.30 Hash E215 7B6F (Firmware)


      Miniboot implemented algorithms with hardware acceleration

        • IBM PowerPC 405
      10/20/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3957, DRBG #1675
      1214IBM
      2455 South Rd
      Poughkeepsie, NY 12601
      USA

      Thomas Morris Jr
      tmorrisj@us.ibm.com
      1-845-435-5538

      William Santiago
      wsf1@us.ibm.com
      1-845-435-9265

      Miniboot 1.30 with 00KP899

      MB1.30 Hash E215 7B6F (Firmware)


      Miniboot implemented algorithms with hardware acceleration

        • IBM PowerPC 405
      10/20/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-521
            • Generation Methods: Testing Candidates
          • Signature Verification:
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3956, DRBG #1674
      1213Infoblox
      3111 Coronado Drive
      Santa Clara, CA 95054
      USA

      Dave Funk
      dfunk@infoblox.com
      408-986-5591

      NIOS Cryptographic Library

      2.0 (Firmware)


      Infoblox NIOS software, coupled with Infoblox appliances, enables customers to deploy large, robust, manageable and cost-effective Infoblox Grids to enable distributed delivery of core network services including DNS, DHCP, IPAM, NTP, TFTP, and FTP

        • Intel Xeon w/ VMware ESXi 5
        • Intel Xeon
      10/13/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3953, DRBG #1671
      1212Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Common Cryptographic Module

      AOS VMC 6.4.2.0-1.3-FIPS (Firmware)


      Linux on Intel

        • Intel x86, i7
      10/13/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1211Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • NXP QorIQ P10XX Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1210Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Qualcomm IPQ8068
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1209Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • Broadcom BCM53014A
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1208Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • XLP400 Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1207Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • XLP300 Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1206Aruba, a Hewlett Packard Enterprise company
      3333 Scott Blvd
      Santa Clara, CA 95054
      USA

      Steve Weingart
      steve.weingart@hpe.com
      512-319-2480

      ArubaOS Crypto Module

      6.5.1-FIPS (Firmware)


      The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

        • XLP200 Series
      10/6/2017
      • ECDSA:
        • 186-4:
          • Public Key Validation:
            • Curves: P-256, P-384
      1205Juniper Networks, Inc.
      1133 Innovation Way
      Sunnyvale, CA 94089
      USA

      Bill Shelton
      bshelton@juniper.net
      408-745-2000
      Fax: 408-745-2100

      Vann (Vanna) Nguyen
      vann@juniper.net
      408-745-2000

      JUNOS Version 17.3R1-OpenSSL

      17.3R1 (Firmware)


      The Juniper Networks NFX250 Network Services Platform is a secure, automated, software-driven customer premised equipment (CPE) platform that delivers virtualized network, application and security services on demand.

        • Intel Xeon D-1531
      10/6/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-384
          • Prerequisite: SHS #3939, DRBG #1666
      1204SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      SafeLogic Sales
      na

      CryptoComply Server Engine

      2.1


      CryptoComply | Server is a standards-based "drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at restencryption, and secure communications to a trusted implemntation.

        • Intel i7 w/ CentOS 7
      9/29/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3929, DRBG #1662
      1203MediaTek Inc.
      No.1, Dusing Rd. 1, Hsinchu Science Park
      Hsinchu, Taiwan 30078
      Taiwan

      William Cheng
      William.cheng@mediatek.com
      +1-858-731-9200
      Fax: +1-858-731-9201

      MingHsien Hsieh
      minghsien.hsieh@mediatek.com
      +886-3-567-0766
      Fax: +886-3-578-7610

      MTK CryptoCore V1.0 Secure Core

      sw-cc710tee-2.0.5.1279 (Firmware)


      The MTK CryptoCore cryptographic module (hereafter referred to as “the module”) is designed to provide foundational security services for the platform, including secure boot, secure life cycle state, platform identity and key management. It offers high-throughput cryptography operations, suitable for a diverse set of use cases.

        • ARM TrustZone-Enabled Cortex-A Series CPU
      9/29/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3927, DRBG #1661
      1202Sonus Networks, Inc.
      4 Technology Park Drive
      Westford, MAS 01886
      USA

      Keith Conger
      kconger@sonusnet.comkconger@sonusnet.com
      978-614-8115

      Adam Elshama
      aelshama@sonusnet.com
      978-614-8327

      Sonus Cryptographic Library version 3.0

      5.1.2


      Sonus’ Session Border Controller Software Edition (SWe) is a software-only SBC architected to enable and secure real-time communications in multiple virtual environments. It features the same code base, resiliency, media transcoding, and security technology found in Sonus’ hardware-based SBC 5000 or 7000 series.

        • Intel Xeon w/ Sonus’ ConnexIP OS running on VMware ESXi 6.0
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3836, DRBG #1588
      1201Hewlett-Packard Development Company, L.P.
      11445 Compaq Center Drive W
      Houston, TX 77070
      USA

      Hridya Valakkadavil Thilakan
      hridya-valakkadavil.thilakan@hpe.com

      Aprana Shrivastava
      aprana.shrivastava@hpe.com

      HPE BladeSystem c-Class Onboard Administrator Firmware OpenSSL libcrypto Library 1.0.2h

      4.71 (Firmware)


      The module provides administrative control of HPE BladeSystem c-Class enclosures. The cryptographic functions of the module provide security for administrative access via HTTPS and SSH, and to administrative commands for the BladeSystem enclosure.

        • PowerPC 440EPx
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3920, DRBG #1654
      1200FireEye, Inc.
      1440 McCarthy Boulevard
      Milipitas, CA 90655
      USA

      Steve Lanser
      steve.lanser@fireeye.com
      508-983-2505

      FireEye Cryptographic Implementation

      1.0


      The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

        • Intel Xeon with ESXi 6.5 w/ FEYEOS 8.0
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3919, DRBG #1653
      1199Oracle Corporation
      500 Oracle Parkway
      Redwood Shores, CA 94065
      USA

      Linda Gallops
      linda.gallops@oracle.com
      +1 704.972.5018
      Fax: +1 980.355.5399

      Chris Brych
      chris.brych@oracle.com
      +1 613.216.3078

      Oracle Linux 6 NSS without AES-NI

      R6-1.0.0


      Oracle Linux 6 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

        • Intel Xeon E5-2699 v4 w/ Oracle Linux 6.9 64 bit
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3918, DRBG #1652
      1198IBM Corporation
      1787 Sentry Pkwy West
      Building 18, Suite 200
      Blue Bell, PA 19422
      USA

      Sandeep Singhal
      Sandeep.Singhal1@ibm.com
      215-664-1614

      OpenSSL for the IBM MaaS360 Cloud Extender

      2.91


      The open source OpenSSL API provides a cryptographic library used by the MaaS360 Cloud Extender.

        • Intel Core i3 w/ Microsoft Windows Server 2012 R2 (x64)
      9/26/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-256, SHA-384
          • Prerequisite: SHS #3914, DRBG #1650
      1197Cisco Systems, Inc.
      170 West Tasman Drive
      San Jose, CA 95134
      USA

      Global Certification Team
      certteam@cisco.com

      Cisco Security Crypto Virtual

      F6.0


      FP FIPS Object Module (FOM) provides cryptographic services to an underlying host that as a minimum provides some level of management, event storage, host monitoring and user monitoring capabilities along with other services.

        • Intel Xeon E series w/ ESXi 5.5, Intel Xeon E series w/ ESXi 6.0
      9/15/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-384, SHA-512
            • P-521 SHA: SHA-512
          • Prerequisite: SHS #3913, DRBG #1649
      1196Bomgar Corporation
      578 Highland Colony Parkway
      Paragon Centre, Suite 300
      Ridgeland, MS 39157
      USA

      Faye Santangelo
      FSantangelo@bomgar.com
      6016078322

      Bomgar Cryptographic Engine

      2.0.13 (Firmware)


      The Bomgar Cryptographic Engine provides the cryptographic functionality required by the Bomgar FIPS appliance. This appliance allows support professionals to connect securely to remote clients and co-workers via the Internet, providing complete desktop access for remote support.

        • Intel® Xeon E5-2640 v3
      9/15/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3912, DRBG #1648
      1195SUSE, LLC
      10 Canal Park, Suite 200
      Cambridge, MA 02141
      USA

      Andreas Stieger
      astieger@suse.com
      +49 911 74053 384

      Thomas Biege
      thomas@suse.de
      +49 911 74053 500

      SUSE libgcrypt using generic C implementation

      3.0


      This test covers generic C implementation of multiple algorithms.

        • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
      9/8/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Signature Generation:
            • P-224 SHA: SHA-256
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
            • P-521 SHA: SHA-256
          • Signature Verification:
            • P-224 SHA: SHA-256
            • P-256 SHA: SHA-256
            • P-384 SHA: SHA-256
            • P-521 SHA: SHA-256
          • Prerequisite: SHS #3910, DRBG #1644
      1194Lenovo Group Limited
      7001 Development Drive
      Morrisville, NC 27560
      USA

      James Takahashi
      jtakahashi2@lenovo.com
      503-643-8308

      Taylor Greenwood
      tgreenwood@lenovo.com
      515-450-7432

      Lenovo OpenSSL Library for ThinkSystem (Generic Assembler for AES and SHA)

      1.0


      The Lenovo OpenSSL Library for ThinkSystem module is a software library that provides FIPS 140-2 validated Transport Layer Security (TLS) functionality, and general purpose cryptographic algorithms within ThinkSystem hardware management systems.

        • Intel Xeon CPU E5 family w/ Linux 2.6.32 on VMware ESXi 6.0.0
      9/8/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3905, SHS #3906, SHS #3907, DRBG #1641
      1193FireEye, Inc.
      1440 McCarthy Boulevard
      Milipitas, CA 90655
      USA

      Steve Lanser
      steve.lanser@fireeye.com
      508-983-2505

      FireEye SSL

      1.0 (Firmware)


      The FireEye Algorithms Implementation provides cryptographic services for CMS and LMS appliances.

        • Intel Xeon
        • Intel Xeon with ESXi 6.5
        • Intel Atom
        • AMD Opteron
      9/8/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: P-256, P-384, P-521
          • Signature Generation:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
          • Prerequisite: SHS #3904, DRBG #1638
      1192VMware, Inc.
      3401 Hillview Ave
      Palo Alto, CA 94303
      USA

      Manoj Maskara
      mmaskara@vmware.com
      650-427-1000
      Fax: 650-475-5001

      Michael McKay
      mmckay@vmware.com
      650-427-3615
      Fax: 650-475-5001

      VMware BC-FJA (Bouncy Castle FIPS Java API)

      1.0.0


      The VMware BC-FJA (Bouncy Castle FIPS Java API) is a software cryptographic module that provides cryptographic functions and services to various VMware applications via a well-defined Java-language application programming interface (API).

        • Intel Xeon E5 w/ Windows Server 2012 R2 with JRE 1.8 on ESXi 6.5
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3902, DRBG #1637
      1191Legion of the Bouncy Castle Inc.
      85 The Crescent
      Ascot Vale, Victoria 3032
      Australia

      David Hook
      dgh@bouncycastle.org
      +61438170390

      Jon Eaves
      jon@bouncycastle.org
      +61417502969

      Bouncy Castle FIPS Java API

      1.0.1


      The Bouncy Castle FIPS Java API is a comprehensive suite of FIPS Approved algorithms implemented in pure Java. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms are available in non-approved operation as well.

        • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 7 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
        • Intel Xeon Processor X5670 w/ Java SE Runtime Environment 8 on Red Hat Enterprise Linux 7.3 on VMware ESXi 5.5
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3901, DRBG #1636
      1190Software Diversified Services
      1322 81st Ave NE
      Minneapolis, MN 55432
      USA

      Tim Full
      cavp@sdsusa.com

      SDS Cryptographic Module

      1.0


      Software only Cryptographic Module supports Elliptic Curve, KAS, AES, TDES, DSA, RSA, HMAC and SHA-2.

        • Intel i7 with AES-NI w/ Windows Server 2012 R2
        • Intel i7 with AES-NI w/ Windows Server 2016
        • Intel i7 with AES-NI w/ RedHat 6.9
        • Intel i7 with AES-NI w/ RedHat 7.4
        • POWER8 w/ AIX 6.1
        • POWER8 w/ AIX 7.2
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-224, P-256, P-384, P-521
          • Signature Generation:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3898, DRBG #1635
      1189Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      Luna K7 Cryptographic Library

      7.0.1 (Firmware)


      The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

        • PowerPC 476
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Prerequisite: DRBG #200556-0-N-00
      1188Gemalto
      20 Colonnade Road, Suite 200
      Ottawa, ON K2E7M6
      Canada

      Security and Certifications Team
      SecurityCertifications@gemalto.com

      Luna K7 Accelerated Cryptographic Library

      7.0.1 (Firmware)


      The K7 Cryptographic Library provides a broad suite of high-performance cryptographic operations and functionality to SafeNet Luna Hardware Security Modules.

        • PowerPC 476
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3896, DRBG #1634
      1187A10 Networks, Inc.
      3 West Plumeria Drive
      San Jose, CA 95134
      USA

      John Chiong
      +1 408 325-8668

      A10 Networks Data Plane FIPS Software Library

      3.0.0 (Firmware)


      The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

        • Intel Xeon E3-1275v2 with AES-NI
        • Intel Xeon E5-1650v3 with AES-NI
        • Intel Xeon E5-2697v2 with AES-NI
        • Intel Xeon E5-2697v4 with AES-NI
      9/1/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Testing Candidates
          • Public Key Validation:
            • Curves: P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #2013, DRBG #1633
      1186Monkton, Inc
      2236 Central Ave
      Tysons, VA 22182
      USA

      Harold E. Smith III
      harold@monkton.io
      571-527-6680

      OpenSSL

      1.0.2L


      Monkton leverages OpenSSL 1.0.2L to provide the cryptographic implementation for FIPS leveraging their FIPS module. Monkton''s Rebar utilizes OpenSSL to provide the features necessary to integrate DAR and DIT.

        • Apple A10X w/ iOS 10.3.2
        • Apple A10 Fusion w/ iOS 10.3.2
      8/25/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits
          • Signature Generation:
            • B-233 SHA: SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-233 SHA: SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3894, DRBG #1632
      1185SafeLogic, Inc.
      530 Lytton Ave
      Suite 200
      Palo Alto, CA 94301
      USA

      Ray Potter
      ray@safelogic.com
      650-646-1702

      CryptoComply Server Engine

      2.1


      CryptoComply Server is a standards-based "Drop-in Compliance" solution for servers and appliances. The module features robust algorithm support, including Suite B algorithm compliance. CryptoComply offloads secure key management, data integrity, data at rest encryption, and secure communications to a trusted implementation

        • Intel x86_64 w/ CentOS 7.3
      8/25/2017
      • ECDSA:
        • 186-4:
          • Key Pair Generation:
            • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
            • Generation Methods: Extra Random Bits, Testing Candidates
          • Public Key Validation:
            • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
          • Signature Generation:
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Signature Verification:
            • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
          • Prerequisite: SHS #3893, DRBG #1631
      1184ARM Ltd
      110 Fulbourn Road
      Cambridge CB1 9NJ
      United Kingdom

      Leo Dorrendorf
      leo.dorrendorf@arm.com
      +972-52-6818594
      Fax: +972-73-2558808

      Udi Maor
      udi.maor@arm.com
      +972-54-4205101
      Fax: +972-73-2558808

      ARM TrustZone Cryptocell 712 TEE

      ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

        8/25/2017
        • ECDSA:
          • 186-4:
            • Key Pair Generation:
              • Curves: P-224, P-256, P-384, P-521
              • Generation Methods: Testing Candidates
            • Public Key Validation:
              • Curves: P-192, P-224, P-256, P-384, P-521
            • Signature Generation:
              • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
            • Signature Verification:
              • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
            • Prerequisite: SHS #3892, DRBG #1630
        1184ARM Ltd
        110 Fulbourn Road
        Cambridge CB1 9NJ
        United Kingdom

        Leo Dorrendorf
        leo.dorrendorf@arm.com
        +972-52-6818594
        Fax: +972-73-2558808

        Udi Maor
        udi.maor@arm.com
        +972-54-4205101
        Fax: +972-73-2558808

        ARM TrustZone Cryptocell 712 TEE

        ARM TrustZone CryptoCell is a security engine with root of trust and cryptographic accelerator capabilities. It is provided to customers as Silicon IP and accompanying firmware. The customer integrates the silicon into the host CPU hardware, and uses the firmware to drive the silicon and provide high-level functions.

          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3892, DRBG #1630
          1183Nuvoton Technology Corporation
          No. 4, Creation Rd. III
          Hsinchu Science Park 300
          Taiwan, R.O.C.

          Yossi Talmi
          yossi.talmi@nuvoton.com
          +972-9-9702364
          Fax: +972-9-9702001

          Oren Tanami
          oren.tanami@nuvoton.com
          +972-9-9702390
          Fax: +972-9-9702001

          Nuvoton NPCT7xx TPM 2.0 Cryptographic Engine

          Nuvoton NPCT7xx TPM (Trusted Platform Module), security processor with embedded firmware compliant with TPM Family 2.0, level 0, revision 1.38

            • N/A
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-256, SHA-384
              • Prerequisite: SHS #3890, DRBG #1628
          1182Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Red Hat NSS Softoken (64 bit)

          5.0


          User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 64bit word size.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3885, DRBG #1626
          1181Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          Red Hat NSS Softoken (32 bit)

          5.0


          User space library providing general cryptographic services used by the NSS cryptographic library. The module was tested with 32 bit word size.

            • Intel(R) Xeon(R) E5-2640 v3 w/ Red Hat Enterprise Linux 7.4
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3884, DRBG #1625
          1180IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • SPARC T4 w/ Solaris(R) 11 64-bit
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3883, DRBG #1624
          1179IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • SPARC T4 w/ Solaris(R) 11 64-bit
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3882, DRBG #1623
          1178IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3881, DRBG #1622
          1177IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Red Hat Linux Enterprise Server 7.3 64-bit
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3879, DRBG #1620
          1176IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3878, DRBG #1619
          1175IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ Microsoft Windows Server 2012R2(R) 64-bit
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3877, DRBG #1618
          1174IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core without PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3876, DRBG #1617
          1173IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on VMWare v6.0.0
          8/25/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3875, DRBG #1616
          1172IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 7100
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3874, DRBG #1615
          1171IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel(R) Xeon(R) Processor E5 Family w/ IBM MESA 8.1 on IBM XGS 5200
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3872, DRBG #1613
          1170IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Core i7 w/ IBM MESA 8.1 on IBM XGS 5100
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3871, DRBG #1612
          1169IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Core i3 w/ IBM MESA 8.1 on IBM XGS 4100
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3870, DRBG #1611
          1168IBM(R) Corporation
          Seabank Centre
          12 - 14 Marine Parade
          Southport, QLD 4215
          Australia

          Peter Waltenberg
          pwalten@au1.ibm.com
          +61 7 5552 4016
          Fax: +61 7 5571 0420

          ICC Algorithmic Core with PAAs

          8.6.0.0


          ICC is a C language implementation of cryptographic functions based on the cryptographic library provided by the OpenSSL project. This enables IBM products to use an open source solution for cryptography and a FIPS 140-2 certified cryptographic provider.

            • Intel Pentium (R) B915C w/ IBM MESA 8.1 on IBM XGS 3100
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3869, DRBG #1610
          1167Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100- OpenSSL-vSRX

          15.1X49-D100


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3865, DRBG #1609
          1166Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100- Quicksec

          15.1X49-D100


          The vSRX Virtual Firewall delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises. vSRX empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

            • Intel Xeon E5 w/ JUNOS FIPS Ver. 15.1X49-D100 on VMware ESXi v5.5
          8/18/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3864, DRBG #1608
          1165Yubico
          420 Florence St, Ste 200
          Palo Alto, CA 94301
          USA

          Jerrod Chong
          jerrod@yubico.com

          Jakob Ehrensvard
          jakob@yubico.com

          Yubico HW/FW ECC

          e58230b8 with Infineon CL70 1.03.006 (Firmware)


          This module contains three parts: 1) ECC core hardware/firmware implementation via Infineon CL70 crypto library; 2) High-level firmware implementation for key generation and ECDSA signature generation; 3) ECC curve domain parameters

            • Infineon SLE78V2
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Prerequisite: DRBG #1604
          1164Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-QuickSec

          15.1X49-D100 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3857, DRBG #1603
          1163Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-OpenSSL

          15.1X49-D100 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3856, DRBG #1602
          1162Hewlett Packard Enterprise Storage
          4209 Technology Drive
          Fremont, CA 94538
          USA

          Kurt Heberlein
          kurt.w.heberlein@hpe.com
          +1 512 319 1294

          David Heisser
          david.heisser@hpe.com
          +1 650 209 0937

          HPE-3PAR SSMC 3.2 with Java JCE v1.8

          HPE-3PAR SSMC 3.2


          HPE-3PAR StoreServ Management Console (SSMC) 3.2 running on Windows 2012 R2, Windows 2016, RHEL7.3, or hpelinux (Debian 8) in a Java 1.8 JVM with BouncyCastle JCE provider v156 on any Intel E5 family CPU.

            • Intel Xeon E5 Family w/ Windows 2012
            • Intel Xeon E5 Family w/ Windows 2016
            • Intel Xeon E5 Family w/ hpelinux (Debian 8)
            • Intel Xeon E5 Family w/ RHEL 7.3
          8/11/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3852
          1161Trend Micro Inc.
          11305 Alterra Parkway
          Austin, TX 78758
          USA

          Paul Tucker
          paul_tucker@trendmicro.com
          512-633-7945

          TippingPoint Crypto Core OpenSSL

          2.0.13


          The TippingPoint Crypto Core OpenSSL is a software library which provides FIPS 140-2 approved cryptographic algorithms and services for TippingPoint security products.

            • Intel Core i3 without PAA w/ Linux 4.4
            • Intel Xeon with PAA w/ Linux 4.4
            • Intel Xeon without PAA w/ Linux 4.4 on Vmware ESXi 6.5
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3850, DRBG #1601
          1160SafeLogic, Inc.
          530 Lytton Ave
          Suite 200
          Palo Alto, CA 94301
          USA

          SafeLogic Inside Sales
          sales@safelogic.com
          (844) 436-2797

          CryptoComply Java Engine

          3.0.1


          CryptoComply Java is a comprehensive suite of FIPS Approved algorithms implemented in pure Java.

            • Intel® Xeon® X5670 w/ OpenJDK 1.7 on CentOS 6 on HP ProLiant DL360 G7 Server
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3849, DRBG #1600
          1159LG Electronics, Inc.
          20 Yoido-dong
          Youngdungpo-gu
          Seoul 152-721
          Republic of Korea

          Jongseong Kim
          jongseong.kim@lge.com
          82-10-4535-0110
          Fax: 82-2-6950-2080

          LG BoringSSL

          2.0


          General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

            • Snapdragon 835 (MSM8998) w/ Android 7.1.2
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3841, DRBG #1592
          1158NetBrain Technologies, Inc
          15 Network Drive 2nd Floor
          Burlington, Massachusetts 01803
          United States

          Michael Passanisi
          Michael.Passanisi@netbraintech.com
          781-221-7199 (x2055)
          Fax: +1 (781) 998-5800

          Boyang Zhang
          boyang.zhang@netbraintech.com
          781-221-7199 (x2059)

          NetBrain OpenSSL Cryptographic Module

          1.0


          The NetBrain OpenSSL Cryptographic Module is a C library of cryptographic functions which provides cryptographic services to applications via easy-to-use API. It can be dynamically linked into applications for the use of general-purpose FIPS 140-2 validated cryptography.

            • Intel Xeon E3 family w/ Windows Server 2012 R2 Standard
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3840, DRBG #1591
          1157Taisys Technologies Co. Ltd.
          7F., No.56, Lane 321
          Yangguang St., Neihu Dist.
          Taipei, Taipei 11491
          Taiwan (R.O.C.)

          Joe Wang
          joe.wang@taisys.com
          +886-2-26270927x6699
          Fax: +886-2-26270619

          Kent Horng
          kent.horng@taisys.com
          +886-2-26562185 #206
          Fax: +886-2-26579657

          TAISYS JUISE-S2

          The TAISYS JUISE-S2 is a contact/contactless module that provides security services targeted at mobile devices in a single Integrated Circuit Chip. The module is implemented upon Sun Java Card ™ 3.0.4 Classic Edition specifications and is also compliant with GlobalPlatform Card Specification - Version 2.2.1 with SCP03.

            • N/A
          8/11/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3838, DRBG #1590
          1156Thales e-security
          900 S Pine Island Road #170
          Plantation, Florida 33324
          USA

          Thales Sales
          sales@thalesesec.com
          888-744-4976

          TASP-ECDSA

          V1.0 (Firmware)


          ECDSA for TASP Bootstrap

            • NXP QorIQ T4081
          8/11/2017
          • ECDSA:
            • 186-4:
              • Signature Generation:
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3829
          1155Cisco Systems, Inc
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon on VMware ESXi 5.5
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3831, DRBG #1583
          1154Cisco Systems, Inc
          170 W Tasman Dr
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is a firmware library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3830, DRBG #1581
          1153Qualcomm Technologies, Inc.
          5775 Morehouse Dr
          San Diego, CA 92121
          USA

          Yin Ling Liong
          yliong@qti.qualcomm.com
          858-651-7034
          Fax: 858-845-1523

          Qualcomm Secure Execution Environment (QSEE) Secure App Software Crypto 64bit Module

          TZ.BF.4.0.6-00128


          App Software Crypto Module provides various software cryptographic functionalities to the 64bit QSEE Trusted Applications.

            • Snapdragon 835 w/ Qualcomm Secure Execution Environment (QSEE)
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • Prerequisite: SHS #3826, DRBG #1455
          1152Qualcomm Technologies, Inc.
          5775 Morehouse Dr
          San Diego, CA 92121
          USA

          Yin Ling Liong
          yliong@qti.qualcomm.com
          858-651-7034
          Fax: 858-845-1523

          Qualcomm Secure Execution Environment (QSEE) Secure App Software Crypto 32 bit Module

          TZ.BF.4.0.6-00128


          QSEE Secure App Software Crypto Module provides various software cryptographic

            • Snapdragon 835 w/ Qualcomm Secure Execution Environment (QSEE)
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • Prerequisite: SHS #3825, DRBG #1455
          1151Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3824, DRBG #1579
          1150Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (no AVX2, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3823, DRBG #1578
          1149RSA, The Security Division of EMC
          174 Middlesex Turnpike
          Bedford, MA 01730
          USA

          Rohit Mathur
          rohit.mathur@rsa.com
          +61730325220

          RSA BSAFE Crypto-C Micro Edition

          4.1.3.2


          RSA BSAFE® Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

            • ARMv7 (64-bit) w/ Timesys Linux 4.2.8
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3822, DRBG #1577
          1148Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (Full CPU set, x86_64, 32-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3821, DRBG #1576
          1147Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          GnuTLS_x86_64_C

          5.0


          GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

            • Intel x86 (64-bit) w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3818, DRBG #1575
          1146Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          GnuTLS_x86_C

          5.0


          GnuTLS supported by Nettle is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure ommunications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.

            • Intel x86 (32-bit) w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3817, DRBG #1574
          1145Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux 7 NSS without AES-NI

          R7-2.0.0


          Oracle Linux 7 NSS Cryptographic Module is a set of libraries designed to support cross-platform development of security-enabled applications.

            • Intel Xeon E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3808, DRBG #1568
          1144Red Hat, Inc.
          100 E. Davie Street
          Raleigh, NC 27601
          USA

          Jaroslav Reznik
          jreznik@redhat.com

          OpenSSL (Full CPU set, x86_64, 64-bit library)

          5.0


          The OpenSSL FIPS Runtime Module is a general purpose cryptographic library designed to provide FIPS 140-2 validated cryptographic functionality for use with the high level API of the OpenSSL library.

            • Intel x86 64 bits w/ Red Hat Enterprise Linux 7.4
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3807, DRBG #1567
          1143DocuSign, Inc.
          221 Main St.
          Suite 1000
          San Francisco, CA 94105
          USA

          Ezer Farhi
          ezer@arx.com
          972-39279529
          Fax: 972-39230864

          Moshe Harel
          Moshe.Harel@docusign.com
          972-3-9279578
          Fax: 972-3-9230864

          PrivateServer

          5.0.2 (Firmware)


          PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

            • Intel Xeon Quad-Core
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3804, DRBG #1565
          1142Trusted Concepts
          205 Van Buren St
          Suite 440
          Herndon, VA 20170
          USA

          Chris Greenlee
          chris.greenlee@trustedconcepts.com
          202.680.3718

          TrustedKeep Encryption Module

          1.8.3


          TrustedKeep is a secure object storage and sharing solution.

            • Intel Core i7 w/PAA w/ CentOS 7.3
            • Intel Core i7 w/o PAA w/ CentOS 7.3
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
              • Prerequisite: SHS #3801, DRBG #1563
          1141Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-QuickSec

          15.1X49-D100 (Firmware)


          The SRX1500 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, SRX1500 best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E3
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3798, DRBG #1560
          1140Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49-D100-OpenSSL

          15.1X49-D100 (Firmware)


          The SRX4100/4200 Services Gateway is a next-generation firewall and security services gateway offering outstanding protection, performance, scalability, availability, and security service integration. With best in class networking and security in a single platform, these best suited for enterprise data centers, campuses, and regional headquarters.

            • Intel Xeon E5
          8/4/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3795, DRBG #1559
          1139Google Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Titan Key FIPS officer
          titan-key-fips-officer@google.com

          Titan Key

          Implemented with Google’s "Titan" secure microcontroller and custom firmware, the Titan Key is a FIPS-compliant Universal 2nd Factor (U2F) authenticator and hardware root of trust.

            • N/A
          7/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256
              • Signature Generation:
                • P-256 SHA: SHA-256
              • Signature Verification:
                • P-256 SHA: SHA-256
              • Prerequisite: SHS #3794, DRBG #1558
          1138Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Petra Manche
          +44 1189 245470

          Chris Brych
          +1 613.216.3078

          Oracle ILOM OpenSSL FIPS Object Module

          2.0.10


          Oracle ILOM OpenSSL FIPS Object Module is a software library providing a C language application program interface (API) for use by other processes that require cryptographic functionality and is classified by FIPS 1402 as a software module, multichip standalone module embodiment.

            • Oracle ILOM SP v3 (ARM 7) without PAA w/ Oracle ILOM OS v3.0
            • Oracle ILOM SP v3 (ARM 7) with PAA w/ Oracle ILOM OS v3.0
          7/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3793, DRBG #1557
          1137Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x87416
          Fax: 613-225-9951

          Fortinet FortiOS SSL Cryptographic Library

          5.4 (Firmware)


          This document focuses on the firmware implementation of the Fortinet FortiOS SSL Cryptographic Library v5.4 running on Intel x86 compatible processors.

            • ARM v5 Compatible (SoC2)
            • ARM v7 Compatible (SoC3)
            • Intel Celeron
            • Intel Xeon E5
            • Intel i3
            • Intel i5
            • Intel i7
          7/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3792, DRBG #1543
          1136Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Pro, Enterprise, Education Virtual TPM Implementations

          10.0.15063


          The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Prerequisite: SHS #3790, DRBG #1556
          1135Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile MsBignum Cryptographic Implementations

          10.0.15063


          The Microsoft Windows MsBignum Library algorithm implementation provides ECDSA and RSA support to other Microsoft libraries and cryptographic modules.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3790, DRBG #1555
          1134Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          Madhu Mathiyalagan
          madhu.mathiyalagan@oracle.com
          (781) 578-7514

          Chris Brych
          chris.brych@oracle.com
          (613) 216-3078

          Oracle Acme Packet OpenSSL Cryptographic Library

          ECz 7.5.0


          The Acme Packet Virtual Machine Edition (VME) is a software only implementation of the Oracle Acme Packet Session Border Controller that provides the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Xeon E5-2600 V3 w/ Oracle Linux 7 on VMware ESXi 6.0
          7/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3754, DRBG #1524
          1133Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Mike Grimm
          FIPS@microsoft.com
          800-Microsoft

          Windows 10 Creators Update (version 1703) Home, Pro, Enterprise, Education, Windows 10 S, Windows 10 Mobile SymCrypt Cryptographic Implementations

          10.0.15063


          The Microsoft Windows Next Generation Cryptographic algorithm implementation provides enhanced support for AES, DRBG, DSA, ECDSA, RSA, HMAC, KAS, KDF, SHS (SHA), and Triple-DES. All implementations are packaged into a library used by Microsoft and other third-party applications.

            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Education Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Laptop w/ Windows 10 S Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Pro Creators Update (x64)
            • Intel Core m3 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Atom x7 with AES-NI and without SHA Extensions w/ Microsoft Surface 3 with LTE w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Studio w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Microsoft Surface Hub w/ Windows 10 Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Windows 10 Pro Creators Update on Hyper-V on Windows Server 2016 (x64)
            • Qualcomm Snapdragon 808 (A57, A53) w/ Microsoft Lumia 950 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 810 (A57, A53) w/ Microsoft Lumia 950 XL w/ Windows 10 Mobile Creators Update (ARMv7)
            • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Creators Update (ARMv7)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell Latitude 5285 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i3 without AES-NI and SHA Extensions w/ Dell Inspiron 660s w/ Windows 10 Creators Update (x86)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell Precision Tower 5810MT w/ Windows 10 Pro Creators Update (x64)
            • Intel Xeon with AES-NI and without SHA Extensions w/ Dell PowerEdge R630 Server w/ Windows 10 Pro Creators Update (x64)
            • Qualcomm Snapdragon 820 (Kryo) w/ HP Elite x3 w/ Windows 10 Mobile Creators Update (ARMv7)
            • AMD A4 with AES-NI and without SHA Extensions w/ HP Compaq Pro 6305 w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ HP Pro x2 612 G2 Detachable PC with LTE w/ Windows 10 Enterprise Creators Update (x64)
            • Intel Pentium with AES-NI and SHA Extensions w/ HP Slimline Desktop w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ Panasonic Toughbook w/ Windows 10 Pro Creators Update (x64)
            • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
            • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows 10 Enterprise Creators Update with Windows Hyper-V enabled (x64)
          7/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3790, DRBG #1555
          1132Hewlett-Packard Development Company, L.P.
          11445 Compaq Center Drive W
          Houston, TX 77070
          USA

          Timothy McDonough
          timothy.mcdonough@hpe.com

          Hewlett Packard Enterprise SSL Crypto Module Engine

          2.1


          Hewlett Packard Enterprise SSL crypto module engine is part of the FIPS validated OpenSSL cryptographic provider for Hewlett Packard Enterprise components. The module features robust algorithm support including CNSA algorithms. The module provides services for secure communications, secure key management, data integrity and data encryption.

            • ARM i.MX6 w/ Yocto Linux 3.0.35
          7/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3790, DRBG #1554
          1131SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using assembler implementation of AES, SHA and GHASH

          3.0


          This test covers assembler implementation of AES, SHA and GHASH.

            • z13 w/ SUSE Linux Enterprise Server 12 SP2
          7/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3788, DRBG #1552
          1130Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x87416
          Fax: 613-225-9951

          Fortinet FortiASIC CP9 Cryptographic Library v5.4

          The Fortinet CP9 is a proprietary ASIC providing hardware based cryptographic acceleration for Fortinet products.

            • N/A
          7/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3781, DRBG #1543
          1129Fortinet Inc.
          1090 Kifer Road
          Sunnyvale, CA 94086-5301
          USA

          Alan Kaye
          akaye@fortinet.com
          613-225-9381 x87416
          Fax: 613-225-9951

          Fortinet FortiOS FIPS Cryptographic Library

          5.4 (Firmware)


          This document focuses on the firmware implementation of the Fortinet FortiOS FIPS Cryptographic Library v5.4 running on Intel x86 compatible processors.

            • ARM v5 Compatible (SoC2)
            • ARM v7 Compatible (SoC3)
            • Intel Celeron
            • Intel Xeon E5
            • Intel i3 Series
            • Intel i5 Series
            • Intel i7 Series
          7/14/2017
          • ECDSA:
            • 186-4:
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3777, DRBG #1543
          1128Hewlett Packard Enterprise
          1160 Enterprise Way
          Sunnyvale, CA 94089
          USA

          Indra Fitzgerald
          indra.fitzgerald@hpe.com
          541-360-6218

          HPE Atalla Cryptographic Subsystem

          1.20 (Firmware)


          The Atalla Cryptographic Subsytem (ACS) is a multi-chip embedded cryptographic module that provides secure cryptographic processing, key management, and storage capabilities.

            • Cavium Octeon III CN73xx, 16 cores, 1.8 Ghz
          7/14/2017
          • ECDSA:
            • 186-4:
              • Signature Verification:
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3776, DRBG #1542
          1127SUSE, LLC
          10 Canal Park, Suite 200
          Cambridge, MA 02141
          USA

          Andreas Stieger
          astieger@suse.com
          +49 911 74053 384

          Thomas Biege
          thomas@suse.de
          +49 911 74053 500

          SUSE OpenSSL using SHA assembler

          3.0


          This test covers generic assembler implementation of SHA.

            • Intel Xeon E5 family w/ SUSE Linux Enterprise Server 12 SP2
          7/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3771, DRBG #1539
          1126Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (3305)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon E5 w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3767, DRBG #1534
          1125Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (2105)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Xeon D w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3766, DRBG #1533
          1124Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Klaus Majewski
          legal@forcepoint.com
          1-858-320-8000

          Jorma Levomäki
          legal@forcepoint.com
          1-858-320-8000

          Forcepoint NGFW Cryptographic Library Module (325)

          2.0


          Forcepoint NGFW Cryptographic Library is a software module that provides cryptographic services required by the Forcepoint NGFW product.

            • Intel Atom C w/ GNU / Linux (Debian) 9.0 -based distribution
          7/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3765, DRBG #1532
          1123IBM Corporation
          2455 South Road
          Poughkeepsie, New York 12601-5400
          USA

          John Monti
          jmonti@us.ibm.com
          845-435-4164

          IBM z/OS(R) Cryptographic Services ICSF PKCS #11

          OA52336


          ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

            • IBM z13 w/ IBM z/OS(R) v2.2
          7/8/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3761, DRBG #1530
          1122Cisco Systems, Inc
          170 W Tasman Drive
          San Jose, California 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6250

          IOS Common Cryptographic Module (IC2M)

          Rel5 (Firmware)


          The IC2M module provides the FIPS validated cryptographic algorithms for services requiring those algorithms. The module does not implement any protocols directly. Instead, it provides the cryptographic primitives and functions to allow IOS to implement those various protocols.

            • MIPS64
            • Intel Atom
            • Intel Xeon on ESXi 5.5
            • PPC405
            • PPCe500
            • PPCe5500
            • Intel Core i3
            • Intel Pentium
            • Intel Xeon
            • PPC465
          7/8/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256
              • Prerequisite: SHS #3760, DRBG #1529
          1121L3 Communications Canada / Targa Systems Division
          2081 Merivale Road
          Ottawa, ON K2G1G9
          Canada

          Dave Saunders
          Dave.Saunders@l-3com.com
          613-727-9876
          Fax: 613-727-1705

          Series 4 Gen 3 DTU

          1.0.0-32004093 (Firmware)


          Network Attached Storage device with removable storage.

            • Freescale P1022
          6/30/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3755, DRBG #1525
          1120F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library running on vCMP offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3753, DRBG #1523
          1119F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v3 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3750, DRBG #1520
          1118F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3749, DRBG #1519
          1117F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-2658 v2 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3747, DRBG #1517
          1116F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1650 v4 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3745, DRBG #1515
          1115F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          Ravi Kasinadhuni
          R.Kasinadhuni@f5.com
          206-272-7467

          Crypto for BIG-IP with AES and SHA assembler

          12.1.2 HF2


          Cryptographic library offering various cryptographic mechanisms to BigIP product.

            • Intel E5-1630 v4 w/ BIG-IP 12.1.2 HF2
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3743, DRBG #1513
          1114Futurex
          864 Old Boerne Road
          Bulverde, TX 78163
          USA

          Futurex Security Certifications
          certifications@futurex.com
          830-980-9782

          OpenSSL

          6.2.0.0 (Firmware)


          The Crypto Library includes HMAC, CMAC, SP 800-90 DRBG, ECDSA, SHA, RSA, ECC, KDF, GCM, AES, and TDES algorithms for use in the Futurex cryptographic module.

            • TI AM3352
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3741, DRBG #1511
          1113Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Kelvin Desplanque
          kdesplan@cisco.com
          6137887216

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module (FOM) is firmware that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Intel Xeon
          6/23/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3739, DRBG #1509
          1112Google Inc.
          1600 Amphitheatre Parkway
          Mountain View, CA 94043
          USA

          Adam Langley
          security@chromium.org

          BoringCrypto

          24e5886c0edfc409c8083d10f9f1120111efd6f5


          A software library that contains cryptographic functionality to serve BoringSSL and other user-space applications.

            • POWER9 w/ Ubuntu Linux 17.04
            • POWER8 w/ Ubuntu Linux 17.04
            • Intel Xeon E5 w/ Ubuntu Linux 16.04
            • Intel Xeon E5 without PAA w/ Ubuntu Linux 14.04 LTS
            • POWER8 without PAA w/ Ubuntu Linux 15.04
          6/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3736, DRBG #1507
          1111Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN9000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • ARM Cortex A9
          6/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3734, DRBG #1506
          1110Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN6000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • Intel ATOM
          6/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3733, DRBG #1505
          1109Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
          312 Kings Way
          South Melbourne, Victoria 3205
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN8000 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • Intel Xeon
          6/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3732, DRBG #1504
          1108Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
          312 Kings Way
          South Melbourne, Victoria 3025
          Australia

          John Weston
          john.weston@senetas.com
          +61 3 9868 4555
          Fax: +61 3 9821 4899

          CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

          3.0.1 (Firmware)


          The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

            • ARM Cortex A9
          6/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3731, DRBG #1503
          1107Bivio Networks, Inc.
          4457 Willow Road, Suite 240
          Pleasanton, CA 94588
          USA

          Raj Srinivasan
          raj@bivio.net
          (925) 924-8608
          Fax: (925) 924-8650

          OpenSSL

          1.0.1e-51


          OpenSSL is an open source module that provides two libraries: a crypto module, and a TLS/SSL module that depends on the crypto module. It implements comprehensive suite of FIPS approved algorithms, with all key sizes and modes, of which this product uses a subset.

            • Intel® Atom™ CPU C2558 @ 2.40GHz w/ RHEL 7.1 on KVM 2.0.0 on Ubuntu 14.04 LTS
          6/16/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-384
              • Prerequisite: SHS #3727, DRBG #1500
          1106Oracle Communications
          100 Crosby Drive
          Bedford, MA 01730
          USA

          Madhu Mathiyalagan
          madhu.mathiyalagan@oracle.com
          (781) 578-7514

          Chris Brych
          chris.brych@oracle.com
          (613) 216-3078

          Oracle Acme Packet OpenSSL Cryptographic Library

          ECz 7.5.0 (Firmware)


          The Acme Packet 1100 and 3900 feature Oracle''s purpose-built hardware design that is tightly integrated with a hardened version of Oracle Linux, to provide the critical controls for delivering trusted, real-time communications - voice, video, and application data sessions - across Internet Protocol (IP) network borders.

            • Intel Atom C2358
            • Intel Xeon D-1548 (Intel Broadwell-DE)
          6/16/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3725, DRBG #1499
          1105Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

          R7-2.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 7.3 64 bit
          6/16/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3719, DRBG #1495
          1104Oracle Corporation
          500 Oracle Parkway
          Redwood Shores, CA 94065
          USA

          Linda Gallops
          linda.gallops@oracle.com
          +1 704.972.5018
          Fax: +1 980.355.5399

          Chris Brych
          chris.brych@oracle.com
          +1 613.216.3078

          Oracle Linux OpenSSL with AESNI, SHA1 AVX, SHA2 ASM

          R6-1.0.0


          Oracle Linux OpenSSL Cryptographic Module is a software module supporting FIPS 140-2-approved cryptographic algorithms for general use by vendors.

            • Intel® Xeon® E5-2699 v4 w/ Oracle Linux 6.9 64 bit
          6/16/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3718, DRBG #1494
          1103Palo Alto Networks
          4301 Great America Parkway
          Santa Clara, California 95054
          USA

          Richard Bishop
          rbishop@paloaltonetworks.com
          408-753-4000

          Jake Bajic
          jbajic@paloaltonetworks.com
          408-753-3901

          Palo Alto Networks Crypto Module (PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 Series Firewalls, WF-500 and Panorama M-100/M-500)

          8.0 (Firmware)


          The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-220, PA-500, PA-800, PA-3000, PA-5000, PA-5200 and PA-7000 series firewalls, WF-500 and Panorama M-100/M-500.

            • Cavium Octeon MIPS64
            • Cavium MIPS64
            • Intel Multi Core Xeon
            • Intel Celeron
            • Intel i7
          6/9/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3713, DRBG #1489
          1101Palo Alto Networks
          4301 Great America Parkway
          Santa Clara, California 95054
          USA

          Richard Bishop
          rbishop@paloaltonetworks.com
          408-753-4000

          Jake Bajic
          jbajic@paloaltonetworks.com
          408-753-3901

          Palo Alto Networks Crypto Module (PA VM-series)

          8.0


          The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

            • Intel Multi Core Xeon w/ VMware ESXi 5.5
            • Intel Multi Core Xeon w/ Centos 7.2 - KVM
            • Intel Multi Core Xeon w/ Hyper-V 2012 r2
            • Intel Multi Core Xeon w/ AWS EC2
            • Intel Multi Core Xeon w/ Azure
          6/2/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3707, DRBG #1486
          1100Hewlett Packard Enterprise Company
          3000 Hanover Street
          Palo Alto, CA 94304
          USA

          Luis Luciani
          luis.luciani@hpe.com
          281-518-6762

          Edward Newman
          edward.newman@hpe.com
          281-514-2713

          iLO SSL Firmware Crypto Library

          iLO 5 v1.11 (Firmware)


          HPE Integrated Lights-Out (iLO) management built into HPE Proliant servers is an autonomous management subsystem embedded directly on the server. iLO monitors each server’s overall "health", reports issues, and provides a means for setup and managing of power and thermal settings.

            • Cortex A9
          6/2/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3706, DRBG #1485
          1099Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Jordan Saxonberg
          jordan_saxonberg@symantec.com
          424-750-7052
          Fax: 424-750-8107

          Symantec SymSSLf Cryptographic Module

          1.0.1


          Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

            • Intel Xeon with AES-NI w/ Windows 7 SP1
          5/19/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3704, DRBG #1477
          1098Symantec Corporation
          350 Ellis Street
          Mountain View, CA 94043
          USA

          Jordan Saxonberg
          jordan_saxonberg@symantec.com
          424-750-7052
          Fax: 424-750-8107

          Symantec SymSSLf Cryptographic Module

          1.0.1


          Symantec SymSSLf Cryptographic Module is a Windows software library that provides FIPS 140-2 validated cryptographic algorithm support to Symantec products.

            • Intel Xeon without AES-NI w/ Windows 7 SP1
          5/19/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3703, DRBG #1476
          1097Intel Corporation
          2200 Mission College Blvd.
          Santa Clara, California 95054
          USA

          Mark Hanson
          mark.hanson@intel.com
          972.963.7326

          McAfee OpenSSL FIPS Object Module

          1.0.0


          The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

            • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
          5/19/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
              • Prerequisite: SHS #3699, DRBG #1474
          1096VT iDirect
          13681 Sunrise Valley Drive, Suite 300
          Herndon, VA 20171
          USA

          Chris Gormont
          CGormont@idirectgov.com
          703.880.6257

          iDirect Cloak Algorithm Module 1.0

          1.0.2.0 (Firmware)


          VT iDirect, Inc''s firmware cryptographic library provides all cryptographic operations for the support of iDirect''s Transmission Security (TRANSEC) feature. The firmware cryptographic library implements the key management algorithms necessary for each member of the network to receive and decrypt data.

            • Altera Cyclone V
          5/12/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256
              • Signature Generation:
                • P-256 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-512
              • Prerequisite: SHS #3698, DRBG #1473
          1095Guardtime
          5151 California Ave.
          Suite 210
          Irvine, CA 92617
          USA

          Christian Bravo
          christian.bravo@guardtime.com
          310-227-6558

          Guardtime Cryptographic Support Library (CSL) Direct

          1.0.0 (Firmware)


          Cryptographic library for Guardtime products.

            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz with SEC
            • T4240r2 QorIQ, 12 Dual Cores 64-bit Power Architecture, 1667 MHz without SEC
          5/12/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3697, DRBG #1472
          1094Flonidan A/S
          Islandsvej 29
          Horsens, Denmark DK-8700
          Denmark

          Tonny Frederiksen
          twf@flonidan.dk
          +45 75 61 88 88

          Kenneth Sørensen
          ks@flonidan.dk
          +45 75 61 88 88

          Flonidan Smart Meter mbedTLS Module

          2.4.0 (Firmware)


          Crypto module used in Flonidan smart meters

            • ARM Cortex
          5/12/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256
              • Signature Generation:
                • P-256 SHA: SHA-256
              • Signature Verification:
                • P-256 SHA: SHA-256
              • Prerequisite: SHS #3696, DRBG #1471
          1093Cog Systems / HTC
          Level 1
          277 King Street
          Newton
          Sydney, NSW 2042
          Australia

          Daniel Potts
          danielp@cog.systems
          +1 855 662 7234

          D4Secure Boring/OpenSSL FIPS Module

          FIPS Module 2.0.14


          The D4Secure Boring/OpenSSL FIPS Module is an implementation of the FIPS Object Module, FIPS canister in Android.

            • Snapdragon 617 (MSM8952) w/ Android 6.0.1 - HTC Software Version 1.57.617.52
          5/5/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3686, DRBG #1456
          1092Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Kevin Meagher
          KMeagher@ciena.com

          Ciena 8700 Packetwave Platform

          8.5


          The 8700 Packetwave Platform is a multi-terabit programmable Ethernet-overdense wavelength division multiplexing (DWDM) packet switch.

            • NXP QorIQ P4080 w/ SAOS 8.5
          4/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-512
              • Prerequisite: SHS #3682, DRBG #1454
          1091OpenSSL Validation Services, Inc.
          1829 Mount Ephraim Road
          Adamstown, MD 21710
          USA

          Steve Marquess
          marquess@veridicalsystems.com
          301-874-2571

          OpenSSL FIPS Object Module

          2.0.16


          The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

            • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.18
            • Intel Atom C2558 (x86) with AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
            • Intel Atom C2558 (x86) without AES-NI w/ ExtremeXOS-Linux 3.18 32-bit
            • Intel Atom E3845 (x86) without AES-NI w/ Debian 9
            • Intel Atom E3845 (x86) with AES-NI w/ Debian 9
            • NXP T2080 (PPC) w/ Linux 3.12
          4/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3681, DRBG #1451
          1090Trustonic
          20 Station Road
          Cambridge CB1 2JD
          UK

          Alec Edgington
          alec.edgington@trustonic.com
          +44 1223 347864

          Mark Wooding
          mark.wooding@trustonic.com
          +44 1223 3478534

          TRICX

          1.0


          TRICX is a static library providing an extensive suite of FIPS-approved cryptographic algorithms and supporting a range of key sizes and modes.

            • ARM Cortex-A53 without PAA w/ Trustonic Kinibi 400A
            • ARM Cortex-A53 with PAA w/ Trustonic Kinibi 400A
          4/21/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3680, DRBG #1450
          1089Axway Inc.
          6811 E Mayo Blvd.
          Ste. 400
          Phoenix, AZ 85054
          USA

          Katrin Rosenke
          krosenke@axway.com
          480-627-1800
          Fax: 480-627-1801

          Kartik Krishnan
          kkrishnan@axway.com
          480-627-2649
          Fax: 480-627-1801

          Axway Security Kernel

          3.0.2


          Axway Validation Authority Suite: a collection of products that provide flexible and robust OCSP/SCVP certificate validation for standard and custom desktop and server applications, supporting established security standards and technologies. These products may be used together or integrated with existing solutions.

            • Intel® Xeon® E5-2620 w/ Microsoft Windows 2012 64-bit
            • Intel® Xeon® E5-2620 w/ RHEL 6.3 64-bit
            • Sun UltraSparc T1 w/ Solaris 64-bit
          4/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, P-192, P-224, P-256, P-384
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3678, DRBG #1449
          1088Silver Spring Networks
          230 W Tasman Drive
          San Jose, CA 95134
          USA

          Jeff Ebert
          jebert@ssni.com
          16697704000
          Fax: 18667760015

          Silver Spring Networks Endpoint Security Module

          82136+98519 (Firmware)


          Silver Spring Networks Endpoint Security Module provides acceleration and off-load of standard cryptographic algorithms and secure network protocols, key storage and generation, bootloader and firmware verification, and encrypted data storage. It is included in the SoC designed for SSN''s Gen5 endpoint and infrastructure products.

            • ESM instruction manager processor embedded in SSN ARNIE SoC
          4/14/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3677, DRBG #1448
          1087A10 Networks, Inc.
          3 West Plumeria Drive
          San Jose, CA 95134
          USA

          John Chiong
          +1 408 325-8668

          A10 Networks SSL FIPS Library

          2.0.0 (Firmware)


          The Thunder Application Delivery Controller is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4-7 application processing capabilities with performance and scalability to meet critical business requirements.

            • Intel Xeon E3-1275v2 with AES-NI
            • Intel Xeon E5-1650v3 with AES-NI
            • Intel Xeon E5-2697v2 with AES-NI
            • Intel Xeon E5-2697v4 with AES-NI
          4/7/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3674, DRBG #1447
          1086Gemalto
          525 Avenue du Pic de Bertagne
          CS 12023
          Gemenos 13881
          France

          Security and Certifications Team
          SecurityCertifications@gemalto.com

          Sylvain Lhostis
          Sylvain.Lhostis@gemalto.com
          +33 (0)4 42 36 60 62

          MultiAppIDV4.0 Cryptographic library

          4.0 (Firmware)


          MultiAppIDV4.0 is a highly secured smartcard platform compliant with the Javacard 3.0.4, GP 2.2.1, Amdt D standards, designed to operate with the Infineon SLE78 M7892 chips. It supports: TDES, AES, AES-CMAC, SHA1-224-256-384-512, RSA, RSA CRT, ECDSA, ECC CDH, KDF SP800-108 & DRBG SP800-90A algorithms.

            • Infineon SLE78 M7892 chip family
          4/7/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • P-224 SHA: SHA-224
                • P-256 SHA: SHA-224, SHA-256
                • P-384 SHA: SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1
                • P-224 SHA: SHA-1, SHA-224
                • P-256 SHA: SHA-1, SHA-224, SHA-256
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3670, DRBG #1444
          1085Persistent Systems LLC
          303 Fifth Ave
          Suite 207
          New York, NY 10016
          USA

          Helson Maria
          hmaria@persistentsystems.com
          212-561-5895

          Dr. David Holmer
          dholmer@persistentsystems.com
          212-561-5895

          Wave Relay® Cryptographic Library

          2.0 (Firmware)


          The Wave Relay® Mobile Ad Hoc Network (MANET) is a peer-to-peer wireless networking solution that allows a distributed group of mobile users to communicate continuously without fixed infrastructure. The Wave Relay® Cryptographic Library provides module integrity assurance and management security.

            • NXP i.MX 6
          4/7/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3667, DRBG #1443
          1084HUAWEI TECHNOLOGIES Co. Ltd.
          Yuhuatai District
          101 Software Avenue
          HANGZHOU, ZHEJIANG 310000
          CHINA

          Yang Ze
          yangze1@huawei.com
          86 15919432118

          Bai Wenxin
          baiwenxin@huawei.com
          86 18969126628

          VPP

          V300R003C26SPC101B130 (Firmware)


          VPP Cryptographic Library provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Cavium CN7015
            • Cavium CN6645
            • Cavium CN6880
            • Freescale SC411912C
            • Freescale MPC8572E
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3664, DRBG #1442
          1083Ciena Corporation
          7035 Ridge Road
          Hanover, MD 21076
          USA

          Patrick Scully
          613-670-3207

          Ciena Waveserver

          1.4 (Firmware)


          The Ciena Waveserver Platform offers an integrated transport encryption solution for 10GE, 40GE and 100GE clients and provides up to 400Gb/s wirespeed encryption service for data center interconnect (DCI) applications.

            • Xilinx XC7Z030
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3660, DRBG #1439
          1082ALE (Alcatel Lucent Enterprise)
          26801 Agoura Road
          Calabasas, CA 91301
          USA

          Tao Shen
          tao.shen@al-enterprise.com
          818-878-5038

          Vadivel POONATHAN
          vadivel.poonathan@al-enterprise.com
          818-878-4601

          Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS9900 ECDSA-GCM-TDES-RSA-PSS)

          AOS 8.3.1.R01


          ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

            • Intel Atom C2518 w/ AOS 8.3.1.R01
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3526, DRBG #1111
          1081ALE (Alcatel Lucent Enterprise)
          26801 Agoura Road
          Calabasas, CA 91301
          USA

          Tao Shen
          tao.shen@al-enterprise.com
          818-878-5038

          Vadivel POONATHAN
          vadivel.poonathan@al-enterprise.com
          818-878-4601

          Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch (OS6900 PowerPC P2040 ECDSA-GCM-TDES-RSA-PSS)

          AOS 8.3.1.R01


          ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

            • PowerPC P2040 w/ AOS 8.3.1.R01
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3525, DRBG #1347
          1080INTEGRITY Security Services (ISS)
          7585 Irvine Center Driver
          Suite 250
          Irvine, California 91618
          USA

          David Sequino
          dsequino@ghs.com
          206-310-6795
          Fax: 978-383-0560

          Douglas Kovach
          dkovach@ghs.com
          727-781-4909
          Fax: 727-781-2915

          Crestron Control Engine

          3.0 (Firmware)


          Porting of the ISS Embedded Cryptographic Toolkit (ECT) to the Crestron Control Engine.

            • iMX53
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3658, DRBG #1437
          1079ALE (Alcatel Lucent Enterprise)
          26801 Agoura Road
          Calabasas, CA 91301
          USA

          Tao Shen
          tao.shen@al-enterprise.com
          818-878-5038

          Vadivel POONATHAN
          vadivel.poonathan@al-enterprise.com
          818-878-4601

          Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch (OS6900 Freescale PowerPC MPC8572 ECDSA-GCM-TDES-RSA-PSS)

          AOS 8.3.1.R01


          ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

            • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3524, DRBG #1111
          1078ALE (Alcatel Lucent Enterprise)
          26801 Agoura Road
          Calabasas, CA 91301
          USA

          Tao Shen
          tao.shen@al-enterprise.com
          818-878-5038

          Vadivel POONATHAN
          vadivel.poonathan@al-enterprise.com
          818-878-4601

          Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS6860 ECDSA-GCM-TDES-RSA-PSS)

          AOS 8.3.1.R01


          ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

            • Cortex ARM 9 w/ AOS 8.3.1.R01
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3523, DRBG #1111
          1077ALE (Alcatel Lucent Enterprise)
          26801 Agoura Road
          Calabasas, CA 91301
          USA

          Tao Shen
          tao.shen@al-enterprise.com
          818-878-5038

          Vadivel POONATHAN
          vadivel.poonathan@al-enterprise.com
          818-878-4601

          Common Criteria Evaluation (CCE) Certification for ALE AoS OmniSwitch products (OS10K ECDSA-GCM-TDES-RSA-PSS)

          AOS 8.3.1.R01


          ALE AOS cryptographic module supports the Alcatel-Lucent Enterprise OmniSwitch. The testing applies to Common Criteria mode.

            • Freescale PowerPC MPC8572 w/ AOS 8.3.1.R01
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3520, DRBG #1111
          1076F5 Networks
          401 Elliott Avenue West
          Seattle, WA 98119
          USA

          Maryrita Steinhour
          m.steinhour@f5.com
          206-272-7351

          John Hughes
          j.hughes@f5.com
          206-272-6038

          Cryptographic Module for BIG-IP with AES and SHA assembler

          12.1.2 HF1


          Cryptographic library offering various cryptographic mechanisms to BigIP Virtual Edition

            • Intel Xeon X5650 w/ BIG-IP 12.1.2 HF1
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3656, DRBG #1436
          1075Aruba, a Hewlett Packard Enterprise company
          1344 Crossman Avenue
          Sunnyvale, CA 94089
          USA

          Steve Weingart
          fips@arubanetworks.com
          512-319-2480
          Fax: 408-227-4500

          ArubaOS Crypto Module

          6.5.1-FIPS (Firmware)


          The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

            • Broadcom BCM53014
          3/31/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-256, P-384
          1074Samsung Electronics Co., Ltd,
          416 Maetan-3dong, Yeongtong-gu
          Suwon-si, Gyeonggi-do 443-742
          South Korea

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung BoringSSL Cryptographic Module

          v1.1


          The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

            • Samsung Electronics Exynos8895 w/ Android 7.0
            • Qualcomm MSM8998 w/ Android 7.0
            • Samsung Electronics Exynos7570 w/ Android 7.0
            • Qualcomm MSM8917 w/ Android 7.0
            • Qualcomm MSM8996 w/ Android 7.0
            • Samsung Electronics Exynos8890 w/ Android 7.0
            • Samsung Electronics Exynos7420 w/ Android 7.0
            • Samsung Electronics Exynos7870 w/ Android 7.1
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3650, DRBG #1431
          1073Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Gokul Karthik Balaswamy
          gokulk@microsoft.com
          425-706-8583
          Fax: 425-708-0107

          Christine Ahonen
          chrisah@microsoft.com
          425-706-8675
          Fax: 425-936-7329

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

          7.00.2872


          The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

            • Texas Instruments EVM3530 w/ Windows Embedded Compact 7 (ARMv7)
            • Samsung S3C6410 w/ Windows Embedded Compact 7 (ARMv6)
            • NXP i.MX27 w/ Windows Embedded Compact 7 (ARMv5)
            • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II)
            • Sigma Designs SMP8654 w/ Windows Embedded Compact 7 (MIPS II w/ FP)
          3/31/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256
                • P-384 SHA: SHA-1, SHA-384
                • P-521 SHA: SHA-1, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256
                • P-384 SHA: SHA-1, SHA-384
                • P-521 SHA: SHA-1, SHA-512
              • Prerequisite: SHS #3649, DRBG #1430
          1072Microsoft Corporation
          One Microsoft Way
          Redmond, WA 98052-6399
          USA

          Gokul Karthik Balaswamy
          gokulk@microsoft.com
          425-706-8583
          Fax: 425-708-0107

          Christine Ahonen
          chrisah@microsoft.com
          425-706-8675
          Fax: 425-936-7329

          Windows Embedded Compact Cryptographic Primitives Library (bcrypt.dll)

          8.00.6246


          The cryptographic module BCRYPT.DLL encapuslates several different cryptographic algorithms in an easy-to-use module, accessible via the Microsoft CNG (Cryptography Next Generation) API. It permits the use of general-purpose FIPS 140-2 compliant cryptography in Windows Embedded Compact components and applications, through its documented interfaces.

            • Texas Instruments EVM3730 w/ Windows Embedded Compact 2013 (ARMv7)
            • MSTI PDX-600 w/ Windows Embedded Compact 2013 (x86)
          3/24/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-1, SHA-256
                • P-384 SHA: SHA-1, SHA-384
                • P-521 SHA: SHA-1, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256
                • P-384 SHA: SHA-1, SHA-384
                • P-521 SHA: SHA-1, SHA-512
              • Prerequisite: SHS #3648, DRBG #1429
          1071IBM Corporation
          222 South Riverside Plaza
          Ste 1700
          Chicago, IL 60606
          USA

          Mark Seaborn
          mseaborn@us.ibm.com
          +1 312 423 6640x2354

          Jasopn Resch
          jresch@us.ibm.com

          Cleversafe FIPS Cryptographic Module

          1.1


          The Cleversafe® FIPS Object Module is a full featured general purpose cryptographic library that is distributed as a component of Cleversafe''''s ClevOS(TM) FIPS Edition, the underlying technology for dsNet® Appliances.

            • Intel Xeon without AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
            • Intel Xeon with AES-NI w/ ClevOS 3.8.2.19-FIPS-EDITION
          3/24/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384
                • B-283 SHA: SHA-224, SHA-256, SHA-384
                • B-409 SHA: SHA-224, SHA-256, SHA-384
                • B-571 SHA: SHA-224, SHA-256, SHA-384
                • K-233 SHA: SHA-224, SHA-256, SHA-384
                • K-283 SHA: SHA-224, SHA-256, SHA-384
                • K-409 SHA: SHA-224, SHA-256, SHA-384
                • K-571 SHA: SHA-224, SHA-256, SHA-384
                • P-224 SHA: SHA-224, SHA-256, SHA-384
                • P-256 SHA: SHA-224, SHA-256, SHA-384
                • P-384 SHA: SHA-224, SHA-256, SHA-384
                • P-521 SHA: SHA-224, SHA-256, SHA-384
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3640, DRBG #1428
          1070Attivo Networks, Inc.
          47697 Westinghouse Drive, Suite 201
          Fremont, CA 94539
          USA

          Satya Das
          510 623-1000

          Attivo Cryptographic Provider

          1.0 (Firmware)


          Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

            • Intel® Xeon® CPU E5-2620 v2 @ 2.10GHz
            • Intel® Xeon® CPU E5-2630 v3 @ 2.4GHz
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3638, DRBG #1426
          1069Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Clint Winebrenner
          cwinebre@cisco.com
          919.392.6520

          CiscoSSL FOM

          6.0


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Apple A8 w/ iOS 9.3
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3470, DRBG #1316
          1068NXP Semiconductors
          6501 William Cannon Drive West
          Austin, TX 78735
          USA

          Geoffrey Waters
          geoffrey.waters@nxp.com
          512-895-2069

          Tom Tkacik
          tom.tkacik@nxp.com
          480-814-3299

          DMPR 40301443

          CAVP_DMPR_40301443 (Firmware)


          NXP's DMPR 40301443 is included in multiple QorIQ and Layerscape processors including: LS1023A, LS1026A, LS1043A, LS1046A, LS1048A, and LS1088A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

            • Cadence IES 15.10.009 Verilog simulator
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #2110, DRBG #349
          1067NXP Semiconductors
          6501 William Cannon Drive West
          Austin, TX 78735
          USA

          Geoffrey Waters
          geoffrey.waters@nxp.com
          512-895-2069

          Tom Tkacik
          tom.tkacik@nxp.com
          480-814-3299

          DMPR 40251443

          CAVP_DMPR_40251443 (Firmware)


          NXP's DMPR 40251443 is included in multiple QorIQ and Layerscape processors including: LS1012A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

            • Cadence IES 15.10.009 Verilog simulator
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #2110, DRBG #349
          1066NXP Semiconductors
          6501 William Cannon Drive West
          Austin, TX 78735
          USA

          Geoffrey Waters
          geoffrey.waters@nxp.com
          512-895-2069

          Tom Tkacik
          tom.tkacik@nxp.com
          480-814-3299

          DMPR 40241443

          CAVP_DMPR_40241443 (Firmware)


          NXP's DMPR 40241443 is included in multiple QorIQ and Layerscape processors including: T1013, T1014, T1023 and T1024. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

            • Cadence IES 15.10.009 Verilog simulator
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3187, DRBG #1101
          1065NXP Semiconductors
          6501 William Cannon Drive West
          Austin, TX 78735
          USA

          Geoffrey Waters
          geoffrey.waters@nxp.com
          512-895-2069

          Tom Tkacik
          tom.tkacik@nxp.com
          480-814-3299

          DMPR 40303443

          CAVP_DMPR_40303443 (Firmware)


          NXP's DMPR 40303443 is included in multiple QorIQ and Layerscape processors including: LS2044A, LS2045A, LS2048A, LS2084A, LS2085A and LS2088A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

            • Cadence IES 15.10.009 Verilog simulator
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #2110, DRBG #349
          1064NXP Semiconductors
          6501 William Cannon Drive West
          Austin, TX 78735
          USA

          Geoffrey Waters
          geoffrey.waters@nxp.com
          512-895-2069

          Tom Tkacik
          tom.tkacik@nxp.com
          480-814-3299

          DMPR 31231342

          CAVP_DMPR_31231342 (Firmware)


          NXP's DMPR 31231342 is included in multiple QorIQ and Layerscape processors including: LS1020A, LS1021A and LS1022A. It implements public key algorithms, including DSA, ECDSA, RSA, and key derivation functions.

            • Cadence IES 15.10.009 Verilog simulator
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #2110, DRBG #349
          1063Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          FMC FOM Virtual

          6.0


          A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

            • Intel Xeon E5 w/ ESXi 5.5
            • Intel Xeon Eseries w/ ESXi 5.5
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3637, DRBG #1425
          1062Elster
          Timisoara Airport Park, DJ 691 km 8+775 m, Comuna Giarmata
          udetul Timis, Romania 307210
          Romania

          VLADIMIR DIATLOV
          VLADIMIR.DIATLOV@Honeywell.com
          +40 374 475 828
          Fax: +40 256 493 737

          SMETS2 AS302P

          1.1 (Firmware)


          The algorithms are implemented in an Electricity smart meter, for deployment in the UK Smart Metering Implementation Programme.

            • ARM 32-bit Cortex-M3
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256
                • Generation Methods: Extra Random Bits
              • Signature Verification:
                • P-256 SHA: SHA-256
              • Prerequisite: SHS #3636, DRBG #1424
          1061Cisco Systems, Inc.
          170 West Tasman Drive
          San Jose, CA 95134
          USA

          Global Certification Team
          certteam@cisco.com

          CiscoSSL FIPS Object Module

          6.0 (Firmware)


          The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''s networking and collaboration products.

            • Cavium CN52xx
            • Intel Xeon X5650
            • Intel Xeon E5-2609 v3
            • Intel Xeon E5-2680 v3
            • Marvell A390
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-192, P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3635, DRBG #1422
          1060HUAWEI TECHNOLOGIES Co. Ltd.
          328# XINGHU Avenue
          SUZHOU, JIANGSU 215000
          CHINA

          Yang Ze
          yangze@huawei.com
          8615919432118

          Ji Xiang
          maximus.ji@huawei.com
          8615261806635

          Huawei FIPS Cryptographic Library (HFCL) for WLAN

          V300R003C22SPC806 (Firmware)


          Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Qualcomm IPQ8068
            • Qualcomm QCA9550 series
            • Qualcomm IPQ40X8
            • Qualcomm QCA9531
            • Freescale P1025
            • Cavium CN6130
            • Cavium CN6335
          3/6/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3634, DRBG #1421
          1058Forcepoint LLC
          10900-A Stonelake Blvd
          Ste. 350
          Austin, TX 78759
          USA

          Matt Sturm
          msturm@forcepoint.com
          858-320-9444

          Matthew Noland
          matthew.noland@forcepoint.com
          512-644-1214

          Forcepoint C Cryptographic Module

          2.0.5


          Forcepoint produces a family of web, e-mail and data security solutions that can be deployed on pre-configured, security hardened hardware or as customer installable software. The Forcepoint C Crypto Module provides support for cryptographic and secure communications services for these solutions.

            • Forcepoint V10000 G4 Appliance on Intel Xeon E5-2620v3 w/ CentOS 7.2
          2/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3628, DRBG #1419
          1057HUAWEI TECHNOLOGIES Co., Ltd.
          Yuhuatai District
          101 Software Avenue
          NANJING, JIANGSU 210000
          CHINA

          Yang Ze
          yangze1@huawei.com
          8615919432118

          Liu Pinping
          liupinping@huawei.com
          8615850529039

          Huawei FIPS Cryptographic Library (HFCL) for Switches

          V300R003C22SPC805 (Firmware)


          Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to consuming applications via an Application Programming Interface (API)

            • Cavium CN5020
            • BROADCOM 56340/56342
            • MARVELL 98DX3333/98DX3336
            • FREESCALE P2041
            • FREESCALE SC411231C
            • MARVELL 98DX3245/98DX3246/98DX3247
          2/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
                • P-521 SHA: SHA-512
              • Prerequisite: SHS #3627, DRBG #1418
          1056Citrix Systems, Inc.
          851 Cypress Creek Road
          Fort Lauderdale, FL 33309
          USA

          Ben Tucker
          Ben.Tucker@citrix.com
          954-267-3094

          Jonathan Andersen
          Jonathan.Andersen@citrix.com
          954-940-7737

          Citrix FIPS Cryptographic Module - ECDSA

          1.0


          Citrix FIPS Cryptographic Module provides cryptographic services for various Citrix products.

            • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ iOS 10 64-bit
            • ARM v7-A with NEON extensions w/ Android 5
            • Intel Core i7 [4th Generation] with AES-NI w/ Windows 10 32-bit
            • ARM v7-A with NEON extensions w/ Android 6
            • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 6
            • Intel Core i7 [6th Generation] with AES-NI w/ Windows 10 64-bit
            • ARM v8-A w/ Windows 10 Mobile 32-bit
            • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under XenServer 6, 64-bit
            • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under ESXi 5, 64-bit
            • Intel Xeon 56xx series with AES-NI w/ Linux 3.16 under Hyper-V on Windows Server 2012 R2, 64-bit
            • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 32-bit
            • Intel Xeon E5-26xx v2 series with AES-NI w/ Free BSD 8.4 64-bit
            • Intel Core i7 [6th Generation] with AES-NI w/ Linux 3.13 64-bit
            • ARM v7-A with NEON extensions w/ Android 4.4
            • ARM v7-A with NEON extensions w/ Android 7
            • ARM v8-A with NEON extensions and AES/SHA Acceleration w/ Android 7
            • Intel Core i7 with AES-NI w/ Mac OS X 10.12 64-bit
            • ARM v8-A with NEON extensions w/ ViewSonic Thin OS
            • Intel Xeon E55xx Series w/ Linux 3.13 under XenServer 6
          2/28/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3626, DRBG #1417
          1055Information Security Corp
          1011 Lake St. Suite 425
          Oak Park, IL 60118
          USA

          Jonathan Schulze-Hewett
          schulze-hewett@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          Michael Markowitz
          markowitz@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          ISC Cryptographic Development Kit (CDK)

          8.0


          The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

            • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3625, DRBG #1416
          1054Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49- OpenSSL

          15.1X49-D75 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Intel Xeon (C5518)
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3622, DRBG #1415
          1053Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Pradeepa M R
          pradeepam@juniper.net

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          JUNOS FIPS Version 15.1X49- Authentec

          15.1X49-D75 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Broadcom XLP832
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3621, DRBG #1415
          1052Juniper Networks, Inc.
          1133 Innovation Way
          Sunnyvale, CA 94089
          USA

          Vann (Vanna) Nguyen
          vann@juniper.net
          408-745-2000

          Pradeepa M R
          pradeepam@juniper.net

          Junos FIPS Version Junos 15.1 X49 - Authentec_XLP

          15.1 X49-D60 (Firmware)


          Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

            • Broadcom XLP832
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-256, SHA-384
              • Prerequisite: SHS #3588, DRBG #1400
          1051NXP Semiconductors
          Stresemannallee 101
          Hamburg, Hamburg 22529
          Germany

          Dr. Almar Kaid
          almar.kaid@nxp.com
          + 49 (40) 5613 5123
          Fax: + 49 (40) 5613 62773

          P73N2M0 Crypto Library CAVP Wrapper

          1.0.0


          The NXP Crypto Library CAVP Wrapper on the p73n2m0 HW-platform builds on the P73N2M0 Crypto Library V1.0.8. It contains CMAC, RSA and ESCDA implementations to illustrate how to meet the CAVP FAQ Gen.2 requirement based on the NXP Crypto Library within an operating system.

            • NXP p73n2m0 w/ n/a
          2/10/2017
          • ECDSA:
            • 186-4:
              • Public Key Validation:
                • Curves: P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3615, DRBG #1410
          1050OpenSSL Validation Services, Inc.
          1829 Mount Ephraim Road
          Adamstown, MD 21710
          USA

          Steve Marquess
          info@openssl.com
          301-874-2571

          OpenSSL FIPS Object Module

          2.0.15


          The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

            • TI c64 w/ SurfWare 7.2
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
              • Signature Generation:
                • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3620, DRBG #1414
          1049Samsung Electronics Co., Ltd.
          416, Maetan 3-Dong Youngton Gu
          Suwon, Gyeonggi 152-848
          South Korea

          Brian Wood
          be.wood@samsung.com
          +1-973-440-9125

          Jung Ha Paik
          jungha.paik@samsung.com
          +82-10-8861-0858

          Samsung SCrypto Library

          2.0


          Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

            • Samsung Electronics Exynos8895 w/ Kinibi 400A (32-bit)
            • Qualcomm MSM8998 w/ QSEE 4.0 (32-bit)
            • Qualcomm MSM8998 w/ QSEE 4.0 (64-bit)
            • Samsung Electronics Exynos7870 w/ Kinibi 310 (32-bit)
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Public Key Validation:
                • Curves: P-224, P-256, P-384, P-521
              • Signature Generation:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3618, DRBG #1412
          1048Information Security Corp
          1011 Lake St. Suite 425
          Oak Park, IL 60118
          USA

          Jonathan Schulze-Hewett
          schulze-hewett@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          Michael Markowitz
          markowitz@infoseccorp.com
          708-445-1704
          Fax: 708-445-9705

          ISC OpenSSL FIPS Object Module

          1.0


          ISC OpenSSL module based on the OpenSSL FIPS Object Module version 2.0.

            • Intel Core i7 with AES-NI w/ Windows Server 2012 R2 (64-bit)
            • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384, P-521
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384, P-521
              • Signature Generation:
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-256, SHA-384, SHA-512
              • Signature Verification:
                • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
              • Prerequisite: SHS #3616, DRBG #1411
          1047NXP Semiconductors
          Stresemannallee 101
          Hamburg, Hamburg 22529
          Germany

          Dr. Almar Kaid
          almar.kaid@nxp.com
          + 49 (40) 5613 5123
          Fax: + 49 (40) 5613 62773

          P73N2M0 Crypto Library

          1.0.8


          The NXP Crypto Library on the p73n2m0 HW-platform is a Cryptographic Library to be included in an operating system. It implements various algorithms protected against Side Channel and Fault Attacks at EAL 6+.

            • NXP p73n2m0 w/ n/a
          2/10/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-224, P-256, P-384, P-521
                • Generation Methods: Extra Random Bits
              • Signature Generation:
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
              • Signature Verification:
                • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • P-256 SHA: SHA-256, SHA-384, SHA-512
                • P-384 SHA: SHA-384, SHA-512
              • Prerequisite: SHS #3615, DRBG #1410
          1046Secusmart GmbH
          Heinrichstrasse 155
          Düsseldorf, NRW 40239
          Germany

          Thomas Schetelig
          thomas.schetelig@secusmart.com
          +49211447399701

          Markus Hauenstein
          markus.hauenstein@secusmart.com
          +49211447399157

          SecuSUITE Client OpenSSL FIPS Object Module

          2.0.12


          SecuSUITE Client OpenSSL FIPS Object Module

            • Samsung Exynos 8890 w/ Android 6.0.1
            • Apple A8 w/ iOS 9.3.5
            • Qualcomm MSM8960 w/ BlackBerry OS 10.3.3
            • Qualcomm MSM8974 w/ BlackBerry OS 10.3.3
          2/3/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Extra Random Bits, Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3610, DRBG #1408
          1045Secusmart GmbH
          Heinrichstrasse 155
          Düsseldorf, NRW 40239
          Germany

          Thomas Schetelig
          thomas.schetelig@secusmart.com
          +49211447399701

          Markus Hauenstein
          markus.hauenstein@secusmart.com
          +49211447399157

          secuSUITE SIP Server OpenSSL FIPS Object Module

          2.0.12


          secuSUITE SIP Server OpenSSL FIPS Object Module

            • Intel Xeon E5-2620v3 CPU w/ Linux/CentOS v7
          2/3/2017
          • ECDSA:
            • 186-4:
              • Key Pair Generation:
                • Curves: P-256, P-384
                • Generation Methods: Testing Candidates
              • Public Key Validation:
                • Curves: P-256, P-384
              • Signature Generation:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Signature Verification:
                • P-256 SHA: SHA-256
                • P-384 SHA: SHA-384
              • Prerequisite: SHS #3609, DRBG #1407
          1044
          2/3/2017
            1042Aruba, a Hewlett Packard Enterprise company
            1344 Crossman Avenue
            Sunnyvale, CA 94089
            USA

            Steve Weingart
            fips@arubanetworks.com
            512-319-2480
            Fax: 408-227-4500

            ArubaOS Crypto Module

            6.5.1-FIPS (Firmware)


            The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

              • Qualcomm Atheros QCA9344
            1/27/2017
            • ECDSA:
              • 186-4:
                • Public Key Validation:
                  • Curves: P-256, P-384
            1041Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - Authentec_CN7130

            15.1 X49-D60 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • CN7130
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3582, DRBG #1398
            1040Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - Authentec_CN7020

            15.1 X49-D60 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • CN7020
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3582, DRBG #1398
            1039Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - Authentec_CN6335

            15.1 X49-D60 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • CN6335
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3582, DRBG #1398
            1038Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - OpenSSL

            15.1X49-D60


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • CN7020
              • CN7130
              • CN6335
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256
                • Signature Verification:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                  • P-521 SHA: SHA-256
                • Prerequisite: SHS #3600, DRBG #1398
            1037Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using SHA assembler

            1.0


            The test covers assembler of SHA for OpenSSL.

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3599, DRBG #1397
            1036Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using SSSE3 for SHA

            1.0


            The test covers the SHA using SSSE3 for OpenSSL.

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256
                  • B-283 SHA: SHA-224, SHA-256
                  • B-409 SHA: SHA-224, SHA-256
                  • B-571 SHA: SHA-224, SHA-256
                  • K-233 SHA: SHA-224, SHA-256
                  • K-283 SHA: SHA-224, SHA-256
                  • K-409 SHA: SHA-224, SHA-256
                  • K-571 SHA: SHA-224, SHA-256
                  • P-224 SHA: SHA-224, SHA-256
                  • P-256 SHA: SHA-224, SHA-256
                  • P-384 SHA: SHA-224, SHA-256
                  • P-521 SHA: SHA-224, SHA-256
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256
                  • B-233 SHA: SHA-1, SHA-224, SHA-256
                  • B-283 SHA: SHA-1, SHA-224, SHA-256
                  • B-571 SHA: SHA-1, SHA-224, SHA-256
                  • K-163 SHA: SHA-1, SHA-224, SHA-256
                  • K-233 SHA: SHA-1, SHA-224, SHA-256
                  • K-283 SHA: SHA-1, SHA-224, SHA-256
                  • K-409 SHA: SHA-1, SHA-224, SHA-256
                  • K-571 SHA: SHA-1, SHA-224, SHA-256
                  • P-192 SHA: SHA-1, SHA-224, SHA-256
                  • P-224 SHA: SHA-1, SHA-224, SHA-256
                  • P-256 SHA: SHA-1, SHA-224, SHA-256
                  • P-384 SHA: SHA-1, SHA-224, SHA-256
                  • P-521 SHA: SHA-1, SHA-224, SHA-256
                • Prerequisite: SHS #3598, DRBG #1396
            1035Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using AVX2 for SHA

            1.0


            The test covers SHA using AVX2 for OpenSSL

              • Intel(R) Xeon(R) CPU E5-2620v3 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3597, DRBG #1395
            1034Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using AES, SHA, GHASH and multiplication from CPACF

            1.0


            The test covers the AES, SHA, GHASH and multiplication from CPACF for OpenSSL.

              • z13 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3596, DRBG #1393
            1033Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using AES, SHA, GHASH and multiplication assemblers

            1.0


            The test covers the assembler implementation of AES, SHA, GHASH and multiplication.

              • z13 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3595, DRBG #1392
            1032Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using support from Power ISA 2.07 for AES and SHA

            1.0


            The test covers the using support from Power ISA 2.07 for AES and SHA for OpenSSL.

              • Power8 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3594, DRBG #1391
            1031Canonical Ltd.
            5th Floor, Blue Fin Building, 110 Southwark Street
            London SE1 0SU
            United Kingdom

            Joy Latten
            joy.latten@canonical.com

            Andrew Cloke
            andrew.cloke@canonical.com

            OpenSSL using assembler for AES and SHA

            1.0


            The test covers the assembler implementation of AES and SHA

              • Power8 w/ Ubuntu 16.04
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3593, DRBG #1390
            1030Getac Technology Corporation
            5F., Building A, No. 209, Sec. 1, Nangang Rd., Nangang Dist.
            Taipei City 11568
            Taiwan

            Yu-Shian Chen
            yushian.chen@getac.com.tw
            +886-2-27857888 Ext. 5675
            Fax: +886-2-27865656

            Jeff Lin
            jeff.cflin@getac.com
            +886-2-27857888 Ext. 5346
            Fax: +886-2-27865656

            Getac OpenSSL Cryptographic Library

            1.0.1k


            Getac OpenSSL Cryptographic Library provides a variety of cryptographic services via OpenSSL FIPS module for Getac products.

              • Intel Atom w/ Android 5.1.1
            1/27/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3590, DRBG #1389
            1029Juniper Networks, Inc.
            1133 Innovation Way
            Sunnyvale, CA 94089
            USA

            Vann (Vanna) Nguyen
            vann@juniper.net
            408-745-2000

            Pradeepa M R
            pradeepam@juniper.net

            Junos FIPS Version Junos 15.1 X49 - SRX 5k - OpenSSL

            15.1 X49-D60 (Firmware)


            Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

              • Intel Xeon C5518
            1/19/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Signature Generation:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256
                • Signature Verification:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-256, SHA-384
                • Prerequisite: SHS #3587, DRBG #1388
            1028Oceus Networks, Inc.
            1895 Preston White Drive
            Suite 300
            Reston, Virginia 20191
            USA

            Sharman Palos
            spalos@oceusnetworks.com
            214-778-6360
            Fax: 214-778-6341

            Chris Hill
            chill@oceusnetworks.com
            214-778-6386
            Fax: 214-778-6341

            Oceus Networks VPN Client

            2.0


            Oceus Networks, Inc., a trusted CSfC Integrator, has built the Oceus Networks VPN (Oceus VPN Client) as a complete, full-featured solution that allows Android OEMs to easily integrate VPN functionality into mobile devices that need to establish encrypted tunnels of communication.

              • Exynos 7420 w/ Android 6.0
              • Qualcomm MSM8996 w/ Android 6.0
            1/19/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #2313, DRBG #460
            1027Cisco Systems, Inc.
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            Adaptive Security Appliance (ASA) OS

            9.6


            The Cisco ASAv delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASAv provide comprehensive security, performance, and reliability for network environment.

              • Intel Xeon E5 w/ ESXi 5.5
              • Intel Xeon Eseries w/ ESXi 5.5
            1/19/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3579, DRBG #1386
            1026Pulse Secure LLC
            2700 Zanker Road Suite 200
            San Jose, CA 95134
            USA

            Vikki Yin Wei
            vwei@pulsesecure.net
            +1-844-807-8573
            Fax: +1-408-503-7452

            Yvonne Sang
            ysang@pulsesecure.net
            +1-844-807-8573
            Fax: +1-408-503-7452

            Pulse Secure Cryptographic Module ECDSA

            2.0


            The Pulse Secure Cryptographic Module provides secure cryptographic services. It enables dynamic SSL VPN, NAC, mobile security, online meetings and collaboration, and application acceleration while removing the complexities of device type and security state, location, identity, and adherence to policies.

              • MAG2600 Intel Atom, N270, 1.6GHz w/ IVE OS 2.0 (32-bit)
              • MAG4610, SM160 Intel Core 2 Duo E2160 1.8Ghz w/ IVE OS 2.0 (64-bit)
              • MAG6610, SM360 Intel Core-2 Quad Q9400 2.66GHz w/ IVE OS 2.0 (64-bit)
              • PSA300, PSA3000 Intel Celeron Processor J1900 2.42 GHz w/ IVE OS 2.0 (64-bit)
              • PSA5000 Intel PENTIUM G3420 2C/2T 3.2G w/ IVE OS 2.0 (64-bit)
              • PSA7000f, PSA7000c Intel Xeon E3-1275v3(x86) w/ IVE OS 2.0 (64-bit)
              • Dell Power Edge R430/R530, Intel Xeon E5-2620 v4 2.1GHz w/ IVE OS 2.0 (64-bit)
              • PSA7000f, PSA7000c Intel Xeon E3-1275v3(x86) w/ Pulse One version 2.0 (64-bit)
            1/13/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3577, DRBG #1384
            1025ST Microelectronics (Protonworld)
            Green Square Building B, Lambroekstraat 5
            Diegem/Machelen B-1831
            Belgium

            Olivier COLLART
            olivier.collart@st.com
            +32 272 450 77
            Fax: +32 272 451 43

            Fabien ARRIVE
            fabien.arrive@st.com
            +33 223 470 633
            Fax: +33 223 470 400

            ST33HTPH

            ST Microelectronics Trusted Platform Module is a hardware cryptographic module which implements advanced cryptographic algorithms, including symmetric and asymmetric cryptography, as well as key generation and random number generation as defined by the Trusted Computing Group (TCG) versions 1.2 and 2.0 specifications.

              • N/A
            1/13/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-224, P-256
                • Signature Generation:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-224 SHA: SHA-1, SHA-256
                  • P-256 SHA: SHA-1, SHA-256
                • Prerequisite: SHS #3539, DRBG #1361
            1024LG Electronics, Inc.
            20 Yoido-dong
            Youngdungpo-gu
            Seoul 152-721
            Republic of Korea

            Jongseong Kim
            jongseong.kim@lge.com
            82-10-4535-0110
            Fax: 82-2-6950-2080

            LG BoringSSL

            1.0


            General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the LG BoringSSL module, which is a full featured general purpose cryptographic library.

              • Snapdragon 821 (8996 Pro) w/ Android 7.0
            1/13/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-224, P-256, P-384, P-521
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3572, DRBG #1381
            1023HUAWEI TECHNOLOGIES Co., Ltd.
            Yuhuatai District
            101 Software Avenue
            NANJING, JIANGSU 210000
            CHINA

            Yang Ze
            yangze1@huawei.com
            8615919432118

            yinhuilin
            jane.yinhuilin@huawei.com
            8618952017596

            HFCL

            V300R003C22SPC805 (Firmware)


            Huawei FIPS Cryptographic Library (HFCL) provides FIPS approved Cryptographic functions to Huawei products via an Application Programming Interface (API).

              • Cavium CN6120
              • Cavium CN6130
              • Cavium CN5650
              • Cavium CN6880
              • Freescale p1025
            1/6/2017
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-224, P-256
                  • Generation Methods: Extra Random Bits
                • Signature Generation:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-224 SHA: SHA-256
                  • P-256 SHA: SHA-256
                • Prerequisite: SHS #3565, DRBG #1379
            1022SEGGER Microcontroller GmbH & Co. KG
            In den Weiden 11
            Hilden, NRW 40721
            Germany

            Rainer Herbertz
            rainer.herbertz@segger.com
            +49-2103-2878-0
            Fax: +49-2103-2878-28

            emCrypt

            2.0 (Firmware)


            emCrypt is a high speed cryptographic library specifically designed for embedded systems. It is highly portable, operating system independent and provides a comprehensive set of cryptographic algorithms available through a simple C-language API for use in any application.

              • ARM Cortex-M
            1/6/2017
            • ECDSA:
              • 186-4:
                • Signature Generation:
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3563, DRBG #1377
            1021Infineon Technologies AG
            Alter Postweg 101
            Augsburg, BY 86159
            Germany

            Roland Ebrecht
            Roland.Ebrecht@infineon.com
            +49-821-25851-68
            Fax: +49-821-25851-40

            Thomas Hoffmann
            Thomas.Hoffmann@infineon.com
            +49-821-25851-24
            Fax: +49-821-25851-40

            Trusted Platform Module 2.0 SLB 9670

            7.80 (Firmware)


            Infineon Trusted Platform Module 2.0 SLB9670 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

              • Infineon SLB 9670 security controller IC
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-256
                • Prerequisite: SHS #3555, DRBG #1375
            1020Infineon Technologies AG
            Alter Postweg 101
            Augsburg, BY 86159
            Germany

            Roland Ebrecht
            Roland.Ebrecht@infineon.com
            +49-821-25851-68
            Fax: +49-821-25851-40

            Thomas Hoffmann
            Thomas.Hoffmann@infineon.com
            +49-821-25851-24
            Fax: +49-821-25851-40

            Trusted Platform Module 2.0 SLB 9660, SLB 9665

            5.80 (Firmware)


            Infineon Trusted Platform Module 2.0 SLB 9660/ SLB 9665 is an implementation according to the TPM Main Specification Version 2.0 Revision 01.16 Errata Version 1.4 by Trusted Computing Group.

              • Infineon SLB 9660 or SLB 9665 security controller IC
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-256
                • Prerequisite: SHS #3554, DRBG #1374
            1019Aclara
            Avda. Pinoa 10
            Zamudio, Bizkaia 48170
            Spain

            Oscar Lopez
            olopez@aclara.com

            SGM1400

            4.0.26 (Firmware)


            Crypto algorithms as required per GBCS 0.9 spec.

              • n/a
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-256
                • Prerequisite: SHS #3551, DRBG #1373
            1018Intel Corporation
            2200 Mission College Blvd.
            Santa Clara, California 95054
            USA

            Mark Hanson
            mark.hanson@intel.com
            972.963.7326

            McAfee OpenSSL FIPS Object Module

            1.0.0


            The McAfee OpenSSL FIPS Object Module provides cryptographic services for Intel Security products.

              • Intel Xeon w/ Linux 3.10 on VMware ESXi 5.5
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-384, SHA-512
                • Prerequisite: SHS #3548, DRBG #1371
            1017Certicom Corp.
            4701 Tahoe Blvd, Building A, 5th Floor
            Missisauga, ON L4W 0B5
            Canada

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-508-4230

            Security Builder FIPS Core

            5.6.2


            Security Builder® FIPS Core provides application developers with cryptographic tools to easily integrate encryption, digital signatures and other security mechanisms into C-based applications for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec, SSL and DRM modules.

              • Qualcomm Snapdragon 801 w/ BlackBerry 10
              • Qualcomm Snapdragon S4 w/ BlackBerry 10
              • Qualcomm Snapdragon S4 Pro w/ BlackBerry 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3547, DRBG #1370
            1016Renesas Electronics Corporation
            5-20-1 Jousuihon-cho
            Kodaira-shi, Tokyo 187-8588
            Japan

            Kazuhiko Fukushima
            kazuhiko.fukushima.xt@renesas.com
            +81-42-312-6470
            Fax: +81-42-328-4374

            Trusted System for R-Car_W2H

            1.0 (Firmware)


            "Trusted System for R-Car_W2H" provides cryptographic functions. This firmware works by using the HW security module "U11IP15001E0" implemented on "R-Car W2H".

              • R-Car W2H
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256
                • Signature Generation:
                  • P-256 SHA: SHA-256
                • Signature Verification:
                  • P-256 SHA: SHA-256
                • Prerequisite: SHS #3239, DRBG #1369
            1015Cisco Systems, Inc.
            170 West Tasman Dr.
            San Jose, CA 95134
            USA

            Global Certification Team
            certteam@cisco.com

            FX-OS

            2.0 (Firmware)


            Cisco Firepower eXtensible Operating System (FX-OS) version 2.0, a next-generation network and content security solutions.

              • Intel Xeon E3-11XX
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-192, P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-384, SHA-512
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3546, DRBG #1368
            1014Distech Controls, Inc.
            4205 Place de Java
            Brossard, QC J4Y 0C4
            Canada

            Dominic Gagnon
            dgagnon@distech-controls.com
            450-444-9898 Ext.231
            Fax: 450-444-0770

            François Gervais
            fgervais@distech-controls.com
            450-444-9898 Ext.263
            Fax: 450-444-0770

            Distech Java Cryptographic Library

            1.0 (Firmware)


            The Distech Java Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

              • AM335x Cortex-A8 (ARMv7) /w NEON
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3545, DRBG #1367
            1013Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library

            3.0.0 (Firmware)


            The CN4010, CN4020, CN6010 and CN6140 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN4010, CN4020, CN6010 and CN6140 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • ARM Cortex A9
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3542, DRBG #1364
            1012Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet) and ID Quantique SA
            312 Kings Way
            South Melbourne, Victoria 3205
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN8000 Series Common Crypto Library

            3.0.0 (Firmware)


            The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel Xeon
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3541, DRBG #1363
            1011Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
            312 Kings Way
            South Melbourne, Victoria 3025
            Australia

            John Weston
            john.weston@senetas.com
            +61 3 9868 4555
            Fax: +61 3 9821 4899

            CN6000 Series Common Crypto Library

            3.0.0 (Firmware)


            The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

              • Intel ATOM
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-256
                  • P-384 SHA: SHA-384
                  • P-521 SHA: SHA-512
                • Prerequisite: SHS #3540, DRBG #1362
            1010Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder GSE-J Crypto Core

            2.9.0


            Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

              • NXP ARM Cortex-A9 w/ Android OS API Level 17
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3538, DRBG #1360
            1009Certicom Corp.
            4701 Tahoe Blvd, Building A
            5th Floor
            Mississauga, Ontario L4W 0B5
            Canada

            Certicom Support
            support@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Certicom Sales
            sales@certicom.com
            1-905-507-4220
            Fax: 1-905-507-4230

            Security Builder GSE-J Crypto Core

            2.9.0


            Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

              • Qualcomm 8992 Snapdragon w/ Android OS Version 6.0.1
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits
                • Public Key Validation:
                  • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                • Signature Generation:
                  • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3537, DRBG #1359
            1008Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A10 w/ iOS 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3536, DRBG #1358
            1007Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A9X w/ iOS 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3535, DRBG #1357
            1006Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A9 w/ iOS 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3534, DRBG #1356
            1005Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A8X w/ iOS 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3533, DRBG #1355
            1004Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A8 w/ iOS 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3532, DRBG #1354
            1003Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software

              • Apple A7 w/ iOS 10
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3531, DRBG #1353
            1002Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel Xeon w/ MacOS Sierra
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3530, DRBG #1352
            1001Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel i7 w/ MacOS Sierra
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3529, DRBG #1351
            1000Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel i5 w/ MacOS Sierra
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3528, DRBG #1350
            999Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple OSX CoreCrypto Kernel Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to kernel space and generic, non-optimized software.

              • Intel CoreM w/ MacOS Sierra
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3527, DRBG #1349
            998Arista Networks Inc.
            5453 Great America Pkwy
            Santa Clara, CA 95054
            USA

            Richard Whitney
            rw@arista.com
            703-627-6092
            Fax: 408-538-8920

            Arista EOS Crypto Module

            v1.0


            The Arista EOS Crypto Module library implements a variety of FIPS approved algorithms to ensure that data can be transported, encrypted, and hashed in a secure manner.

              • AMD Athlon NEO X2 w/ EOS v4
              • Intel Sandy Bridge EN w/ EOS v4
              • Intel Broadwell-DE w/ EOS v4
              • AMD G Series: eKabini w/ EOS v4
              • AMD G Series: Steppe Eagle w/ EOS v4
            12/23/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384, P-521
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384, P-521
                • Signature Generation:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3516, DRBG #1340
            997Apple Inc.
            1 Infinite Loop
            Cupertino, CA 95014
            USA

            Shawn Geddis
            geddis@apple.com
            (669)227-3579
            Fax: (866)315-1954

            Apple iOS CoreCrypto Module (Generic)

            7.0


            Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

              • Apple A732 w/ iOS 10
            12/16/2016
            • ECDSA:
              • 186-4:
                • Key Pair Generation:
                  • Curves: P-256, P-384
                  • Generation Methods: Extra Random Bits, Testing Candidates
                • Public Key Validation:
                  • Curves: P-256, P-384
                • Signature Generation:
                  • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                • Signature Verification:
                  • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                • Prerequisite: SHS #3514, DRBG #1339
            996
            12/16/2016
              995Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              FMC FOM

              6.0 (Firmware)


              A fault-tolerant, purpose-built network appliance that provides a centralized management console and database repository for your Firepower System deployment. FMC has a range of device management, event storage, host monitoring and user monitoring capabilities.

                • Intel Xeon E3 series
                • Intel Xeon E5 2600 series
                • Intel Xeon E5600 series
                • Intel Atom C25XX
                • Intel Pentium/Core i3
                • Intel Xeon 5xxx
                • Intel Xeon 34xx
                • Intel Atom D2xxx
                • Intel Pentium B9xx
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-384, SHA-512
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-384, SHA-512
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3512, DRBG #1337
              994Mocana Corporation
              20 California Street
              San Francisco, CA 94111
              USA

              Srinivas Kumar
              fips@mocana.com
              1-415-617-0055
              Fax: 1-415-617-0056

              Mocana Cryptographic Library

              6.4.1f


              The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com

                • Intel Atom E3800 w/ Wind River Linux 6.0
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3511, DRBG #1336
              993VMware, Inc.
              3401 Hillview Ave
              Palo Alto, CA 94303
              USA

              Eric Betts
              betts@vmware.com
              408-891-0590

              Michael McKay
              mmckay@vmware.com
              408-891-0590

              VMware Java JCE (Java Cryptographic Extension) Module

              BC FIPS 1.0.0


              The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

                • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3490, DRBG #1330
              992Bluechip Systems LLC
              2350 Mission College Blvd, Suite 290
              Santa Clara, CA 95054
              USA

              Uri Kreisman
              uri.kreisman@bluechipsys.com
              650-257-8000
              Fax: 650-241-1895

              OpenSSL-FIPS

              d40d43f6e6f28cdaf549e0fbc0f3d4a45b003e10 (Firmware)


              The SAIFE library''s system security services are built on functions provided by the proven OpenSSL FIPS Object.

                • Bluechip Systems X4 SoC
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-384
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-384 SHA: SHA-256
                  • Signature Verification:
                    • P-384 SHA: SHA-256
                  • Prerequisite: SHS #3489, DRBG #1329
              991Bluechip Systems LLC
              2350 Mission College Blvd, Suite 290
              Santa Clara, CA 95054
              USA

              Uri Kreisman
              uri.kreisman@bluechipsys.com
              650-257-8000
              Fax: 650-241-1895

              OpenSSL ECDSA/SHA

              1.0.1r (Firmware)


              The MicroCloud X4's firmware update manager enforces a strong elliptic curve signature verification process before accepting firmware update packets. The verification process includes ECDSA signature verification over both P-256 and P-384 curves.

                • Bluechip Systems X4 SoC
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256
                  • Prerequisite: SHS #3488
              990Bluechip Systems LLC
              2350 Mission College Blvd, Suite 290
              Santa Clara, CA 95054
              USA

              Uri Kreisman
              uri.kreisman@bluechipsys.com
              650-257-8000
              Fax: 650-241-1895

              Secure Boot Loader ECDSA/SHA

              1747 (Firmware)


              The integrity of the MicroCloud X4 Linux kernel is verified during secure boot through a calculation of SHA-256 message digests by CoolEngine DSP in support of the ECDSA signature verification. This verification enables the MicroCloud X4 to complete the SD bus "handshake" within the host device's expectations.

                • Bluechip Systems X4 SoC
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3487
              989Cisco Systems, Inc.
              170 West Tasman Dr.
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              Adaptive Security Appliance (ASA) OS

              9.6 (Firmware)


              The Cisco ASA Security Appliance Series delivers robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions. The ASA 5500 Series Adaptive Security Appliances provide comprehensive security, performance, and reliability for network environment.

                • Intel Aton C25xx
                • Intel Pentium/Core i3
                • Intel Xeon 34xx
                • Intel Xeon 5xxx
                • Intel Xeon E5-26xx
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3486, DRBG #1328
              988Hangzhou Synochip Data Security Technology Co., Ltd.
              East Tower, Building 9, No. 998 West Wenyi Road
              Hangzhou, Zhejiang 311121
              China

              Bill Wu
              wubin@synochip.com.cn
              +86 571 88271908-804
              Fax: +86 571 88271901

              Windy Ye
              postmaster@synochip.com.cn
              +86 571 88271908-800
              Fax: +86 571 88271901

              FingerprintSE 32-bit RISC Core Platform

              V1.0 (Firmware)


              FingerprintSE is an integrated platform including processor (AS578/AS608), cryptographic & fingerprint processing firmware. The processor is based on a 32-bit RISC core CPU, designed with SoC architecture and a dedicated fingerprint algorithm accelerator is integrated.

                • AS578/AS608
              12/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3420, DRBG #1263
              987Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • MPC8548
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3484, DRBG #1326
              986Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • PPC440EPX
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3483, DRBG #1325
              984Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • T1022
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3481, DRBG #1323
              983Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • P4080
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3480, DRBG #1322
              982Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480

              Brocade FIPS Crypto Library

              FOS 8.1.0 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • P3041
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3479, DRBG #1321
              981Green Hills Software
              7585 Irvine Center Drive
              Suite 250
              Irvine, CA 92618
              USA

              David Sequino
              206-310-6795
              Fax: 978-383-0560

              Douglas Kovach
              727-781-4909
              Fax: 727-781-2915

              INTEGRITY Security Services High Assurance Embed

              1.0 (Firmware)


              ISS HA ECT is a standards-based cryptographic toolkit providing a flexible framework to integrate encryption, digital signatures and other security mechanisms into a wide range of applications. It is designed to support multiple cryptographic providers with a single common API, easily targeted to a variety of Operating Systems.

                • ARM Cortex-M3
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Extra Random Bits
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3477, DRBG #1319
              980Distech Controls, Inc.
              4205 Place de Java
              Brossard, QC J4Y 0C4
              Canada

              Dominic Gagnon
              dgagnon@distech-controls.com
              450-444-9898 Ext.231
              Fax: 450-444-0770

              François Gervais
              fgervais@distech-controls.com
              450-444-9898 Ext.263
              Fax: 450-444-0770

              Distech SSL Cryptographic Library

              1.0 (Firmware)


              The Distech SSL Cryptographic Library is a general purpose cryptographic library used by Distech Controls products including the Eclypse series of controllers.

                • AM335x Cortex-A8 (ARMv7) /w NEON
                • AM335x Cortex-A8 (ARMv7) /without NEON
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3476, DRBG #1318
              979Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              CiscoSSL FIPS Object Module (Assembler)

              6.2


              The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''s networking and collaboration products.

                • Cavium Octeon MIPS64 w/ Linux 2.6
                • Cavium Octeon MIPS64 w/ Linux 3.10
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3471, DRBG #1317
              978Cisco Systems, Inc.
              170 West Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              CiscoSSL FIPS Object Module

              6.2


              The Cisco FIPS Object Module is a software library that provides cryptographic services to a vast array of Cisco''''s networking and collaboration products.

                • ARMv8 w/ Android 3.10
                • ARMv8 w / Apple iOS 9
                • Intel Xeon w/ FreeBSD 10.3
                • Intel Core i5 without AES-Ni w/ Windows 10
                • Intel Core i5 with AES-Ni w/ Windows 10
                • Cavium Octeon MIPS64 w/ Linux 2.6
                • Intel Core i5 without AES-Ni w/ Linux 3.10
                • Intel Core i5 with AES-Ni w/ Linux 3.10
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3470, DRBG #1316
              977Ciena Corporation
              7035 Ridge Road
              Hanover, MD 21076
              USA

              Patrick Scully
              pscully@ciena.com
              613-670-3207

              Ciena 6500 Flex3 WaveLogic 3e OCLD Cryptography Engine

              2.01 (Firmware)


              The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service.

                • Xilinx XC7Z020
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3469, DRBG #1315
              976Ciena Corporation
              7035 Ridge Road
              Hanover, MD 21076
              USA

              Patrick Scully
              pscully@ciena.com
              613-670-3207

              Ciena 6500 Flex3 WaveLogic 3e OCLD Boot Loader

              1.00 (Firmware)


              The Ciena 6500 Packet-Optical Platform Flex3 WaveLogic 3e OCLD Encryption Module offers an integrated transport encryption solution providing protocol-agnostic 100Gb/s or 200Gb/s wirespeed encryption service for enterprises, datacenters, government and also offered through service providers as differentiated managed service.

                • HunQ v3 ASIC
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3468
              975Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Xeon 32 bit w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3467, DRBG #1306
              974Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Xeon w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3466, DRBG #1305
              973Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i7 32 bit w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3465
              972Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i5 32 bit w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3464, DRBG #1303
              971Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i7 w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3463, DRBG #1302
              970Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel i5 w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3462, DRBG #1301
              969Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Core M 32 bit w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3461, DRBG #1300
              968Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple OSX CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Intel Core M w/ MacOS Sierra
              12/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3460, DRBG #1299
              967Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 32bit w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3443, DRBG #1286
              966Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A832 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3430, DRBG #1285
              965Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A932 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3429, DRBG #1284
              964Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A10 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3428, DRBG #1283
              963Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X32 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3427, DRBG #1282
              962Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3426, DRBG #1281
              961Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A9X w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3425, DRBG #1280
              960Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X32 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3424, DRBG #1279
              959Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8X w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3423, DRBG #1278
              958Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A8 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3422, DRBG #1277
              957Apple Inc.
              1 Infinite Loop
              Cupertino, CA 95014
              USA

              Shawn Geddis
              geddis@apple.com
              (669)227-3579
              Fax: (866)315-1954

              Apple iOS CoreCrypto Module (Generic)

              7.0


              Cryptographic library offering various cryptographic mechanisms to Apple frameworks. The testing applies to user space and generic, non-optimized software.

                • Apple A7 w/ iOS 10
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3421, DRBG #1276
              956Hypori, Inc.
              9211 Waterford Centre Blvd
              Suite 100
              Austin, TX 78758
              USA

              Evan Watkins
              evan.watkins@hypori.com
              512-646-1040

              Hypori FIPS Object Module for OpenSSL

              2.0.10


              Re-brand of OpenSSL Version 2.0.10 running in Hypori Virtual Device

                • Intel Xeon w/ Android 4 (ARMv7 w/ Houdini) on ESXi 6
                • Intel Xeon w/ Android 4 (x86_64) on ESXi 6
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3419, DRBG #1262
              955VMware, Inc.
              3401 Hillview Ave
              Palo Alto, CA 94303
              USA

              Eric Betts
              betts@vmware.com
              408-891-0590

              Michael McKay
              mmckay@vmware.com
              408-891-0590

              VMware Java JCE (Java Cryptographic Extension) Module

              BC FIPS 1.0.0


              The VMware Java JCE (Java Cryptographic Extension) Module (VMware JCE Module) is a software cryptographic module containing a set of cryptographic functions.

                • Intel Xeon E5 w/ NSX Controller 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Edge 6.3.0 OS with Java JRE 1.7 running on VMware vSphere Hypervisor (ESXi) 6.0
                • Intel Xeon E5 w/ NSX Manager 6.3.0 OS with Java JRE 1.7 running on Vmware vSphere Hypervisor (ESXi) 6.0
              12/2/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3417, DRBG #1261
              954Security First Corp.
              29811 Santa Margarita Parkway
              Suite 600
              Rancho Santa Margarita, CA 92688
              USA

              Rick Orsini
              rorsini@securityfirstcorp.com
              949-858-7525
              Fax: 949-858-7092

              Secure Parser Library

              4.7.1.0


              The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library.

                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows Server 2008 R2 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows Server 2008 R2 64-bit
                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows Server 2012 R2 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows Server 2012 R2 64-bit
                • Intel Core I7-3770 with AES-NI w/ Red Hat Enterprise Linux 6 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Red Hat Enterprise Linux 6 64-bit
                • Intel Core I7-3770 with AES-NI w/ Red Hat Enterprise Linux 7 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Red Hat Enterprise Linux 7 64-bit
                • Intel Core I5-6300U with AES-NI w/ Microsoft Windows 10 64-bit
                • Intel Core I5-6300U with AES-NI disabled w/ Microsoft Windows 10 64-bit
                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows 7 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows 7 64-bit
                • Intel Core I7-3770 with AES-NI w/ Microsoft Windows 8 64-bit
                • Intel Core I7-3770 with AES-NI disabled w/ Microsoft Windows 8 64-bit
                • QUALCOMM Snapdragon 801 w/ Android 5.0
              11/18/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-521
                    • Generation Methods: Testing Candidates
                  • Signature Verification:
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3415, DRBG #1260
              953Barracuda Networks
              3175 Winchester Road
              Campbell, CA 95008
              USA

              Andrea Cannon
              acannon@barracuda.com
              703-743-9068

              Barracuda Cryptographic Software Module

              1.0.1.8


              x

                • Intel Xeon with AES-NI w/ Barracuda NextGen Firewall and Control OS 7 under Microsoft Windows 2012 (64-bit) Hyper-V
                • Intel Xeon without AES-NI w/ Barracuda NextGen Firewall and Control OS 7 under Microsoft Windows 2012 (64-bit) Hyper-V
              11/18/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3412, DRBG #1258
              952OpenSSL Validation Services, Inc.
              1829 Mount Ephraim Road
              Adamstown, MD 21710
              USA

              Steve Marquess
              info@openssl.com
              301-874-2571

              OpenSSL FIPS Object Module

              2.0.14


              The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

                • Cavium Octeon II (MIPS) w/ ExtremeXOS-Linux 3.1
              11/10/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3411, DRBG #1256
              951SonicWALL Inc.
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Usha Sanagala
              usanagala@sonicwall.com
              408-962-6248
              Fax: 408-745-9300

              SonicOS 6.2.5 for TZ, SM and NSA

              6.2.5 (Firmware)


              The Dell SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, Application Intelligence and Control with real-time Visualization. Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet needs of the most high-performance networks.

                • Cavium Octeon Plus 6600 Family
                • Cavium Octeon Plus 6800 Family
                • Cavium Octeon Plus 7020 Family
                • Cavium Octeon Plus 7130 Family
              11/4/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3214
              950Aruba, a Hewlett Packard Enterprise company
              1344 Crossman Avenue
              Sunnyvale, CA 94089
              USA

              Steve Weingart
              steve.weingart@hpe.com
              512-318-2480

              ArubaOS Crypto Module

              ArubaOS 6.5.1 (Firmware)


              The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

                • Freescale IPQ8068
              11/4/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3408, DRBG #1188
              949VMware, Inc.
              3401 Hillview Ave
              Palo Alto, CA 94303
              USA

              Eric Betts
              betts@vmware.com
              +1 (650) 427-1902

              Manoj Maskara
              mmaskara@vmware.com
              +1 (650) 427-3478

              VMware OpenSSL FIPS Object Module

              2.0.9


              The VMware OpenSSL FIPS Object Module is a versatile software library that implements FIPS 140-2 Approved cryptographic services for VMware products and platforms.

                • Intel Core I without AES-NI w/ Windows 8.1 on ESXi 6.0
                • Intel Core I without AES-NI w/ Windows 7 SP1 on ESXi 6.0
                • Intel Core I with AES-NI w/ Windows 7 SP1 on ESXi 6.0
                • Intel Core I without AES-NI w/ Windows 10 on ESXi 6.0
                • Intel Core I with AES-NI w/ Windows 10 on ESXi 6.0
                • Intel Core I with AES-NI w/ Windows 8.1 on ESXi 6.0
                • Intel Xeon with AES-NI w/ Windows 2012 64 bit on ESXi 6.0
                • Intel Xeon with AES-NI w/ Windows 2012 R2 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2012 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2012 R2 on ESXi 6.0
                • Intel Xeon without AES-NI w/ VMware NSX Controller OS 12.04 on ESXi 6.0
                • Intel Xeon with AES-NI w/ VMware NSX Controller OS 12.04 on ESXi 6.0
                • Intel Xeon without AES-NI w/ VMware NSX Edge OS 3.14 on ESXi 6.0
                • Intel Xeon with AES-NI w/ VMware NSX Edge OS 3.14 on ESXi 6.0
                • Intel Xeon with AES-NI w/ VMware NSX Manager OS 3.17 on ESXi 6.0
                • Intel Xeon without AES-NI w/ VMware NSX Manager OS 3.17 on ESXi 6.0
                • Intel Xeon with AES-NI w/ SLES 11 SP3 on ESXi 6.0
                • Intel Xeon without AES-NI w/ SLES 11 SP3 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2012 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Photon OS 1.0 on ESXi 6
                • Intel Xeon with AES-NI w/ Photon OS 1.0 on ESXi 6
                • Intel Xeon with AES-NI w/ Windows 2016 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Windows 2016 64 bit on ESXi 6.0
                • Intel Xeon with AES-NI w/ Windows 2016 64 bit on ESXi 6.5
                • Intel Xeon without AES-NI w/ Windows 2016 64 bit on ESXi 6.5
                • Intel Xeon with AES-NI w/ VMware NSX Controller OS 16.04 on ESXi 6.5
                • Intel Xeon without AES-NI w/ VMware NSX Controller OS 16.04 on ESXi 6.5
                • Intel Xeon with AES-NI w/ VMware NSX Edge OS 4.4 on ESXi 6.5
                • Intel Xeon without AES-NI w/ VMware NSX Edge OS 4.4 on ESXi 6.5
                • Intel Xeon with AES-NI w/ Photon OS 1.0 on ESXi 6.5
                • Intel Xeon without AES-NI w/ Photon OS 1.0 on ESXi 6.5
                • Intel Xeon with AES-NI w/ Photon OS 2.0 on ESXi 6.0
                • Intel Xeon without AES-NI w/ Photon OS 2.0 on ESXi 6.0
                • Intel Xeon with AES-NI w/ Photon OS 2.0 on ESXi 6.5
                • Intel Xeon without AES-NI w/ Photon OS 2.0 on ESXi 6.5
                • Intel Xeon with AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.0
                • Intel Xeon without AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.0
                • Intel Xeon with AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.5
                • Intel Xeon without AES-NI w/ Ubuntu 14.04 64 bit on ESXi 6.5
                • Intel Xeon with AES-NI w/ Ubuntu 16.04 64 bit on ESXi 6.0
              11/4/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3407, DRBG #1254
              948Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Seyed Safakish
              seyeds@juniper.net
              408-745-2000

              Shivakumar Muttur
              shivakm@juniper.net
              +91 8061211850

              OpenSSL Crypto Lib

              15.1X53-D55 (Firmware)


              Comprehensive, scalable and secure switching & routing solutions specifically designed to meet the needs of campus, enterprises and service providers. All of our switches & routers - core, Multiservice edge and edge Ethernet - run on one common operating system- Junos.

                • ARM Cortex A9
              11/4/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3405, DRBG #1253
              947Attivo Networks, Inc.
              47697 Westinghouse Drive, Suite 201
              Fremont, CA 94539
              USA

              Satya Das
              510 623-1000

              Attivo Cryptographic Module

              1.0 (Firmware)


              Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI, Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.4GHz with AES-NI
              10/28/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3403, DRBG #1251
              946Klas Telecom
              1101 30th Street NW, Suite 500
              Washington, DC 20007
              USA

              Cathal Daly
              Cathal.daly@klastelecom.com
              0035315250008

              Frank Murray
              Frank.murray@klastelecom.com

              Klas OpenSSL FIPS Object Module 2.0.9

              2.0.9


              Algorithms taken from OpenSSL FIPS Module v2.0.9

                • Marvell Armv5te Feroceon rev 0 (v5l) w/ Linux 2.6.31.8 (32 bit)
              10/28/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3400, DRBG #1250
              945Axway Inc.
              26 rue des Pavillons
              Puteaux Cedex, France 92807
              France

              Niall Tierney
              ntierney@axway.com

              Axway OpenSSL

              1.0


              Axway OpenSSL module for the Axway API product suite based on the OpenSSL FIPS Obect Module 2.0.10.

                • Intel Xeon w/ RHEL 6.6 on VMWare ESX 5.5
                • Intel Xeon w/ RHEL 6.6
                • Intel Xeon w/ Windows 2012R2 64bit on VMWare ESX 5.5
                • Intel Xeon w/ Windows 2012R2 64bit
              10/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3396, DRBG #1247
              944Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Hamid Sobouti
              hsobouti@brocade.com
              408-333-4150
              Fax: 408-333-8101

              Brocade FIPS Crypto Library

              7.4.0 (Firmware)


              The Brocade cryptographic library used in Brocade Fabric OS products implements crypto operations in Firmware.

                • e500mc
              10/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #2435, DRBG #672
              943Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Hamid Sobouti
              hsobouti@brocade.com
              408-333-4150
              Fax: 408-333-8101

              Brocade FIPS Crypto Library

              FOS 7.4.0 (Firmware)


              The Brocade cryptographic library used in Brocade Fabric OS products implements crypto operations in Firmware.

                • MPC8548
              10/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #2436, DRBG #671
              942Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Hamid Sobouti
              hsobouti@brocade.com
              408-333-4150
              Fax: 408-333-8101

              Brocade FIPS Crypto Library

              7.4.0 (Firmware)


              The Brocade cryptographic library used in Brocade Fabric OS products implements crypto operations in Firmware.

                • AMCC PPC 440EPX
              10/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #2417, DRBG #670
              941RSA, The Security Division of EMC
              174 Middlesex Turnpike
              Bedford, MA 01730
              USA

              Rohit Mathur
              rohit.mathur@rsa.com
              +61 7 3032 5220

              RSA BSAFE Crypto-C Micro Edition (ME)

              4.0.2.5


              RSA BSAFE(R) Crypto-C ME software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. The software supports a wide range of industry standard encryption algorithms offering developers the flexibility to choose the appropriate option to meet their requirements.

                • Intel x86 w/ NetBSD v6.0.1
              10/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Verification:
                    • B-163 SHA: SHA-1
                    • B-233 SHA: SHA-1
                    • B-283 SHA: SHA-1
                    • B-571 SHA: SHA-1
                    • K-163 SHA: SHA-1
                    • K-233 SHA: SHA-1
                    • K-283 SHA: SHA-1
                    • K-409 SHA: SHA-1
                    • K-571 SHA: SHA-1
                    • P-192 SHA: SHA-1
                    • P-224 SHA: SHA-1
                    • P-256 SHA: SHA-1
                    • P-384 SHA: SHA-1
                    • P-521 SHA: SHA-1
                  • Prerequisite: SHS #3395, DRBG #1246
              940LG Electronics, Inc.
              20 Yoido-dong
              Youngdungpo-gu
              Seoul 152-721
              Republic of Korea

              Jongseong Kim
              jongseong.kim@lge.com
              82-10-4535-0110
              Fax: 82-2-6950-2080

              LG OpenSSL FIPS Object Module

              2.0.12


              General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library.

                • Qualcomm Snapdragon 800-series w/ Android 7.0
              10/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3394, DRBG #1245
              939Symantec Corporation
              350 Ellis Street
              Mountain View, CA 94043
              USA

              Thomas Anderson
              Thomas_anderson@symantec.com
              415-738-2725

              David Laliberte
              David_laliberte@symantec.com
              415-829-5120

              Scanner Cipher Engine

              2.0


              The Symantec Scanner Cipher Engine is designed to provide FIPS140-2 algorithm support for the Symantec Scanner Cryptographic Module. This module supports Symantec applications by providing validated and approved cryptographic services

                • Intel Xeon w/ CentOS 6
              10/14/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3393, DRBG #1244
              938Arxan Technologies
              650 California St
              San Francisco, CA 94108
              USA

              Sam Kerr
              skerr@arxan.com
              301-968-4290
              Fax: 415-247-0910

              Andrei Alexandru
              support@arxan.com
              301-968-4290
              Fax: 415-247-0910

              Arxan Cryptographic Key & Data Protection ECDSA Component

              1.0


              Arxan Cryptographic Key & Data Protection, a state-of-the-art Whitebox Cryptography, transforms crypto keys and data so neither can be discovered while at rest or at runtime. It supports ECDSA algorithm in whitebox form to protect sensitive keys and data in hostile or untrusted operational environments.

                • Quad-core, 1200 MHz, ARM Cortex-A7 w/ Android KitKat 4.4.1
              10/14/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3392
              937Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
              312 Kings Way
              South Melbourne, Victoria 3025
              Australia

              John Weston
              john.weston@senetas.com
              +61 3 9868 4555
              Fax: +61 3 9821 4899

              CN9000 Series Common Crypto Library

              3.0.0 (Firmware)


              The CN9000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN9000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                • ARM Cortex A9
              10/14/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3391, DRBG #1242
              936Allegro Software Development Corporation
              1740 Massachusetts Avenue
              Boxborough, MA 01719
              USA

              Alan Presser
              apresser@allegrosoft.com
              (978) 264-6600

              Allegro Cryptographic Engine

              6.2


              The Allegro Cryptographic Engine (ACE) is a cryptographic library module for embedded computing systems. ACE provides software implementations of algorithms for calculations of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange.

                • Intel Core i7 without AES-NI w/ Windows 10 Professional
                • Intel Core i7 with AES-NI w/ Windows 10 Professional
                • Intel Core i7 without AES-NI w/ Linux Mint 18
                • Intel Core i7 with AES-NI w/ Linux Mint 18
              10/14/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3390, DRBG #1241
              935Futurex
              864 Old Boerne Road
              Bulverde, TX 78163
              USA

              Futurex Security Certifications
              certifications@futurex.com
              830-980-9782

              Exar

              6.2.0.0 (Firmware)


              The Crypto Library includes AES, ECDSA, HMAC, RSA, SHA, and TDES algorithms for use in the Futurex cryptographic module.

                • Exar DX1740
              10/6/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3387, DRBG #1240
              934Brocade Communications Systems, Inc.
              130 Holger Way
              San Jose, CA 95134
              USA

              Chris Marks
              marksc@brocade.com
              408-333-0480
              Fax: 408-333-8101

              Brocade FIPS Crypto Library

              FOS 8.1 (Firmware)


              Brocade Cryptographic Library is used in Brocade FOS-based switches to implement the cryptographic-related modules.

                • CN6880
              10/6/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-384
                    • Generation Methods: Testing Candidates
                  • Prerequisite: SHS #3386, DRBG #1239
              933Oberthur Technologies
              402 rue d'Estienne d'Orves
              Colombes 92700
              France

              GOYET Christophe
              c.goyet@oberthur.com
              +1 703 322 8951

              BOUKYOUD Saïd
              s.boukyoud@oberthur.com
              +33 1 78 14 72 58
              Fax: +33 1 78 14 70 20

              ECDSA on Cosmo V8.1

              07837.15 (Firmware)


              ID-One Cosmo V8.1 is a dual interface (ISO 7816 & ISO 14443) smartcard hardware platform which supports GF(p) algorithms for Signature/verification operations and Key generations fully compliant with IEEE P1363-2000 with key size from 159 to 522 bit, and with SHA, SHA-224, SHA-256 , SHA-384, SHA-512 well as no hash.

                • ID-One PIV on Cosmo V8.1
              10/6/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3379, SHS #3380, DRBG #1234
              932Samsung Electronics Co., Ltd.
              275-18, Samsung 1-ro
              Hwaseong-si, Gyeonggi-do 445-701
              Korea

              Jisoo Kim
              jisoo74.kim@samsung.com
              82-31-8096-2832
              Fax: 82-31-8000-8000

              REX ECDSA P‐224 Library

              REX_ECDSA_P224_V1.0 (Firmware)


              PM1633a Series is high-performance Self-Encrypting SSD supporting SAS 12G Interface that provides on-the-fly encryption/decryption of user data without performance loss. It implements AES256-XTS for user data encryption, ECDSA P-224 for FW authentication, and CTR_DRBG for key generation.

                • ARM-based CPU
              9/30/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-224 SHA: SHA-256
                  • Prerequisite: SHS #3382
              931Symantec Corporation
              384 Santa Trinita Ave
              Sunnyvale, CA 94085
              USA

              Diana Robinson
              diana.robinson@bluecoat.com
              845-454-6397

              Ian Hall
              ian.hall@bluecoat.com
              703-598-6876

              SSL Visibility Appliance Crypto Library

              1.0.4 (Firmware)


              The SSL Visibility Appliance decrypts multiple streams of SSL content to provide IDS/IPS, logging, forensics, and data loss prevention. This preserves complete network traffic histories necessary for compliance/threat analysis and enables SSL inspection capabilities that close the security loophole created by SSL.

                • Intel E3-1225 V3 Quad Core
                • Intel E5-2618L V3 Octa Core
                • Intel E5-2640 V3 Octa Core
                • Intel E5620 Quad Core
                • Intel E5645 Hex Core
                • Intel X3450 Quad Core
              9/23/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3378, DRBG #1233
              930Sony Mobile Communications Inc.
              Mobilvagen 4
              Lund 221 88
              Sweden

              Nenad Pavlovic
              xib@sonymobile.com
              +46 (0)10 80 00000

              Xperia BoringSSL Cryptographic Module (820)

              1.0.0


              The Xperia BoringSSL Cryptographic Module provides user-mode applications with security services.

                • Qualcomm Snapdragon 820 (MSM8996) w/ Android 6.0.1
              9/23/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3377, DRBG #885
              929Sony Mobile Communications Inc.
              Mobilvagen 4
              Lund 221 88
              Sweden

              Nenad Pavlovic
              xib@sonymobile.com
              +46 (0)10 80 00000

              Xperia BoringSSL Cryptographic Module (650)

              1.0.0


              The Xperia BoringSSL Cryptographic Module provides user-mode applications with security services.

                • Qualcomm Snapdragon 650 (MSM8976) w/ Android 6.0.1
              9/23/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-224 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3376, DRBG #885
              928Mocana Corporation
              20 California Street
              San Francisco, CA 94111
              USA

              Srinivas Kumar
              fips@mocana.com
              1-415-617-0055
              Fax: 1-415-617-0056

              Mocana Cryptographic Library

              6.4.1f


              The Mocana Cryptographic Module is the engine of Mocana''s Device Security Framework - a software framework that secures all aspects of a system. The Device Security Framework helps applications and device designers reduce development costs and dramatically enhance cryptographic performance. For details see www.mocana.com.

                • Freescale P2020 w/ Mentor Graphics Linux 4.0
              9/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3375, DRBG #1232
              927Hewlett Packard Enterprise
              153 Taylor Street
              Littleton, MA 01460
              USA

              Bob Pittman
              bob.pittman@hpe.com
              1-508-467-0284
              Fax: 1-978-264-5522

              HPE Comware Firmware

              Comware Crypto 7.1.1.1.1.55 (Firmware)


              Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

                • ARM Cortex-A9 1GHz
                • Broadcom XLS408, 1.2GHz, MIPS
                • Freescale MPC P5040, 1.8 GHz, PowerPC
                • Freescale MPC8548, 1.5 GHz, PowerPC
              9/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3369, DRBG #1231
              926Hewlett Packard Enterprise
              153 Taylor Street
              Littleton, MA 01460
              USA

              Bob Pittman
              bob.pittman@hpe.com
              1-508-467-0284
              Fax: 1-978-264-5522

              HPE Comware Firmware

              Comware Crypto 7.1.1.1.1.53 (Firmware)


              Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

                • ARM Cortex-A9 1GHz * 2
                • Broadcom XLP108, 1.0GHz, MIPS
                • Broadcom XLP316, 1.2GHz, MIPS
              9/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3368, DRBG #1230
              925Hewlett Packard Enterprise
              153 Taylor Street
              Littleton, MA 01460
              USA

              Bob Pittman
              bob.pittman@hpe.com
              1-508-467-0284
              Fax: 1-978-264-5522

              HPE Comware Firmware

              Comware Crypto 7.1.1.1.1.52 (Firmware)


              Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

                • Cavium CN6130, 1Ghz, MIPS
                • Cavium CN6218, 1Ghz, MIPS
                • Cavium CN6635, 1.3Ghz, MIPS
                • Freescale P1016, 667Mhz, PowerPC
                • Freescale P1021, 800Mhz, PowerPC
              9/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3367, DRBG #1229
              924Hewlett Packard Enterprise
              153 Taylor Street
              Littleton, MA 01460
              USA

              Bob Pittman
              bob.pittman@hpe.com
              1-508-467-0284
              Fax: 1-978-264-5522

              HPE Comware Firmware

              Comware Crypto 7.1.1.1.1.50 (Firmware)


              Comware cryptographic library is a software library that provides cryptographic functions within HPE network devices.

                • Broadcom XLP108AQ, 1GHz, MIPS
                • Broadcom XLP316, 1.2GHz, MIPS
                • Broadcom XLS208, Cortex-A9, 1GHz
              9/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3366, DRBG #1228
              923Centrify Corporation
              3300 Tannery Way
              Santa Clara, California 95054
              USA

              Kitty Shih
              kitty.shih@centrify.com
              669-444-5238

              Centrify Cryptographic Library

              2.0


              Centrify Cryptographic Library version 2.0 is a general purpose cryptographic library that provides cryptographic services for Centrify products.

                • PowerPC Power 7 w/ AIX 7.2 (32-bit)
                • MacBook Pro Intel Core i7 w/ Mac OS 10.11.5
                • Intel Xeon x86_64 w/ RHEL 7.2
                • PowerPC Power 7 w/ AIX 7.2 (64-bit)
              9/16/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3363, DRBG #1226
              922Comtech EF Data Corporation
              2114 West 7th Street
              Tempe, Arizona 85281
              USA

              Kasra Akhavan-Toyserkani
              kakhavan@comtechefdata.com
              (240)243-1837
              Fax: (240)243-1853

              Parag Patel
              ppatel@comtechefdata.com
              (240)243-1876
              Fax: (240)243-1853

              TRANSEC Cryptographic Engine

              2.2.4 (Firmware)


              The Comtech EF Data FIPS Security Module features an FPGA to perform bulk encryption/decryption for Ethernet data traffic via Comtech Satellite Modems, as well as firmware to provide the cryptographic functions needed to act as a endpoint for TLS management and control traffic.

                • AMCC PowerPC 440EP
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3359, DRBG #1225
              921Kyocera Corporation
              9520 Towne Centre Drive
              Suite 200
              San Diego, CA 92121
              USA

              n/a

              DuraForce PRO OpenSSL Library

              OpenSSL 1.0.2f


              DuraForce PRO OpenSSL 1.0.2f

                • Qualcomm MSM8952 w/ Android 6.0.1
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384
                    • P-384 SHA: SHA-1, SHA-256, SHA-384
                    • P-521 SHA: SHA-1, SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384
                    • P-384 SHA: SHA-1, SHA-256, SHA-384
                    • P-521 SHA: SHA-1, SHA-256, SHA-384
                  • Prerequisite: SHS #3358, DRBG #1224
              920Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Tim Myers
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4 and Surface Pro 3 w/ Windows 10 Anniversary Update Virtual TPM Implementations

              10.0.14393


              The Microsoft Windows Virtual TPM implementations provide cryptography algorithms to support the Virtual TPM functionality for Hyper-V

                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
                • Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro Anniversary Update (x64)
                • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
                • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Datacenter (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Storage Server 2016 (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Server 2016 with Windows Hyper-V enabled (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell OptiPlex 3040 w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-256
                    • P-384 SHA: SHA-1, SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256
                    • P-384 SHA: SHA-1, SHA-256, SHA-384
                  • Prerequisite: SHS #3347, DRBG #1222
              919Apricorn, Inc.
              12191 Kirkham Rd
              Poway, CA 92064
              United States

              Robert Davidson
              rdavidson@apricorn.com
              858-513-4430
              Fax: 858-513-4404

              Aegis Translator

              7.0 (Firmware)


              Secure communication for Aegis device setup

                • n/a
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256
                  • Prerequisite: SHS #1911, DRBG #260
              918Security First Corp.
              29811 Santa Margarita Parkway
              Suite 600
              Rancho Santa Margarita, CA 92688
              USA

              Rick Orsini
              rorsini@securityfirstcorp.com
              949-858-7525
              Fax: 949-858-7092

              Secure Parser Library

              4.7.1.0


              The Secure Parser Library is a suite of general security routines using FIPS Approved algorithms for its cryptography. An AES key size of 256 bits and equivalent key sizes for all other algorithms are supported by the library.

                • Qualcomm Snapdragon 801 w/ Android 5.1
                • Qualcomm Snapdragon 801 w/ Android 6.0
                • Samsung Exynos 7420 w/ Android 5.1
                • Samsung Exynos 7420 w/ Android 6.0
                • Qualcomm MSM8996 Snapdragon 820 w/ Android 6.0
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-521 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3354, DRBG #1220
              917Juniper Networks, Inc.
              1194 N. Mathilda Ave.
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - Authentec_XLR

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • Broadcom XLR
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3341, DRBG #1399
              916Juniper Networks, Inc.
              1194 N. Mathilda Ave.
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - Authentec_XLP

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • Broadcom XLP
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3342, DRBG #1401
              915Juniper Networks, Inc.
              1194 N. Mathilda Ave.
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - Authentec_CN6335

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • CN 6335
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3342, DRBG #1216
              914Juniper Networks, Inc.
              1194 N. Mathilda Ave.
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - Authentec_CN5645

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • CN 5645
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3342, DRBG #1216
              913Juniper Networks, Inc.
              1194 N. Mathilda Ave.
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - Authentec_CN5230

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • CN 5230
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3342, DRBG #1216
              912Juniper Networks, Inc.
              1194 N. Mathilda Ave.
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - Authentec_CN5020

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • CN 5020
              9/9/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3342, DRBG #1216
              911Microsoft Corporation
              One Microsoft Way
              Redmond, WA 98052-6399
              USA

              Tim Myers
              FIPS@microsoft.com
              800-Microsoft

              Microsoft Windows 10 Anniversary Update, Windows Server 2016, Windows Storage Server 2016; Microsoft Surface Book, Surface Pro 4, Surface Pro 3 and Surface 3 w/ Windows 10 Anniversary Update; Microsoft Lumia 950 and Lumia 650 w/ Windows 10 Mobile Anniversary Update MsBignum Cryptographic Implementations

              10.0.14393


              The Microsoft Windows MSBignum Library algorithm implementation provides DSA, ECDSA, and RSA support to other Microsoft libraries and cryptographic modules.

                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 3 w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 3 w/ Windows 10 Pro Anniversary Update (x64)
                • Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 4 w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Core i5 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Pro 4 w/ Windows 10 Pro Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Book w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface Book w/ Windows 10 Pro Anniversary Update (x64)
                • Intel Atom x7 with AES-NI and PCLMULQDQ and SSSE 3 w/Microsoft Surface 3 w/ Windows 10 Anniversary Update (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Pro Anniversary Update (x64)
                • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x64)
                • AMD A4 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
                • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise Anniversary Update (x86)
                • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Pro Anniversary Update (x86)
                • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Anniversary Update (x86)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Anniversary Update (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Standard (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Server 2016 Datacenter (x64)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows Storage Server 2016 (x64)
                • Qualcomm Snapdragon 808 (A57, A53) w/Microsoft Lumia 950 w/ Windows 10 Mobile Anniversary Update (ARMv7)
                • Intel Xeon with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
                • Intel Core i3 without AES-NI or PCLMULQDQ or SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x86)
                • Intel Core i7 with AES-NI and PCLMULQDQ and SSSE 3 w/ Windows 10 Enterprise LTSB Anniversary Update (x64)
                • Qualcomm Snapdragon 820 (Kryo) w/ Windows 10 Mobile Anniversary Update (ARMv7)
                • Qualcomm Snapdragon 212 (A7) w/ Microsoft Lumia 650 w/ Windows 10 Mobile Anniversary Update (ARMv7)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ Dell OptiPlex 3040 w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
                • Intel Core i7 with AES-NI and without SHA Extensions w/ Microsoft Surface Book w/ Windows Server 2016 with Windows Hyper-V enabled (x64)
                • Intel Core i5 with AES-NI and without SHA Extensions w/ HP ProDesk 600 G2 w/ Windows Server 2016 Datacenter with Windows Hyper-V enabled (x64)
              8/24/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3347, DRBG #1217
              910Lexmark International, Inc.
              740 West New Circle Road
              Lexington, KY 40550
              USA

              Graydon Dodson
              gdodson@lexmark.com
              +1 859 232-6483

              Crypto Module (user)

              3.1


              Lexmark Crypto Module (user)

                • Marvell MV78460-B0 w/ Lexmark Linux v4
                • Marvell 88PA6270C0 w/ Lexmark Linux v4
              8/24/2016
              • ECDSA:
                • 186-4:
                  • Public Key Validation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                  • Signature Verification:
                    • B-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3345
              909Juniper Networks, Inc.
              1194 North Mathilda Avenue
              Sunnyvale, CA 94089
              USA

              Mahesh Bommareddy
              mbommareddy@juniper.net
              +1 (408) 936-5493

              Junos FIPS Version 12.3 X48 - OpenSSL

              12.3X48 (Firmware)


              Juniper Networks SRX Series Services Gateways provide the essential capabilities necessary to connect, secure, and manage enterprise and service provider networks, from the smallest sites to the largest headquarters and data centers.

                • Motorola PowerQUIC III
                • Intel Celeron
                • CN 6000 Series (CN 6335)
                • CN 5000 Series (CN5645)
                • Intel Xeon
              8/12/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-256
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256
                  • Signature Verification:
                    • P-224 SHA: SHA-256
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3343, DRBG #1216
              908Attivo Networks, Inc.
              47697 Westinghouse Drive, Suite 201
              Fremont, CA 94539
              USA

              Satya Das
              510 623-1000

              Attivo Cryptographic Provider

              1.0


              Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

                • Intel(R) Xeon(R) CPU E5-2620 v2 @2.10GHz w/ Open JDK 1.8 on CentOS 6.5 Intel 64-bit on ESXi 5.5.0
              8/12/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3339, DRBG #1213
              907Dell SonicWALL
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Gary Tomlinson
              gtomlinson@SonicWALL.com
              1-408-962-6756
              Fax: 1-408-745-9300

              Usha Sanagala
              usanagala@SonicWALL.com
              1-408-962-6248
              Fax: 1-408-745-9300

              libcrypto

              1.0.2h (Firmware)


              OpenSSL 1.0.2h implementation with minor patches.

                • Intel Xeon Haswell with AES-NI
                • Intel Core 2 Duo
                • Intel Celeron
                • Intel Xeon Westmere with AES-NI
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3335, DRBG #1211
              906Dell SonicWALL
              5455 Great America Parkway
              Santa Clara, CA 95054
              USA

              Gary Tomlinson
              gtomlinson@SonicWALL.com
              1-408-962-6756
              Fax: 1-408-745-9300

              Usha Sanagala
              usanagala@SonicWALL.com
              1-408-962-6248
              Fax: 1-408-745-9300

              ojdk

              1.8.0-jdk8u60-b01 (Firmware)


              Using existing Debian Stable Open JDK binaries.

                • Intel Xeon Haswell with AES-NI
                • Intel Core 2 Duo
                • Intel Celeron
                • Intel Xeon Westmere with AES-NI
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3334, DRBG #1211
              905Oracle America, Inc.
              500 Oracle Parkway
              Redwood City, CA 94065
              United States

              Linda Gallops
              linda.gallops@oracle.com
              704-972-5018
              Fax: 704-321-9273

              T10000D Firmware Crypto Library

              2.3 (Firmware)


              Oracle’s StorageTek T10000D Tape Drive blends the highest capacity, performance, reliability, and data security to support demanding, 24/7 data center operations. The T10000D delivers fast write speeds (252MB /sec) to a native 8.5 TB of magnetic tape storage; making it ideal for data center operations with growing data volume

                • Altera NIOS II
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3330, DRBG #1209
              904Engage Communication, Inc.
              9565 Soquel Drive
              Suite 201
              Aptos, CA 95003
              USA

              Gian-Carlo Bava
              giancarlo@engageinc.com
              831 688-1021 ext 106
              Fax: N/ A

              Shaun Tomaszewski
              shaun.tomaszewski@engageinc.com
              831 688-1021 ext 104
              Fax: N/ A

              BlackVault Crypto-OSS

              2.0.5 (Firmware)


              The Engage Communication BlackVault cryptographic library provides a FIPS 140-2 approved Application Programming Interface (API) to the BlackVault Hardware Security Module (HSM). The library is based on OpenSSL FIPS version 2.0.5.

                • ARM926EJ-S
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #2327, DRBG #468
              903Siemens Canada Ltd.
              300 Applewood Crescent
              Concord, Ontario L4K 5C7
              Canada

              Robert Stagg
              robert.stagg@siemens.com
              (301) 834-7799

              RUGGEDCOM ROS (Rugged Operating System) for RUGGEDCOM Ethernet Switches and RUGGEDCOM Serial Device Server

              4.2.1.F (Firmware)


              The RUGGEDCOM Switches and Server are designed specifically to withstand harsh environmental conditions including temperature and humidity extremes, shock, vibration, and electromagnetic interference. The ruggedized switches and server, similarly equipped with RUGGEDCOM ROS, provides Ethernet to serial conversion for customer networks.

                • Freescale ColdFire MCF5272
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                  • Prerequisite: SHS #3329, DRBG #1207
              902Aviat Networks
              5200 Great America Parkway
              Santa Clara, California 95054
              USA

              Ruth French
              Ruth.French@aviatnet.com
              +44 1698 717200

              Secure Management

              7.7 (Firmware)


              Eclipse Intelligent Node Unit (INUe). The module provides data security by encrypting the payload traffic on the microwave link between up to three radios. It also provides the Strong Encryption Suite for secure module management and uses AES encryption to secure SNMP v3 management traffic.

                • Motorola MPC866
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Extra Random Bits
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384
                  • Prerequisite: SHS #3328, DRBG #323
              901IBM Corporation
              2455 South Road
              Poughkeepsie, New York 12601-5400
              USA

              Michael Zagorski
              zagorski@us.ibm.com
              845-435-1853

              IBM z/OS(R) Cryptographic Services ICSF PKCS #11

              OA50113


              ICSF is a software element of z/OS that works with hardware cryptographic features and the Security Server (RACF) to provide secure, high-speed cryptographic services in the z/OS environment. ICSF, which runs as a started task, provides the application programming interfaces by which applications request the cryptographic services.

                • IBM z13 w/ IBM z/OS(R) v2.1
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3327, DRBG #1206
              900DocuSign, Inc.
              221 Main St.
              Suite 1000
              San Francisco, CA 94105
              USA

              Ezer Farhi
              Ezer.Farhi@docusign.com
              972-3-9279529
              Fax: 972-3-9230864

              Moshe Harel
              Moshe.Harel@docusign.com
              972-3-9279578
              Fax: 972-3-9230864

              PrivateServer

              5.0.0 (Firmware)


              PrivateServer performs sensitive cryptographic operations internally in a tamper-proof, high performance device. PrivateServer is configured as a network server or as a cryptographic backend to a host.

                • Intel® E3-1268LV3 Quad-Core
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3326, DRBG #1205
              899Siemens Canada Ltd.
              300 Applewood Crescent
              Concord, Ontario L4K 5C7
              Canada

              Robert Stagg
              robert.stagg@siemens.com
              (301) 834-7799

              RUGGEDCOM ROS (Rugged Operating System) for RUGGEDCOM Ethernet Switches

              4.2.1.F (Firmware)


              The RUGGEDCOM Ethernet Switches is designed specifically to withstand harsh environmental conditions including temperature and humidity extremes, shock, vibration, and electromagnetic interference. The ruggedized switches, equipped with RUGGEDCOM ROS, provide Ethernet switching capabilities for customer networks in virtually any environment.

                • Freescale PowerPC MPC8308
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Prerequisite: DRBG #1204
              898Utimaco IS GmbH
              Germanusstraße 4
              Aachen 52080
              Germany

              Dr. Gesa Ott
              hsm@utimaco.com
              49 241-1696-200
              Fax: 49 241-1696-199

              Dieter Bong
              hsm@utimaco.com
              49 241-1696-200
              Fax: 49 241-1696-199

              CryptoServer Se2 ECDSA

              ecdsa1.1.8.7_eca1.1.7.6 (Firmware)


              ECDSA Component implements all ECDSA key sizes and curves to allow flexibility and efficiency.

                • Texas Instruments TMS320C6416T
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3323, DRBG #1202
              897Utimaco IS GmbH
              Germanusstraße 4
              Aachen 52080
              Germany

              Dr. Gesa Ott
              hsm@utimaco.com
              49 241-1696-200
              Fax: 49 241-1696-199

              Dieter Bong
              hsm@utimaco.com
              49 241-1696-200
              Fax: 49 241-1696-199

              CryptoServer Se2 ECDSA with Accelerator (Exar DX8204)

              ecdsa1.1.8.7_eca1.1.7.6_hce2.2.2.1_exar2.1.1.4 (Firmware)


              ECDSA Component implements all ECDSA key sizes and curves to allow flexibility and efficiency. Accelerator chip is used to increase performance.

                • Texas Instruments TMS320C6416T + EXAR DX8204
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3323, DRBG #1202
              896Palo Alto Networks
              4301 Great America Parkway
              Santa Clara, California 95054
              USA

              Richard Bishop
              rbishop@paloaltonetworks.com
              408 753 4000

              Jake Bajic
              jbajic@paloaltonetworks.com
              408 753 3901

              Palo Alto Networks Crypto Module (PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 Firewalls, WF-500 and Panorama M-100/M-500)

              (PAN-OS, Wildfire) 7.1 / (Panorama) 7.1 (Firmware)


              The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of platforms i.e. the PA-200, PA-500, PA-2000, PA-3000, PA-4000, PA-5000 and PA-7000 firewalls, WF-500 and Panorama M-100/M-500.

                • Cavium Octeon MIPS64
                • Intel Multi Core Xeon
                • Intel Celeron
                • Intel I7
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3316, DRBG #1198
              895Palo Alto Networks
              4401 Great America Parkway
              Santa Clara, California 95054
              USA

              Richard Bishop
              rbishop@paloaltonetworks.com
              408 753 4000

              Jake Bajic
              jbajic@paloaltonetworks.com
              408 753 3901

              Palo Alto Networks Crypto Module (PA VM-series)

              7.1 (PAN-OS)


              The Palo Alto Networks Crypto Module provides the cryptographic functionality for a variety of Palo Alto Networks VM-series platforms. The firewalls provide network security by enabling enterprises to see/control applications, users, and content.

                • Intel Multi Core Xeon w/ Citrix XenServer 6.1.0
                • Intel Multi Core Xeon w/ VMware ESXi 5.5
                • Intel Multi Core Xeon w/ CentOS 6.5 - KVM
              7/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3315, DRBG #1197
              894Legion of the Bouncy Castle Inc.
              85 The Crescent
              Ascot Vale, Victoria 3032
              Australia

              David Hook
              dgh@bouncycastle.org
              +61438170390

              Jon Eaves
              jon@bouncycastle.org
              +61417502969

              Bouncy Castle FIPS .NET API

              1.0.1


              The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

                • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise (64 bit)
                • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit
                • Intel Core i5 (5th Gen) w/ Windows 7 SP1 32 bit
                • Intel Atom w/ Windows 10 Professional 64 bit
              7/7/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3312, DRBG #1194
              893Nokia
              600 March Rd.
              Ottawa, Ontario k0A 2Z0
              Canada

              Carl Rajsic
              carl.rajsic@nokia.com
              1 613 784 6218

              Alfred Nothaft
              alfred.nothaft@nokia.com
              1 972 477 5087

              Nokia 7x50 SR OS Cryptographic Library

              2.0 (Firmware)


              The Nokia 7x50 SR OS Cryptographic Library is used on the Nokia 7x50 Service Router products.

                • Cavium Octeon
              7/7/2016
              • ECDSA:
                • 186-4:
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3309, DRBG #1193
              892Information Security Corp
              1011 Lake St. Suite 425
              Oak Park, IL 60118
              USA

              Jonathan Schulze-Hewett
              schulze-hewett@infoseccorp.com
              708-445-1704
              Fax: 708-445-9705

              Michael Markowitz
              markowitz@infoseccorp.com
              708-445-1704
              Fax: 708-445-9705

              ISC Cryptographic Development Kit (CDK)

              8.0


              The ISC Cryptographic Development Kit (CDK) is a software development toolkit providing a comprehensive set of cryptographic primitives for use in any application. It includes RSA, DSA/Diffie-Hellman and elliptic curve algorithms, as well as a wide range of symmetric ciphers and hash functions.

                • Intel Core i7 with AES-NI w/ CentOS 6.7 (64-bit)
                • Intel Core i7 with AES-NI w/ Windows 10 (64-bit)
                • AMD A8-3850 without AES-NI w/ Windows 10 (64-bit)
              6/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3307, DRBG #1192
              891Aruba, a Hewlett Packard Enterprise company
              1344 Crossman Avenue
              Sunnyvale, CA 94089
              USA

              Steve Weingart
              steve.weingart@hpe.com
              512-318-2480

              Aruba OpenSSL Library

              ArubaOS 6.5.1 (Firmware)


              The Aruba MOVE Architecture forms the core network infrastructure for supporting mobile and wireless computing devices. The system enables enterprise-scale 802.11 wireless LANs (Wi-Fi), secure remote VPNs, and mobility-optimized wired networks.

                • Freescale IPQ8068
              6/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3300, DRBG #1188
              890NXP Semiconductors
              411 E. Plumeria Drive
              San Jose, CA 95134
              USA

              Sylvain Bonfardin
              sylvain.Bonfardin@nxp.com
              408-564-2354

              Ron Burnett
              ron.burnett@nxp.com
              +44(0)1316037380

              NXP JCOP3 ECDSA2 Component For P60-2 (JCOP3_P60D145_SID_002)

              0503.0101.0207 (Firmware)


              NXP JCOP3 is a Global Platform Java Card smart card operating system implementing ECDSA.

                • P6022y VB (NXP P60-2)
              6/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Signature Generation:
                    • P-224 SHA: SHA-224
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1
                    • P-224 SHA: SHA-224
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3299, DRBG #1187
              889Hewlett Packard Enterprise
              1160 Enterprise Way
              Sunnyvale, CA 94089
              USA

              Harjit Dhillon
              Harjit.dhillon@hpe.com
              1916-501-1426

              Ashot Andreasyan
              Ashot.andreasyan@hpe.com
              1650-265-5423
              Fax: 1650-265-5528

              ESKM OpenSSL

              7.0.0_OpenSSL_1.0 (Firmware)


              Enterprise Secure Key Manager (ESKM) provides key generation, retrieval, and management for encryption devices and solutions. ESKM is a hardened security appliance with secure access control, administration, and logging. ESKM supports high availability with automatic multi-site clustering, replication, and failover.

                • Intel Xeon E5-2600 Family
              6/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384
                    • P-384 SHA: SHA-256, SHA-384
                  • Prerequisite: SHS #3297, DRBG #1185
              887Motorola Solutions Inc
              1301 East Algonquin Road
              Schaumburg, IL 60196
              USA

              Tomasz Chmiel
              tomasz.chmiel@motorolasolutions.com
              +48 12 29 79 000
              Fax: +48 12 29 79 001

              Tomasz Rypina
              tomasz.rypina@motorolasolutions.com
              +48 12 29 79 000
              Fax: +48 12 29 79 001

              OpenSSL

              1.0.1p (Firmware)


              OpenSSL is used to provide the encryption function for S6000 and GGM8000 network devices.

                • Freescale MPC-8568E
                • Freescale MPC-7457
              6/21/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384
                    • P-384 SHA: SHA-256, SHA-384
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256, SHA-384
                    • P-384 SHA: SHA-1, SHA-256, SHA-384
                  • Prerequisite: SHS #3295, DRBG #1184
              886OpenSSL Validation Services, Inc.
              1829 Mount Ephraim Road
              Adamstown, MD 21710
              USA

              Steve Marquess
              info@openssl.com
              301-874-2571

              OpenSSL FIPS Object Module

              2.0.13


              The OpenSSL FIPS Object Module is a full featured general purpose cryptographic library that is distributed in source code form under an open source license. It can be downloaded from www.openssl.org/source/.

                • Power8 (PPC) w/ AIX 7.1 32-bit
                • Power8 (PPC) w/ AIX 7.1 64-bit
                • Power8 (PPC) with PAA w/ AIX 7.1 32-bit
                • Power8 (PPC) with PAA w/ AIX 7.1 64-bit
                • Power8 (PPC) w/ AIX 7.2 32-bit
                • Power8 (PPC) with PAA w/ AIX 7.2 32-bit
                • Power8 (PPC) w/ AIX 7.2 64-bit
                • Power8 (PPC) with PAA w/ AIX 7.2 64-bit
                • Power7 (PPC) w/ AIX 7.2 32-bit
                • Power7 (PPC) w/ AIX 7.2 64-bit
              6/17/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3294, DRBG #1182
              885Cisco Systems, Inc.
              170 W. Tasman Drive
              San Jose, CA 95134
              USA

              Global Certification Team
              certteam@cisco.com

              IOS Common Cryptographic Module Virtual (IC2Mv) Algorithm Module

              RelV 1.0


              IOS Common Crypto Module for Virtual use

                • Intel Atom w/ IOS XE 3.16 on ESXi 5
                • Intel Xeon w/ IOS XE 3.16 on ESXi 5
              6/10/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-256, P-384
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-256
                  • Prerequisite: SHS #3293, DRBG #1181
              884Certicom Corp.
              4701 Tahoe Blvd, Building A
              5th Floor
              Mississauga, Ontario L4W 0B5
              Canada

              Certicom Support
              support@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Certicom Sales
              sales@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Security Builder GSE-J Crypto core

              2.9.0


              Security Builder GSE-J is a standards-based cryptographic toolkit written in Java. It supports optimized Elliptic Curve Cryptography and provides application developers with sophisticated tools to flexibly integrate encryption, digital signatures and other security mechanisms into Java-based applications.

                • n/a w/ CentOS Linux 7.0 64 bit with Oracle JRE 1.8.0
              6/10/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3292, DRBG #1180
              883Mercury Systems
              3601 E University Drive
              Phoenix, AZ 85034
              United States

              Bob Lazaravich
              bob.lazaravich@mrcy.com
              602-437-1520

              Sabrina Pina
              sabrina.pina@mrcy.com
              602-437-1520

              FIPS-ALGORITHMS.1.5.0v

              1.5.0v (Firmware)


              FIPS-ALGORITHMS.1.5.0v is a comprehensive suite of FIPS-140-2 approved algorithms. Mercury Systems, Inc. integrates these algorithms into the ARMOR processor to enhance security in its line of solid state drives (SSD) and storage products.

                • Altera Nios II Processor
              6/10/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3291
              882EFJohnson Technologies
              1440 Corporate Drive
              Irving, TX 75038-2401
              USA

              John Tooker
              jtooker@efji.com
              (402) 479-8447
              Fax: (402) 479-8472

              Marshall Schiring
              mschiring@efji.com
              (402) 479-8375
              Fax: (402) 479-8472

              EFJ Communication Cryptographic Library

              3.0


              EFJ Communication Cryptographic Library (CCL) supports AES, DRBG, ECDSA, HMAC, SHA, and Key Wrap algorithms for encryption key management and transfer.

                • QUALCOMM MSM8926 w/ Android 4.4.4
                • Qualcomm Snapdragon 808 w/ Android 6
              6/10/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3290
              881Attivo Networks, Inc.
              47697 Westinghouse Drive, Suite 201
              Fremont, CA 94539
              USA

              Satya Das
              510 623-1000

              Attivo Cryptographic Module

              1.0


              Attivo Networks is an award winning provider of inside-the-network threat detection, attack analysis and forensics.

                • Intel Core i5 1.4GHz with AES-NI w/ Mac OS X El Capitan 10.11.3
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ CentOS 6.5 on VMware ESXi 6.0.0
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ CentOS 6.5 on CentOS 6.5 - KVM
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Ubuntu 12.04 LTS on VMware ESXi 6.0.0
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Windows Server 2008 SP2 (32 bit) on CentOS 6.5 - KVM
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Ubuntu 12.04 LTS on CentOS 6.5 - KVM
                • Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz with AES-NI w/ Windows Server 2008 SP2 32-bit on VMware ESXi 6.0.0
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Windows 7 Professional 64-bit on VMware ESXi 6.0.0
                • Intel(R) Xeon(R) CPU E5-2620 v2 @ 2.10GHz with AES-NI w/ Windows 7 Professional 64-bit on CentOS 6.5 - KVM
              6/10/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3288, DRBG #1176
              880Toshiba Information Systems (UK) Limited
              Toshiba Court,
              Weybridge Business Park
              Addlestone Road
              Weybridge, Surrey KT15 2UL
              United Kingdom

              Peter Hewson
              Peter.Hewson@Toshiba.co.uk
              +44 01932 825129

              Juan Bilbao
              Juan.Bilbao2@Toshiba.co.uk

              Toshiba GB SMIP Communications Hub SKU1-4

              10.4 (Firmware)


              The device provides a secure messaging gateway between cellular or mesh wide-area networks and ZigBee home area networks. It is used in the GB smart metering deployment to allow energy meter control and data messages to be exchanged between energy supplier or distribution organisations and customer metering and display devices.

                • ARM 11 core, version 6B050
              6/3/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3286
              879Samsung Electronics Co., Ltd.
              416 Maetan 3-Dong Youngtong Gu
              Suwon, Gyeonggi 152-848
              South Korea

              Jung Ha Paik
              jungha.paik@samsung.com
              +82-10-8861-0858

              Samsung SCrypto

              1.0


              Provide general purpose cryptographic services to TrustZone applications on the mobile platform for the protection of data in transit.

                • Samsung Electronics Exynos 5433 w/ MOBICORE Tbase 300
                • Qualcom APQ8084 w/ QSEE 2.0
              5/27/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3285, DRBG #1173
              878Chunghwa Telecom Co., Ltd. Telecommunication Laboratories
              No.99, Dianyan Rd.
              Yang-Mei, Taoyuan 326
              Taiwan, ROC

              Yeou-Fuh Kuan
              kufo@cht.com.tw
              +886-3-424-4333
              Fax: +886-3-424-4129

              Char-Shin Miou
              mcs@cht.com.tw
              +886-3-424-4381
              Fax: +886-3-424-4129

              HiKey Cryptographic Library

              3.7 (Firmware)


              HiKey Cryptographic Library supports SHA-1, SHA-256, SHA-384, SHA-512, Hash-DRBG, 3DES-3Key-MAC, 3DES-3Key encrypt/decrypt, ECDSA(p-224/256/384), RSA 2048 encrypt/decrypt (including RSA-CRT), RSA signature generation /verification(including RSA-CRT) and APDU command/response encryption and MAC.

                • Renesas RS-4 series
              5/27/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-224, P-256, P-384
                  • Signature Generation:
                    • P-224 SHA: SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-224 SHA: SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3284, DRBG #1172
              877Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
              312 Kings Way
              South Melbourne, Victoria 3025
              Australia

              John Weston
              john.weston@senetas.com
              +61 3 9868 4555
              Fax: +61 3 9821 4899

              CN6000 Series Common Crypto Library

              2.7.1 (Firmware)


              The CN6000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN6000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                • Intel ATOM
              5/27/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3283, DRBG #1171
              876Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
              312 Kings Way
              South Melbourne, Victoria 3025
              Australia

              John Weston
              john.weston@senetas.com
              +61 3 9868 4555
              Fax: +61 3 9821 4899

              CN4010, CN4020 and CN6010 Series Common Crypto Library

              2.7.1 (Firmware)


              The CN4010, CN4020 and CN6010 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for the CN4010, CN4020 and CN6010 Series Encryptors. Based upon OpenSSL the Library provides an Application Programming Interface (API) to support security relevant services.

                • ARM Cortex A9
              5/27/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3282, DRBG #1170
              875Senetas Corporation Ltd, distributed by Gemalto NV (SafeNet)
              312 Kings Way
              South Melbourne, Victoria 3025
              Australia

              John Weston
              john.weston@senetas.com
              +61 3 9868 4555
              Fax: +61 3 9821 4899

              CN8000 Series Common Crypto Library

              2.7.1 (Firmware)


              The CN8000 Series Common Crypto Library Module provides FIPS 140-2 approved cryptographic algorithms for CN8000 Series Encryptors. Based upon OpenSSL the Common Crypto Library provides an Application Programming Interface (API) to support security relevant services.

                • Intel Xeon
              5/27/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                    • P-384 SHA: SHA-384
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3281, DRBG #1169
              874STMicroelectronics
              190, av. Céléstin Coq - ZI
              Rousset, France 13106
              France

              Christophe MANI
              christophe.mani@st.com
              +33 442688752

              Mohamed BEN AHMED
              Mohamed.ben-ahmed@st.com
              +216 70105128

              X-CUBE-CRYPTOLIB

              3.1.0 (Firmware)


              STM32 crypto library package (X-CUBE-CRYPTOLIB) is based on STM32Cube architecture package and includes a set of crypto algorithms based on firmware implementation ready to use in all STM32 microcontrollers. API is described in UM1924 user manual from www.st.com

                • STM32 MCUs - STM32L4 series
              5/20/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3275, DRBG #1165
              873Cohesity, Inc.
              451 El Camino Real
              Suite 235
              Santa Clara, CA 95050
              USA

              Vivek Agarwal
              vivek@cohesity.com
              +1 (415) 690-7805

              Cohesity OpenSSL FIPS Object Module

              1.0.1


              The Cohesity OpenSSL FIPS Object Module is a general purpose cryptographic module compiled from the source code for the OpenSSL FIPS Object Module 2.0.12. It is incorporated into the family of Cohesity storage appliances.

                • Intel x86_64 w/ CentOS 7
              5/13/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3271, DRBG #1162
              872Intel Corporation
              2200 Mission College Blvd.
              Santa Clara, California 95054
              USA

              Steve F. Taylor
              steve.f.taylor@intel.com
              202-361-7778

              Kevin Fiftal
              kevin.fiftal@intel.com
              860-326-6293

              CSE

              The CSE provides the cryptographic functions within the Intel(R) vPro(TM) ME for applications executing in the ME.

                • N/A
              5/6/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-256 SHA: SHA-1, SHA-256
                  • Prerequisite: SHS #3233, DRBG #1156
              871Intel Corporation
              2200 Mission College Blvd.
              Santa Clara, California 95054
              USA

              Steve F. Taylor
              steve.f.taylor@intel.com
              202-361-7778

              Kevin Fiftal
              kevin.fiftal@intel.com
              860-326-6293

              CSME Crypto Driver

              1.0 (Firmware)


              The CSME Crypto Driver provides the cryptographic functions within the Intel(R) vPro(TM) ME for applications executing in the ME.

                • embedded IA-32
              5/6/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256
                  • Signature Verification:
                    • P-256 SHA: SHA-224
                  • Prerequisite: SHS #3232, DRBG #1156
              870Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Balachandra Shanabhag
              shanbhag@juniper.net
              +91 8061219144

              Quicksec - Control Plane

              14.2X4-D10 (Firmware)


              The MX 3D Universal Edge Routers deliver high performance, reliability, and scale to enable a cost-effective solution. Key features include support for a wide range of L2/L3 VPN services and advanced broadband network gateway functions, along with integrated routing, switching and security services.

                • Intel® Xeon® LC5518
              4/29/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Prerequisite: DRBG #1158
              869Juniper Networks, Inc.
              1133 Innovation Way
              Sunnyvale, CA 94089
              USA

              Balachandra Shanabhag
              shanbhag@juniper.net
              +91 8061219144

              OpenSSL Crypto Lib

              14.2X4-D10 (Firmware)


              The MX 3D Universal Edge Routers deliver high performance, reliability, and scale to enable a cost-effective solution. Key features include support for a wide range of L2/L3 VPN services and advanced broadband network gateway functions, along with integrated routing, switching and security services.

                • Intel® Xeon® LC5518
              4/29/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3262, DRBG #1157
              868Microsemi Corporation
              One Enterprise
              Aliso Viejo, CA 92656
              USA

              Richard Newell
              richard.newell@microsemi.com
              +1 (408) 643-6146

              Athena™ TeraFire® EXP-F5200ASR MPU with PKX-5200

              1.0 (Firmware)


              The Athena™ TeraFire® EXP-F5200ASR embedded cryptography microprocessor with PKX5200 firmware provides DPA-resistant acceleration of the standard cryptographic algorithms used in selected Microsemi products such as PolarFire™ FPGAs. The algorithms are used to provide cryptographic design security, including securely configuring the devices.

                • Mentor Graphics ModelSim SE v6.1h
              4/29/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-384
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-384
                  • Signature Generation:
                    • P-384 SHA: SHA-384
                  • Signature Verification:
                    • P-384 SHA: SHA-384
                  • Prerequisite: SHS #3259, DRBG #1154
              867Microsemi Corporation
              One Enterprise
              Aliso Viejo, CA 92656
              USA

              Richard Newell
              richard.newell@microsemi.com
              +1 (408) 643-6146

              Athena™ TeraFire® EXP-F5200B MPU with PKX-5200

              1.0 (Firmware)


              The Athena™ TeraFire® EXP-F5200B embedded cryptography microprocessor with PKX-5200 firmware provides DPA-resistant acceleration of the standard cryptographic algorithms used in selected Microsemi products such as PolarFire™ FPGAs. The algorithms are made available to the FPGA user via an internal bus interface for use in end applications.

                • Mentor Graphics ModelSim SE v6.1h
              4/29/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-256, P-384, P-521
                  • Signature Generation:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-384, SHA-512
                    • P-521 SHA: SHA-512
                  • Signature Verification:
                    • P-256 SHA: SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-384, SHA-512
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3258, DRBG #1153
              866Certicom Corp.
              4701 Tahoe Blvd, Building A
              5th Floor
              Mississauga, Ontario L4W 0B5
              Canada

              Certicom Support
              support@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Certicom Sales
              sales@certicom.com
              1-905-507-4220
              Fax: 1-905-507-4230

              Security Builder® FIPS Core

              6.0.3


              Security Builder® FIPS Core provides application developers with cryptographics tools to easily integrate encryption, digital signatures and other security mechanisms into C-based apps for FIPS 140-2 and Suite B security. It can also be used with Certicom''s PKI, IPSec and SSL modules.

                • Intel Core i7-3615QM w/ Mac OS X El Captian 10.11.4
              4/22/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3256, DRBG #1151
              865LG Electronics, Inc.
              20 Yoido-dong
              Youngdungpo-gu
              Seoul 152-721
              Republic of Korea

              Jongseong Kim
              jongseong.kim@lge.com
              82-10-4535-0110
              Fax: 82-2-6950-2080

              Adam Wick
              503-808-7216
              Fax: 503-350-0833

              LG OpenSSL

              1.0.1h


              General-purpose cryptographic services available for Android used by LG devices to provide secured services to applications via the OpenSSL FIPS Object Module, which is a full featured general purpose cryptographic library.

                • Qualcomm Snapdragon 800-series w/ Android 6.0.1
              4/22/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3255, DRBG #1150
              864Green Hills Software
              7585 Irvine Center Drive
              Suite 250
              Irvine, CA 92618
              USA

              David Sequino
              206-310-6795
              Fax: 978-383-0560

              Douglas Kovach
              727-781-4909
              Fax: 727-781-2915

              INTEGRITY Security Services High Assurance Embedded Crypto Tool

              1.0 (Firmware)


              ISS HA ECT is a standards-based cryptographic toolkit providing a flexible framework to integrate encryption, digital signatures and other security mechanisms into a wide range of applications. It is designed to support multiple cryptographic providers with a single common API, easily targeted to a variety of Operating Systems.

                • ARM Cortex-M4
              4/22/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-256
                    • Generation Methods: Extra Random Bits
                  • Signature Generation:
                    • P-256 SHA: SHA-256
                  • Signature Verification:
                    • P-256 SHA: SHA-256
                  • Prerequisite: SHS #3252, DRBG #1147
              863AlpCode AS
              Postboks 6
              Folldal N-2581
              Norway

              Dag Arne Osvik
              contact@alpcode.com
              +47 40699784

              AlpCode™ Cryptographic Library (ACCL)

              2


              AlpCode™ Cryptographic Library (ACCL) features side-channel resistance through its use of constant-time algorithms, data-independent memory access patterns and fault detection. Its unique side-channel resistance even extends to normally-public elliptic-curve parameters, making it suitable for use with classified elliptic curves.

                • Arm Cortex-A9 w/ Linux
              4/15/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Testing Candidates
                  • Public Key Validation:
                    • Curves: P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3246, DRBG #1144
              862Oracle Corporation
              500 Oracle Parkway
              Redwood Shores, CA 94065
              USA

              Joshua Brickman
              seceval_us@oracle.com
              781-442-0451

              Linda Gallops
              seceval_us@oracle.com
              704-972-5018
              Fax: 980-355-5399

              Oracle Solaris Userland Cryptographic Framework, ucrypto library

              1.3


              The Oracle Solaris OS utilizes the Oracle Solaris Userland Cryptographic Framework module for cryptographic functionality for applications running in user space. It exposes three public interfaces to provide cryptography to any application designed to utilize them.

                • SPARC64 X+ with hardware accelerators w/ Oracle Solaris 11.3
                • SPARC M7 without hardware accelerators w/ Oracle Solaris 11.3
                • SPARC M7 with hardware accelerators w/ Oracle Solaris 11.3
                • SPARC64 X+ without hardware accelerators w/ Oracle Solaris 11.3
                • SPARC T5 without hardware accelerators w/ Oracle Solaris 11.3
                • SPARC T5 with hardware accelerators w/ Oracle Solaris 11.3
                • Intel Xeon without AES-NI w/ Oracle Solaris 11.3
                • Intel Xeon with AES-NI w/ Oracle Solaris 11.3
              4/15/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • B-163 SHA: SHA-1
                    • B-233 SHA: SHA-1
                    • B-283 SHA: SHA-1
                    • B-571 SHA: SHA-1
                    • K-163 SHA: SHA-1
                    • K-233 SHA: SHA-1
                    • K-283 SHA: SHA-1
                    • K-409 SHA: SHA-1
                    • K-571 SHA: SHA-1
                    • P-192 SHA: SHA-1
                    • P-224 SHA: SHA-1
                    • P-256 SHA: SHA-1
                    • P-384 SHA: SHA-1
                    • P-521 SHA: SHA-1
                  • Prerequisite: SHS #3245
              861Oracle Corporation
              500 Oracle Parkway
              Redwood Shores, CA 94065
              USA

              Joshua Brickman
              seceval_us@oracle.com
              781-442-0451

              Linda Gallops
              seceval_us@oracle.com
              704-972-5018
              Fax: 980-355-5399

              Oracle Solaris Kernel Cryptographic Framework

              1.3


              The Oracle Solaris OS utilizes the Oracle Solaris Kernel Cryptographic Framework module to provide cryptographic functionality for any kernel-level processes that require it via Oracle-proprietary APIs.

                • SPARC64 X+ with hardware accelerators w/ Oracle Solaris 11.3
                • SPARC M7 without hardware accelerators w/ Oracle Solaris 11.3
                • SPARC M7 with hardware accelerators w/ Oracle Solaris 11.3
                • SPARC64 X+ without hardware accelerators w/ Oracle Solaris 11.3
                • SPARC T5 without hardware accelerators w/ Oracle Solaris 11.3
                • SPARC T5 with hardware accelerators w/ Oracle Solaris 11.3
                • Intel Xeon without AES-NI w/ Oracle Solaris 11.3
                • Intel Xeon with AES-NI w/ Oracle Solaris 11.3
              4/15/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • B-163 SHA: SHA-1
                    • B-233 SHA: SHA-1
                    • B-283 SHA: SHA-1
                    • B-571 SHA: SHA-1
                    • K-163 SHA: SHA-1
                    • K-233 SHA: SHA-1
                    • K-283 SHA: SHA-1
                    • K-409 SHA: SHA-1
                    • K-571 SHA: SHA-1
                    • P-192 SHA: SHA-1
                    • P-224 SHA: SHA-1
                    • P-256 SHA: SHA-1
                    • P-384 SHA: SHA-1
                    • P-521 SHA: SHA-1
                  • Prerequisite: SHS #3243
              860Hospira Inc.
              275 N. Field Drive
              Lake Forest, IL 60045
              USA

              Chaitanya Srinivasamurthy
              Chaitanya.srinivasamurthy@pfizer.com
              001-224-212-5715
              Fax: 001-224-212-7910

              Slawomir Ciapala
              Slawomir.Ciapala@pfizer.com
              001-224-212-5545
              Fax: 001-224-212-7910

              Hospira CE3.x OpenSSL Cryptographic Module

              2.0.9


              Hospira OpenSSL FIPS Object Module 2.0.9 is used within various Hospira Infusion Pumps for providing secure communication between Infusion pumps and external server.

                • i.MX53 Arm Cortex-A8 w/ Android 2.3.7
              4/8/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3240, DRBG #1139
              859D'Crypt Pte Ltd
              28 Sin Ming Lane
              #06-133 Midview City
              Singapore, Singapore 573953
              Singapore

              Quek Gim Chye
              gim_chye@d-crypt.com
              (65) 6933-1823
              Fax: (65) 6684-5142

              Karen Chong
              karen_chong@d-crypt.com
              (65) 6933-1821
              Fax: (65) 6684-5142

              ECDSA (NIST Curve P-521)

              1.0-0 (Firmware)


              ECDSA (NIST Curve P-521) implements ECDSA digital signature verification based on NIST Curve P-521 and SHA-512

                • ARM Cortex-A5
                • Intel Xeon X3440
              3/31/2016
              • ECDSA:
                • 186-4:
                  • Signature Verification:
                    • P-521 SHA: SHA-512
                  • Prerequisite: SHS #3230
              858Allied Telesis
              27 Nazareth Ave
              Christchurch, Canterbury 8024
              New Zealand

              Andrew Riddell
              Andrew.Riddell@alliedtelesis.co.nz
              +64 29 377 3777
              Fax: +64 3 339 3001

              Mofassir Ul Haque
              Mofassir.UlHaque@alliedtelesis.co.nz
              +64 27 777 1854
              Fax: +64 3 339 3001

              AW+ OpenSSL FIPS Object Module Version 2.0.10

              Openssl-fips-2.0.10 (Firmware)


              AW+ OpenSSL FIPS Object Module is a software library which provides cryptographic support for secure communication and protection of information. The cryptographic services provided by the library include Symmetric Encryption and Decryption, Digital Signature, Cryptographic Hashing and Keyed-Hash Message Authentication.

                • Freescale PowerPC P2040
              3/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: B-233, B-283, B-409, B-571, K-233, K-283, K-409, K-571, P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits, Testing Candidates
                  • Public Key Validation:
                    • Curves: B-163, B-233, B-283, B-409, B-571, K-163, K-233, K-283, K-409, K-571, P-192, P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • B-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • B-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • B-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-163 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-233 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-283 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-409 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • K-571 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-192 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3228, DRBG #1133
              857Samsung Electronics Co., Ltd
              R4 416, Maetan 3-dong, Yeongtong-gu
              Suwon-si, Gyeonggi-do 443-742
              Korea

              Jung Ha Paik
              jungha.paik@samsung.com
              +82-10-8861-0858

              Samsung BoringSSL Cryptographic Module

              v1.0


              The Samsung BoringSSL Cryptographic Module is a general purpose cryptographic module to provide user-mode applications with security services.

                • MSM8996 w/ Android 6.0.1
                • EXYNOS8890 w/ Android 6.0.1
                • EXYNOS7420 w/ Android 6.0.1
                • APQ8084 w/ Android 6.0.1
                • EXYNOS5433 w/ Android 6.0.1
                • EXYNOS3475 w/ Android 6.0.1
                • MSM8916 w/ Android 6.0.1
              3/31/2016
              • ECDSA:
                • 186-4:
                  • Key Pair Generation:
                    • Curves: P-224, P-256, P-384, P-521
                    • Generation Methods: Extra Random Bits
                  • Public Key Validation:
                    • Curves: P-224, P-256, P-384, P-521
                  • Signature Generation:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Signature Verification:
                    • P-224 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-256 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-384 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                    • P-521 SHA: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
                  • Prerequisite: SHS #3227, DRBG #1132
              856Legion of the Bouncy Castle Inc.
              85 The Crescent
              Ascot Vale, Victoria 3032
              Australia

              David Hook
              dgh@bouncycastle.org
              +61438170390

              Jon Eaves
              jon@bouncycastle.org
              +61417502969

              Bouncy Castle FIPS .NET API

              1.0.0


              The Bouncy Castle FIPS .NET API is a comprehensive suite of FIPS Approved algorithms implemented in pure C#. All key sizes and modes have been implemented to allow flexibility and efficiency, and additional algorithms, including some post-quantum ones, are available in non-approved operation as well.

                • Intel Core i7 (6th Gen) w/ Windows 10 Enterprise 64 bit
                • Intel Atom w/ Windows 10 Professional 64 bit
                • Intel Core i5 (5th Gen) w/ Windows 8.1 Professional 32 bit